0% found this document useful (0 votes)
36 views53 pages

IoT Child Safety Monitoring Device

The document outlines the development of an IoT-based safety gadget for child monitoring, which utilizes GPS and GSM technology to enhance child safety by allowing parents to set geo-fences and receive notifications in emergencies. It addresses the increasing risks of child abuse and the limitations of traditional monitoring systems by integrating real-time tracking, automated alerts, and a panic button for children. The project aims to provide a comprehensive solution that empowers caregivers with timely information and enhances children's security in dynamic environments.

Uploaded by

j.vaishnavi1616
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views53 pages

IoT Child Safety Monitoring Device

The document outlines the development of an IoT-based safety gadget for child monitoring, which utilizes GPS and GSM technology to enhance child safety by allowing parents to set geo-fences and receive notifications in emergencies. It addresses the increasing risks of child abuse and the limitations of traditional monitoring systems by integrating real-time tracking, automated alerts, and a panic button for children. The project aims to provide a comprehensive solution that empowers caregivers with timely information and enhances children's security in dynamic environments.

Uploaded by

j.vaishnavi1616
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

IoT SAFTEY GADGET FOR CHILD MONITIRING AND

NOTIFICATION

ABSTRACT

In that parents can create a Geo-fence from the child’s location and the IOT device contains
GPS module so that parents or guardians can continuously Attacks on children are rising
more frequently nowadays. The children face risk at an unprecedented rate and restrictions
that prevent them from contacting relative members. The main concept in this project is to
develop equipment that provides "Child Safety" for the children. Consequently, the
understanding of this research is to communicate an SMS sent to a parent or legal guardian
by a child's wearable device. Numerous challenges for children, and the lack of protection
safeguards to keep the child safe from bad behavior. A modern method employing GSM
technology is proposed to protect children so that while dealing with such social issues,
children won't feel abandoned problems. Utilizing GSM, sensors, and a panic button in an
IoT device genuinely benefits kids. An IOT device is proposed that can be wearable and
connected to a mobile application. monitor child’s location. If they cross the Geo-fence a
notification will sent to parents or guardians. If any emergency situation may occur to child,
an alert or message will be sent to parents or guardians.

Keywords—Child monitoring; Geofence; Safety gadget; Internet of things adget for Child
Monitoring and Notification.
CHAPTER-1

INTRODUCTION

Child abuse, sometimes referred to as child maltreatment (CM), is a worldwide problem that
can happen anywhere. Over the past 20 years, this problem has grown significantly years.
The problem of child abuse is very its crucial to be cautious because it could harm the child
and how it will impact the child's future social life. In every nation, there are groups
dedicated to stopping and treating child abuse. the Indonesian government's Commission for
the Protection of Indonesian Children, Indonesia's Komisi Perlindungan Anak (KPAI) serves
as a formal institution to child abuse's effectiveness prevention. The commission advances the
security, permanence, and the welfare of kids, teens, and families through tying together
adoption, child welfare, and associated the public and professionals to information,
resources . With resources covering issues related to child welfare, child abuse, adoption,
away-from-home care, and more. As stated by since 2011 to the KPAI Data System, the
number of child abuse 22,109 cases are in 2016. the crimes where kids are the prime suspects
contribute significantly to the abuse of children in Indonesia. It is eloquently put in earlier
research. Information technology (IT) is being utilised across all industries. Really long
Previously, sending mail or handling finances might take days. Users today simply require a
PC with internet access to real-time communication. This study supports the IT-based
programme for preventing child abuse. Geofencing and mobile technology-based
preventative strategy technique.

The model is utilising the geo-targeted application to track the kid's whereabouts and signal
an emergency transmitting messages, as well as status. The method used is Frequently
employed in the creation of location-based applications is geo-fencing. The monitoring
method used by geo-fencing geography-based strategy using a virtual fence that
automatically notices when an object enters or exits a fence the wall. Recent mobile
applications have employed geo-fencing to monitor logistics, emergency applications to aid
in disaster survival, alzheimer's patient monitoring, and even agricultural areas. The geo-
fencing technique is utilised in this study to build up the child activity zones. It also covers
the areas where kids are not allowed [3]. A motion sensor module and a voice recorder
module are also supported by the application to automatically convey an emergency alarm to
the server, parents, and institution in charge. The objective of this project is to create IT-based
child protection that will facilitate the supervision of children by parents and the state. The
mechanism is triggered by the use of a sensor module to displays the first iteration of a child
protection system to make it more effective and efficient.

1.1 Motivation

The safety and well-being of children are fundamental responsibilities of parents and
caregivers. Ensuring that children are secure and protected from potential harm has always
been a significant concern. However, in today’s fast-paced and technology-driven world,
these challenges have become more complex due to the dynamic and unpredictable nature of
modern living. Parents often face difficulties in keeping constant track of their children,
especially when juggling multiple responsibilities or when children are away from direct
supervision.

Emerging safety concerns, such as the risk of children wandering into unfamiliar or unsafe
areas, potential abduction scenarios, and the inability to respond promptly during
emergencies, have created a strong demand for innovative solutions. Traditional methods of
supervision and monitoring, such as physical presence or verbal communication, are no
longer sufficient to address these evolving challenges.

The rapid advancements in Internet of Things (IoT) technology offer a transformative


opportunity to tackle these issues effectively. IoT enables seamless integration of hardware
and software systems to collect, analyze, and transmit real-time data, paving the way for
smarter, more responsive solutions. By leveraging IoT, it is possible to develop affordable,
efficient, and reliable child safety systems that provide constant monitoring, instant alerts,
and actionable insights to caregivers.

This project is driven by the vision of using cutting-edge technology to enhance child safety
and provide peace of mind to parents and caregivers. Through the integration of real-time
location tracking, geo-fencing, emergency alert mechanisms, and automated notifications,
this system aims to deliver a comprehensive and user-friendly solution for child monitoring.
By empowering caregivers with the tools to act swiftly and proactively in critical situations,
the project aspires to bridge the gap between traditional child supervision methods and the
demands of modern safety concerns, ensuring children remain secure in today’s connected
world.

1.2 Problem Definition

The lack of effective child monitoring tools in real-time remains a critical challenge for
parents and caregivers, particularly in an era where ensuring children’s safety is increasingly
complex due to growing urbanization and diverse safety risks. Traditional solutions, such as
basic GPS trackers or communication devices, often fall short in delivering the level of
responsiveness and reliability required in dynamic environments. These systems either
provide delayed or incomplete information, fail to integrate real-time tracking features with
geo-fencing capabilities, or lack the functionality to promptly notify parents or guardians
when an emergency occurs.

One significant limitation of conventional systems is their inability to enforce location-based


boundaries effectively. For instance, parents may wish to ensure their child remains within a
school campus, playground, or a designated safe zone. Without reliable geo-fencing
technology, breaches of these boundaries often go unnoticed, exposing children to potential
risks without alerting their guardians. Furthermore, these systems are rarely equipped with an
intuitive mechanism for the child to alert caregivers immediately in case of emergencies, such
as getting lost, facing harassment, or experiencing a medical issue.

Another critical shortcoming is the absence of robust notification mechanisms. Conventional


systems often rely on manual interventions or infrequent updates, which can result in
significant delays in responding to potential threats. In emergencies, every second counts, and
delayed notifications can lead to severe consequences, including prolonged periods of
uncertainty for parents and heightened risks for the child.

This project aims to address these gaps by developing an IoT-based safety gadget that
integrates advanced technologies to ensure comprehensive child monitoring and safety
management. The proposed system incorporates real-time location tracking, enabling parents
and caregivers to monitor their child’s movements and ensure they stay within predefined
boundaries through a geo-fencing module. The system is equipped with a panic button that
allows the child to send immediate alerts in emergencies, empowering them with a direct line
of communication.
Additionally, the gadget leverages IoT technologies and a cloud-based infrastructure to store
and process data, ensuring seamless connectivity and remote accessibility. Automated
notifications, including emails and alerts, are triggered in case of emergencies or boundary
breaches, enabling parents to respond promptly to critical situations. By integrating these
functionalities into a single interconnected system, the proposed solution bridges the gap
between traditional monitoring tools and modern safety requirements, providing a reliable
and efficient platform to ensure the safety and security of children.

1.3 Objective of Project

The primary objective of this project is to design and implement an IoT-based safety gadget
for child monitoring and notification that:

1. Monitors the child’s location in real-time and ensures they remain within predefined
boundaries using geo-fencing technology.
2. Provides immediate alerts in emergencies through a panic button and automated
notifications.
3. Transmits data to a cloud database for secure storage and remote access.
4. Offers an intuitive web user interface for real-time monitoring and status updates.
5. Ensures timely automated mail notifications in case of emergencies or boundary
breaches, providing parents and caregivers with actionable insights and alerts.

1.4 Organization of Project

In today’s fast-paced and interconnected world, ensuring the safety and security of children is
a paramount concern for parents and caregivers. Children, being vulnerable, often face
various safety risks, including getting lost, crossing predefined safe zones, or encountering
emergencies that require immediate attention. Traditional child monitoring systems, such as
basic GPS trackers or mobile communication devices, lack the comprehensive functionality
required to address these concerns effectively. These systems are often unreliable, delayed in
response, and insufficient to provide real-time monitoring, boundary alerts, and swift
emergency notifications.

The advent of the Internet of Things (IoT) presents a transformative opportunity to


revolutionize child safety monitoring. IoT enables seamless connectivity between devices,
sensors, and platforms, facilitating real-time data collection, analysis, and communication.
Leveraging IoT technology, this project aims to design and implement an IoT Safety Gadget
for Child Monitoring and Notification that ensures a robust, efficient, and reliable solution
to address modern child safety challenges.

The proposed system incorporates advanced features such as real-time location tracking, geo-
fencing to monitor predefined boundaries, and a panic button for immediate alerts during
emergencies. By integrating these features, the gadget provides parents and caregivers with a
centralized platform to track their child’s safety status in real time. The system uses an
Arduino (ATMEGA328P) microcontroller as the central processing unit, interfacing with a
Node MCU Wi-Fi module for data transmission to a cloud database. This cloud infrastructure
ensures secure data storage and allows remote access via a user-friendly web interface.
Additionally, automated email notifications are triggered in case of boundary breaches or
emergency alerts, enabling prompt responses from parents or guardians.

This innovative solution addresses the limitations of traditional child monitoring tools by
offering a seamless and integrated approach to safety management. It not only empowers
parents with real-time insights but also provides children with a means to communicate
emergencies effectively. The system is designed to be accessible, cost-effective, and scalable,
making it suitable for widespread adoption. Through this project, we aim to create a reliable
safety gadget that offers peace of mind to parents and enhances the overall safety of children
in dynamic environments.

The structure of the proposed work is organized into several key chapters. Chapter 2 provides
a detailed exploration of the existing literature, offering a comprehensive review of relevant
studies and research in the field. Chapter 3 outlines the proposed methodology, explaining the
approach and procedures employed in this work. Chapter 4 focuses on the presentation and
discussion of the hardware components used in the system. Chapter 5 presents the results,
showcasing the outcomes and analysis of the implemented work. Finally, Chapter 6
concludes the study by summarizing the key findings and offering insights into potential
future research directions.
CHAPTER 2
LITRATURE SURVEY

1. Design of Wearable Device for Child Safety

AUTHORS:[Link]; [Link]; [Link].; [Link].; Divya


Priyadharshini.R; M. Anisha

Now-a-days attacks on children are increasing at an unprecedented rate and the victims are in
dangerous conditions, where they are not allowed to contact the family members. The key
idea planned in this research work is an advanced technology that offers “Smart Child
Safety” for the children. Therefore, the awareness of this method is to send an SMS from
children's wear tool to their parent or guardian. In the prevailing structure, there is no
monitoring method for child, it should create many problems for them and the no protection
mechanism to protect the child from the misbehavior. In addition, there is no aware device for
the child's protection; it must be completed by hand only. Thus, the planned method will be
highly effective when compared to the other existing techniques in helping the victims.
Moreover, it doesn't need any manual operation. This paper recommends a newfangled
technology for child protection by using GSM so that the children will not feel abandoned
while facing such social problems. The problems overawed here using Arduino UNO, GSM,
sensors, MEMS, temperature and panic button by using IOT. In such case, Heartbeat Sensor
track the best rate for children and sends the emergency message by using the GSM to save
contacts. Such method is actually supportive for children in today's world. Hence, this
provides a security to the children and secures the feeling of parents.

[Link]-designing Mobile Online Safety Applications with Children

AUTHORS:Priya Kumar;Brenna McNally;Chelsea Hordatt;Matthew Louis Mauriello;


Shalmali Naik; Leyla Norooz; Alazandra Shorter; Evan Golub; Allison Druin;

Parents use mobile monitoring software to observe and restrict their children's activities in
order to minimize the risks associated with Internet-enabled mobile devices. As children are
stakeholders in such technologies, recent research has called for their inclusion in its design
process. To investigate children's perceptions of parental mobile monitoring technologies and
explore their interaction preferences, we held two co-design sessions with 12 children ages 7-
12. Children first reviewed and redesigned an existing mobile monitoring application. Next,
they designed ways children could use monitoring software when they encounter mobile risks
(e.g., cyberbullying, inappropriate content). Results showed that children acknowledged
safety needs and accepted certain parental controls. They preferred and designed controls that
emphasized restriction over monitoring, taught risk coping, promoted parent-child
communication, and automated interactions. Our results benefit designers looking to develop
parental mobile monitoring technologies in ways that children will both accept and can
actively benefit from.

3. Design and development of an IOT based wearable device for the safety and security
of women and girl children

AUTHORS:AnandJatti; MadhviKannan; R M Alisha; P Vijayalakshmi; Shrestha Sinha

The aim of this work is to develop a wearable device for the safety and protection of women
and girls. This objective is achieved by the analysis of physiological signals in conjunction
with body position. The physiological signals that are analyzed are galvanic skin resistance
and body temperature. Body position is determined by acquiring raw accelerometer data from
a triple axis accelerometer. Acquisition of raw data is then followed by activity recognition
which is a process of employing a specialized machine learning algorithm. Real-time
monitoring of data is achieved by wirelessly sending sensor data to an open source Cloud
Platform. Analysis of the data is done on MATLAB simultaneously. This device is
programmed to continuously monitor the subject's parameters and take action when any
dangerous situation presents itself. It does so by detecting the change in the monitored
signals, following which appropriate action is taken by means of sending notifications/alerts
to designated individuals

4. An intelligent model for logistics management based on geofencing algorithms and


RFID technology

AUTHORS: R. R. Oliveira, Ismael M. G. Cardoso, J. Barbosa, C. Costa, Mario P. Prado

The cargo transport represents the largest share of logistics costs in most companies.
Consequently, companies are investing in tracking and tracing systems aiming to improve
services, reduce costs and ensure the safety in cargo transportation. To play a part in this area,
we propose in this article SafeTrack, a model for logistics management based on geofencing
algorithms and radio-frequency technology. In this approach, the focus is on dealing with
delivery management. The main scientific contribution of SafeTrack is automatic delivery
management. Besides dealing with deliveries without user interaction, we provide a
mechanism to detect inconsistencies at real-time. Furthermore, the model monitors detours in
planned routes and deals with alarms notifications using mobile devices. To provide that
features, we employed Geofence concept with two solutions that enable to detect, in real-
time, the occurrence of detours in planned routes. We also created a component, named
SafeDuino, to control loads delivery and pickups. The decision on the occurrence of
inconsistencies during the logistics flow is performed through the fusion of context
information, obtained from SafeDuino and a mobile device, using radio-frequency
technology. We built a complete and functional prototype, which was evaluated in a
controlled environment, testing several conditions. The test scenario was executed twenty
times, showing that the proposed model is capable to identify all inconsistencies along the
travels. We concluded that SafeTrack improves logistics operation, optimizing decision-
making, avoiding losses during the logistics flow, and also allowing companies to remain
competitive in the market.

2.1 EXISTING SYSTEM


The operations of all the subsystems are controlled by the Arduino UNO - Atmega 328p
microcontroller, which operates as a firmly established computing device. It is connected to
every other module in the apparatus, including the IoT Module, GPS and GSM Module,
accelerometer, and Heartbeat and Temperature Sensor. The pulse, which also determined by a
cardiovascular detector, is the amount of times the heartbeats per minutes that may be sensed
in any arteries that is near the skin. The rate at which your beat beats per beat (BPM) is
known to it as pulse rate. MEMS devices are growing in popularity due to their smaller size,
lower mass, volume, power consumption, lower cost, ease of system integration or
modification, small thermal constant, high enhanced thermal expansion tolerance,
parallelism, capacity to be produced in huge arrays, tolerance to noise, shock, and radiation.
"Global Positioning System" or GPS. The position of any site can be found using the satellite
navigation system known as GPS. The block diagram of the proposed safety gadget is shown
in Fig. 1.
Fig : 1 Existing Methodology

2.2. DRAWBACKS :

Here are some potential drawbacks of the existing system as described:

1. Limited Processing Capability:


The Arduino UNO - Atmega 328P microcontroller, while reliable and efficient, has limited
processing power and memory. This can restrict the system's ability to handle complex
computations, process large datasets, or integrate advanced algorithms for data analysis and
decision-making.

2 . Dependency on External Modules:


The system heavily relies on external modules such as GPS, GSM, and IoT devices for
functionality. Any failure or malfunction in these modules could disrupt the entire system’s
operation, leading to inaccuracies or loss of critical data.

3 . Energy Consumption:
The use of multiple sensors and modules, such as accelerometers and temperature sensors,
along with constant data transmission via GSM and IoT modules, can result in significant
energy consumption. This may require frequent battery replacements or recharging, reducing
the system's practicality for prolonged use.

4. Data Transmission Latency:


The reliance on GSM and IoT modules for data transmission introduces potential latency
issues, especially in areas with poor network coverage. This delay in communication could
impact the real-time functionality of the system, particularly during emergencies.
5. Sensor Sensitivity and Accuracy:
Sensors like heartbeat and temperature detectors may have limitations in accuracy and
reliability due to environmental factors such as motion, noise, or improper placement. This
could result in false readings or missed detections, affecting the overall performance.

6. Lack of Scalability:
The current system design may not be easily scalable to accommodate additional features or
sensors in the future. Integrating more advanced components may require significant
hardware and software modifications.

7. Environmental Dependency of GPS:


The GPS module’s performance can be affected by environmental conditions such as
obstructions (e.g., tall buildings, dense trees) or atmospheric interference, leading to
inaccurate location tracking or loss of signal.

8. No Advanced Data Analytics:


The system lacks advanced data analytics capabilities, such as predictive modeling or AI-
based decision-making, which could enhance the functionality by identifying patterns,
anomalies, or potential risks proactively.

9. Physical Vulnerability:
The hardware components may be prone to physical damage due to their small size and
exposure. For instance, MEMS devices, while advantageous, are delicate and may require
careful handling and robust packaging to prevent failures.

10. Cost of Maintenance:


Maintaining the entire system, including replacing or repairing sensors, modules, and
batteries, could lead to additional costs over time, potentially making the solution less cost-
effective.

Addressing these drawbacks can significantly enhance the system’s efficiency, reliability, and
user-friendliness, paving the way for a more robust and advanced safety gadget.
CHAPTER -3
PROPOSED SYSTEM

The proposed methodology for the "IoT-Based Safety Gadget for Child Monitoring and
Notification" involves an Arduino (ATMEGA328P) microcontroller as the central
processing unit, interfacing with IoT devices and platforms to collect real-time data. A panic
button provides immediate alerts in emergencies, while a geo-fencing module monitors the
child’s location to ensure they remain within predefined boundaries. The data is transmitted
to a cloud database via a Node MCU Wi-Fi module, enabling storage and remote access. A
web user interface allows users to monitor the child’s safety status in real time, while
automated mail notifications are triggered to alert users in case of emergencies or location
breaches. This interconnected system ensures effective child monitoring, immediate
notifications, and reliable safety management.

FIG:2 Proposed System

CHAPTER - 4
HARDWARE COMPONENTS
4.1 Microcontroller:

4.1.1 Introduction:

Microcontroller as the name suggest, a small controller. They are like single chip
computers that are often embedded into other systems to function as processing/controlling
unit. For example, the control you are using probably has microcontrollers inside that do
decoding and other controlling functions. They are also used in automobiles, washing
machines, microwaves ovens, toys….etc, where automation is needed.

4.1.2 Arduino Uno Microcontroller:

The Arduino Uno is a microcontroller board based on the ATmega328 (datasheet). It


has 14 digital input/output pins (of which 6 can be used as PWM outputs), 6 analog inputs, a
16 MHz crystal oscillator, a USB connection, a power jack, an ICSP header, and a reset
button. It contains everything needed to support the microcontroller; simply connect it to a
computer with a USB cable or power it with a AC-to-DC adapter or battery to get started.

The Uno differs from all preceding boards in that it does not use the FTDI USB-to-
serial driver chip. Instead, it features the Atmega8U2 programmed as a USB-to-serial
converter. "Uno" means "One" in Italian and is named to mark the upcoming release of
Arduino 1.0. The Uno and version 1.0 will be the reference versions of Arduino, moving
forward. The Uno is the latest in a series of USB Arduino boards, and the reference model for
the Arduino platform; for a comparison with previous versions, see the index of Arduino
boards.

The Arduino Uno can be powered via the USB connection or with an external power
supply. The power source is selected [Link] (non-USB) power can come
either from an AC-to-DC adapter (wall-wart) or battery. The adapter can be connected by
plugging a 2.1mm center-positive plug into the board's power jack. Leads from a battery can
be inserted in the Gnd and Vin pin headers of the POWER [Link] board can operate
on an external supply of 6 to 20 volts. If supplied with less than 7V, however, the 5Vpin may
supply less than five volts and the board may be unstable. If using more than 12V, the voltage
regulator may overheat and damage the board. The recommended range is 7 to 12 volts

The power pins are as follows:·


 VIN. The input voltage to the Arduino board when it's using an external power
source (as opposed to5 volts from the USB connection or other regulated
power source). You can supply voltage through this pin, or, if supplying
voltage via the power jack, access it through this pin.·
 5V. The regulated power supply used to power the microcontroller and other
components on the board. This can come either from VIN via an on-board
regulator, or be supplied by USB or another regulated 5V supply.
 3.3V.A 3.3 volt supply generated by the on-board regulator. Maximum current
draw is 50 mA.
 GND. Ground pins.
Memory:

The Atmega328 has 32 KB of flash memory for storing code (of which 0,5 KB is used
for the bootloader); It has also 2 KB of SRAM and 1 KB of EEPROM (which can be read
and written with the EEPROM library).

Input and Output:

Each of the 14 digital pins on the Uno can be used as an input or output, using pin
Mode(), digital Write(), and digital Read() functions. They operate at 5 volts. Each pin can
provide or receive a maximum of 40 mA and has an internal pull-up resistor (disconnected by
default) of 20-50 kOhms. In addition, some pins have specialized functions:

 Serial: 0 (RX) and 1 (TX). Used to receive (RX) and transmit (TX) TTL serial data.
These pins are connected to the corresponding pins of the ATmega8U2 USB-to-TTL
Serial chip .
 External Interrupts: 2 and 3. These pins can be configured to trigger an interrupt
on a low value, arising or falling edge, or a change in value. See the attach Interrupt()
function for details.
 PWM: 3, 5, 6, 9, 10, and 11. Provide 8-bit PWM output with the analog Write()
function.
 SPI: 10 (SS), 11 (MOSI), 12 (MISO), 13 (SCK). These pins support SPI
communication, which although provided by the underlying hardware, is not
currently included in the Arduino language.
 LED: 13. There is a built-in LED connected to digital pin 13. When the pin is HIGH
value, the LED is on, when the pin is LOW, it's off.
The Uno has 6 analog inputs, each of which provide 10 bits of resolution (i.e. 1024 different
values). By default they measure from ground to 5 volts, though is it possible to change the
upper end of their range using the AREF pin and the analog Reference() function.
Additionally, some pins have specialized functionality:

 I2C: 4 (SDA) and 5 (SCL). Support I2C (TWI) communication using the Wire
library.
There are a couple of other pins on the board:
 AREF. Reference voltage for the analog inputs. Used with analog Reference().
 Reset. Bring this line LOW to reset the microcontroller. Typically used to add a reset
button to shields which block the one on the board.
Communication:

The Arduino Uno has a number of facilities for communicating with a computer,
another Arduino, or other microcontrollers. The ATmega328 provides UART TTL (5V) serial
communication, which is available on digital pins 0 (RX) and 1 (TX). An ATmega8U2 on the
board channels this serial communication over USB and appears as a virtual com port to
software on the computer. The '8U2 firmware uses the standard USBCOM drivers, and no
external driver is needed. However, on Windows, an *.inf file is required. The Arduino
software includes a serial monitor which allows simple textual data to be sent to and from the
Arduino board. The RX and TX LEDs on the board will flash when data is being transmitted
via the USB-to serial chip and USB connection to the computer (but not for serial
communication on pins 0 and 1). A Software Serial library allows for serial communication
on any of the Uno's digital pins. The ATmega328 also support I2C (TWI) and SPI
communication. The Arduino software includes a Wire library to simplify use of the I2C bus

4.1.3 ARDUINO UNO BOARD:

The Arduino Uno is a microcontroller board based on the ATmega328. It has 14


digital input/output pins (of which 6 can be used as PWM outputs), 6 analog inputs, a 16
MHz ceramic resonator, a USB connection, a power jack, an ICSP header, and a reset button.
It contains everything needed to support the microcontroller; simply connect it to a computer
with a USB cable or power it with a AC-to-DC adapter or battery to get started.
Figure 4.1: Arduino uno board

The Uno differs from all preceding boards in that it does not use the FTDI USB-to-
serial driver chip. Instead, it features the Atmega16U2 (Atmega8U2 up to version R2)
programmed as a USB-to-serial converters.

[Link] Technical Specifications:

Table 4.1: Arduino uno specifications


The Arduino Uno can be powered via the USB connection or with an external power
supply. The power source is selected automatically. External (non-USB) power can come
either from an AC-to-DC adapter (wall-wart) or battery. The adapter can be connected by
plugging a 2.1mm center-positive plug into the board's power jack. Leads from a battery can
be inserted in the Gnd and Vin pin headers of the POWER connector. The board can operate
on an external supply of 6 to 20 volts. If supplied with less than 7V, however, the 5V pin may
supply less than five volts and the board may be unstable. If using more than 12V, the voltage
regulator may overheat and damage the board. The recommended range is 7 to 12 volts.

[Link] Interface:

Arduino board can be powered by using the USB cable from your computer. All you
need to do is connect the USB cable to the USB connection

[Link] power supply:

Arduino boards can be powered directly from the AC mains power supply by
connecting it to the power supply (Barrel Jack)

[Link] Regulator:

The function of the voltage regulator is to control the voltage given to the Arduino
board and stabilize the DC voltages used by the processor and other elements.

[Link] Oscillator:

The crystal oscillator helps Arduino in dealing with time issues. How does Arduino
calculate time? The answer is, by using the crystal oscillator. The number printed on top of
the Arduino crystal is 16.000H9H. It tells us that the frequency is 16,000,000 Hertz or 16
MHz.

[Link] Reset:

It can reset your Arduino board, i.e., start your program from the beginning. It can
reset the UNO board in two ways. First, by using the reset button (17) on the board. Second,
you can connect an external reset button to the Arduino pin labelled RESET (5).

[Link] (3.3, 5, GND, Vin):

 3.3V (6): Supply 3.3 output volt


 5V (7): Supply 5 output volt
 Most of the components used with Arduino board works fine with 3.3 volt
and 5 volt.
 GND (8)(Ground): There are several GND pins on the Arduino, any of which can
be used to ground your circuit.
 Vin (9): This pin also can be used to power the Arduino board from an
external power source, like AC mains power supply.

[Link] pins:

The Arduino UNO board has five analog input pins A0 through A5. These pins can
read the signal from an analog sensor like the humidity sensor or temperature sensor and
convert it into a digital value that can be read by the microprocessor.

[Link] microcontroller:

Each Arduino board has its own microcontroller (11). You can assume it as the brain
of your board. The main IC (integrated circuit) on the Arduino is slightly different from board
to board. The microcontrollers are usually of the ATMEL Company. You must know what IC
your board has before loading up a new program from the Arduino IDE. This information is
available on the top of the IC. For more details about the IC construction and functions, you
can refer to the data sheet.

The Atmega8U2 programmed as a USB-to-serial converter. "Uno" means "One" in


Italian and is named to mark the upcoming release of Arduino 1.0. The Uno and version 1.0
will be the reference versions of Arduino, moving forward. The Uno is the latest in a series of
USB Arduino boards, and the reference model for the Arduino platform; for a comparison
with previous versions, see the index of Arduino boards
Figure 4.2: Pin diagram

[Link] Pin Description:

VCC: Digital supply voltage.

GND: Ground.

Port B (PB [7:0]) XTAL1/XTAL2/TOSC1/TOSC2:

Port B is an 8-bit bi-directional I/O port with internal pull-up resistors (selected for
each bit). The Port B output buffers have symmetrical drive characteristics with both high
sink and source capability. As inputs, Port B pins that are externally pulled low will source
current if the pull-up resistors are activated. The Port B pins are tri-stated when a reset
condition becomes active, even if the clock is not running.

Depending on the clock selection fuse settings, PB6 can be used as input to the
inverting Oscillator amplifier and input to the internal clock operating circuit.

Depending on the clock selection fuse settings, PB7 can be used as output from the
inverting Oscillator amplifier.
If the Internal Calibrated RC Oscillator is used as chip clock source, PB[7:6] is used
as TOSC[2:1] input for the Asynchronous Timer/Counter2 if the AS2 bit in ASSR is set.

Port C (PC[5:0]):

Port C is a 7-bit bi-directional I/O port with internal pull-up resistors (selected for
each bit). The PC[5:0] output buffers have symmetrical drive characteristics with both high
sink and source capability. As inputs,

Port C pins that are externally pulled low will source current if the pull-up resistors
are activated. The Port C pins are tri-stated when a reset condition becomes active, even if the
clock is not running.

PC6/RESET:

If the RSTDISBL Fuse is programmed, PC6 is used as an I/O pin. Note that the
electrical characteristics of PC6 differ from those of the other pins of Port C.

If the RSTDISBL Fuse is unprogrammed, PC6 is used as a Reset input. A low level on
this pin for longer than the minimum pulse length will generate a Reset, even if the clock is
not running. Shorter pulses are not guaranteed to generate a Reset.

Port D (PD[7:0]):

Port D is an 8-bit bi-directional I/O port with internal pull-up resistors (selected for
each bit). The Port D output buffers have symmetrical drive characteristics with both high
sink and source capability. As inputs, Port D pins that are externally pulled low will source
current if the pull-up resistors are activated. The Port D pins are tri-stated when a reset
condition becomes active, even if the clock is not running.

AVCC: AVCC is the supply voltage pin for the A/D Converter, PC[3:0], and PE[3:2]. It
should be externally connected to VCC, even if the ADC is not used. If the ADC is used, it
should be connected to VCC through a low-pass filter. Note that PC[6:4] use digital supply
voltage, VCC.

AREF: AREF is the analog reference pin for the A/D Converter.

ADC [7:6] (TQFP and VFQFN Package Only): In the TQFP and VFQFN package,
ADC[7:6] serve as analog inputs to the A/D converter. These pins are powered from the
analog supply and serve as 10-bit ADC channels.
ICSP pin: Mostly, ICSP (12) is an AVR, a tiny programming header for the Arduino
consisting of MOSI, MISO, SCK, RESET, VCC, and GND. It is often referred to as an SPI
(Serial Peripheral Interface), which could be considered as an "expansion" of the output.
Actually, you are slaving the output device to the master of the SPI bus.

Power LED indicator: This LED should light up when you plug your Arduino into a power
source to indicate that your board is powered up correctly. If this light does not turn on, then
there is something wrong with the connection.

TX and RX LEDs: On your board, you will find two labels: TX (transmit) and RX (receive).
They appear in two places on the Arduino UNO board. First, at the digital pins 0 and 1, to
indicate the pins responsible for serial communication. Second, the TX and RX led (13). The
TX led flashes with different speed while sending the serial data. The speed of flashing
depends on the baud rate used by the board. RX flashes during the receiving process.

Digital I / O: The Arduino UNO board has 14 digital I/O pins (15) (of which 6 provide PWM
(Pulse Width Modulation) output. These pins can be configured to work as input digital pins
to read logic values (0 or 1) or as digital output pins to drive different modules like LEDs,
relays, etc. The pins labeled “~” can be used to generate PWM.

AREF: AREF stands for Analog Reference. It is sometimes, used to set an external reference
voltage (between 0 and 5 Volts) as the upper limit for the analog input pinsworking.

4.2 Power Supply

Power supply is a reference to a source of electrical power. A device or system that


supplies electrical or other types of energy to an output load or group of loads is called a
power supply unit or PSU. The term is most commonly applied to electrical energy supplies,
less often to mechanical ones, and rarely to others

This power supply section is required to convert AC signal to DC signal and also to
reduce the amplitude of the signal. The available voltage signal from the mains is 230V/50Hz
which is an AC voltage, but the required is DC voltage (no frequency) with the amplitude of
+5V and +12V for various applications.

In this section we have Transformer, Bridge rectifier, are connected serially and
voltage regulators for +5V and +12V (7805 and 7812) via a capacitor (1000µF) in parallel are
connected parallel as shown in the circuit diagram below. Each voltage regulator output is
again is connected to the capacitors of values (100µF, 10µF, 1 µF, 0.1 µF) are connected
parallel through which the corresponding output (+5V or +12V) are taken into consideration.

Circuit Explanation

1) Transformer
A transformer is a device that transfers electrical energy from one circuit to another through
inductively coupled electrical conductors. A changing current in the first circuit (the primary)
creates a changing magnetic field; in turn, this magnetic field induces a changing voltage in
the second circuit (the secondary). By adding a load to the secondary circuit, one can make
current flow in the transformer, thus transferring energy from one circuit to the other.

The secondary induced voltage VS, of an ideal transformer, is scaled from the primary
VP by a factor equal to the ratio of the number of turns of wire in their respective windings:

Basic principle

The transformer is based on two principles: firstly, that an electric current can produce
a magnetic field (electromagnetism) and secondly that a changing magnetic field within a coil
of wire induces a voltage across the ends of the coil (electromagnetic induction). By changing
the current in the primary coil, it changes the strength of its magnetic field; since the
changing magnetic field extends into the secondary coil, a voltage is induced across the
secondary.
A simplified transformer design is shown below. A current passing through the
primary coil creates a magnetic field. The primary and secondary coils are wrapped around a
core of very high magnetic permeability, such as iron; this ensures that most of the magnetic
field lines produced by the primary current are within the iron and pass through the secondary
coil as well as the primary coil.

An ideal step-down transformer showing magnetic flux in the core

Induction law

The voltage induced across the secondary coil may be calculated from Faraday's law
of induction, which states that:

Where VS is the instantaneous voltage, NS is the number of turns in the secondary coil
and Φ equals the magnetic flux through one turn of the coil. If the turns of the coil are
oriented perpendicular to the magnetic field lines, the flux is the product of the magnetic field
strength B and the area A through which it cuts. The area is constant, being equal to the
cross-sectional area of the transformer core, whereas the magnetic field varies with time
according to the excitation of the primary. Since the same magnetic flux passes through both
the primary and secondary coils in an ideal transformer, the instantaneous voltage across the
primary winding equals

Taking the ratio of the two equations for VS and VP gives the basic equation for
stepping up or stepping down the voltage

Ideal power equation

If the secondary coil is attached to a load that allows current to flow, electrical power
is transmitted from the primary circuit to the secondary circuit. Ideally, the transformer is
perfectly efficient; all the incoming energy is transformed from the primary circuit to the
magnetic field and into the secondary circuit. If this condition is met, the incoming electric
power must equal the outgoing power.

P incoming = IPVP = P outgoing = ISVS

giving the ideal transformer equation


Pin-coming = IPVP = Pout-going = ISVS

giving the ideal transformer equation

If the voltage is increased (stepped up) (VS > VP), then the current is decreased
(stepped down) (IS < IP) by the same factor. Transformers are efficient so this formula is a
reasonable approximation.

If the voltage is increased (stepped up) (VS > VP), then the current is decreased
(stepped down) (IS < IP) by the same factor. Transformers are efficient so this formula is a
reasonable approximation.

The impedance in one circuit is transformed by the square of the turns ratio. For
example, if an impedance ZS is attached across the terminals of the secondary coil, it appears
to the primary circuit to have an impedance

This relationship is reciprocal, so that the impedance ZP of the primary circuit appears
to the secondary to be

Detailed operation

The simplified description above neglects several practical factors, in particular the
primary current required to establish a magnetic field in the core, and the contribution to the
field due to current in the secondary circuit.

Models of an ideal transformer typically assume a core of negligible reluctance with


two windings of zero resistance. When a voltage is applied to the primary winding, a small
current flows, driving flux around the magnetic circuit of the core. The current required to
create the flux is termed the magnetizing current; since the ideal core has been assumed to
have near-zero reluctance, the magnetizing current is negligible, although still required to
create the magnetic field.

The changing magnetic field induces an electromotive force (EMF) across each
winding. Since the ideal windings have no impedance, they have no associated voltage drop,
and so the voltages VP and VS measured at the terminals of the transformer, are equal to the
corresponding EMFs. The primary EMF, acting as it does in opposition to the primary
voltage, is sometimes termed the "back EMF". This is due to Lenz's law which states that the
induction of EMF would always be such that it will oppose development of any such change
in magnetic field.

4.3 Bridge Rectifier

A diode bridge or bridge rectifier is an arrangement of four diodes in a bridge


configuration that provides the same polarity of output voltage for any polarity of input
voltage. When used in its most common application, for conversion of alternating current
(AC) input into direct current (DC) output, it is known as a bridge rectifier. A bridge rectifier
provides full-wave rectification from a two-wire AC input, resulting in lower cost and weight
as compared to a center-tapped transformer design, but has two diode drops rather than one,
thus exhibiting reduced efficiency over a center-tapped design for the same output
voltage.

Basic Operation

When the input connected at the left corner of the diamond is positive with respect to
the one connected at the righthand corner, current flows to the right along the upper colored
path to the output, and returns to the input supply via the lower one. When the righthand
corner is positive relative to the lefthand corner, current flows along the upper colored path
and returns to the supply via the lower colored path.

In each case, the upper right output remains positive with respect to the lower right
one. Since this is true whether the input is AC or DC, this circuit not only produces DC
power when supplied with AC power: it also can provide what is sometimes called "reverse
polarity protection". That is, it permits normal functioning when batteries are installed
backwards or DC input-power supply wiring "has its wires crossed" (and protects the
circuitry it powers against damage that might occur without this circuit in place).

Prior to availability of integrated electronics, such a bridge rectifier was always


constructed from discrete components. Since about 1950, a single four-terminal component
containing the four diodes connected in the bridge configuration became a standard
commercial component and is now available with various voltage and current ratings.
Output smoothing (Using Capacitor)

For many applications, especially with single phase AC where the full-wave bridge
serves to convert an AC input into a DC output, the addition of a capacitor may be important
because the bridge alone supplies an output voltage of fixed polarity but pulsating magnitude
(see diagram above).

The function of this capacitor, known as a reservoir capacitor (aka smoothing


capacitor) is to lessen the variation in (or 'smooth') the rectified AC output voltage waveform
from the bridge. One explanation of 'smoothing' is that the capacitor provides a low
impedance path to the AC component of the output, reducing the AC voltage across, and AC
current through, the resistive load. In less technical terms, any drop in the output voltage and
current of the bridge tends to be cancelled by loss of charge in the capacitor.

This charge flows out as additional current through the load. Thus the change of load
current and voltage is reduced relative to what would occur without the capacitor. Increases
of voltage correspondingly store excess charge in the capacitor, thus moderating the change
in output voltage / current. Also see rectifier output smoothing.

The simplified circuit shown has a well deserved reputation for being dangerous,
because, in some applications, the capacitor can retain a lethal charge after the AC power
source is removed. If supplying a dangerous voltage, a practical circuit should include a
reliable way to safely discharge the capacitor. If the normal load cannot be guaranteed to
perform this function, perhaps because it can be disconnected, the circuit should include a
bleeder resistor connected as close as practical across the capacitor. This resistor should
consume a current large enough to discharge the capacitor in a reasonable time, but small
enough to avoid unnecessary power waste.

Because a bleeder sets a minimum current drain, the regulation of the circuit, defined
as percentage voltage change from minimum to maximum load, is improved. However in
many cases the improvement is of insignificant magnitude.

The capacitor and the load resistance have a typical time constant τ = RC where C and
R are the capacitance and load resistance respectively. As long as the load resistor is large
enough so that this time constant is much longer than the time of one ripple cycle, the above
configuration will produce a smoothed DC voltage across the load.

In some designs, a series resistor at the load side of the capacitor is added. The
smoothing can then be improved by adding additional stages of capacitor–resistor pairs, often
done only for sub-supplies to critical high-gain circuits that tend to be sensitive to supply
voltage noise.

The idealized waveforms shown above are seen for both voltage and current when the
load on the bridge is resistive. When the load includes a smoothing capacitor, both the
voltage and the current waveforms will be greatly changed. While the voltage is smoothed, as
described above, current will flow through the bridge only during the time when the input
voltage is greater than the capacitor voltage. For example, if the load draws an average
current of n Amps, and the diodes conduct for 10% of the time, the average diode current
during conduction must be 10n Amps. This non-sinusoidal current leads to harmonic
distortion and a poor power factor in the AC supply.

In a practical circuit, when a capacitor is directly connected to the output of a bridge,


the bridge diodes must be sized to withstand the current surge that occurs when the power is
turned on at the peak of the AC voltage and the capacitor is fully discharged. Sometimes a
small series resistor is included before the capacitor to limit this current, though in most
applications the power supply transformer's resistance is already sufficient.

Output can also be smoothed using a choke and second capacitor. The choke tends to
keep the current (rather than the voltage) more constant. Due to the relatively high cost of an
effective choke compared to a resistor and capacitor this is not employed in modern
equipment.

Some early console radios created the speaker's constant field with the current from
the high voltage ("B +") power supply, which was then routed to the consuming circuits,
(permanent magnets were considered too weak for good performance) to create the speaker's
constant magnetic field. The speaker field coil thus performed 2 jobs in one: it acted as a
choke, filtering the power supply, and it produced the magnetic field to operate the speaker.

1) Voltage Regulator
A voltage regulator is an electrical regulator designed to automatically maintain a
constant voltage level.

The 78xx (also sometimes known as LM78xx) series of devices is a family of self-
contained fixed linear voltage regulator integrated circuits. The 78xx family is a very popular
choice for many electronic circuits which require a regulated power supply, due to their ease
of use and relative cheapness. When specifying individual ICs within this family, the xx is
replaced with a two-digit number, which indicates the output voltage the particular device is
designed to provide (for example, the 7805 has a 5 volt output, while the 7812 produces 12
volts). The 78xx line is positive voltage regulators, meaning that they are designed to produce
a voltage that is positive relative to a common ground. There is a related line of 79xx devices
which are complementary negative voltage regulators. 78xx and 79xx ICs can be used in
combination to provide both positive and negative supply voltages in the same circuit, if
necessary

78xx ICs have three terminals and are most commonly found in the TO220 form
factor, although smaller surface-mount and larger TrO3 packages are also available from
some manufacturers. These devices typically support an input voltage which can be anywhere
from a couple of volts over the intended output voltage, up to a maximum of 35 or 40 volts,
and can typically provide up to around 1 or 1.5 amps of current (though smaller or larger
packages may have a lower or higher current rating).
4.4 GPS (GLOBAL POSITIONING SYSTEM)

Global Positioning System, or GPS, is a satellite-based navigation system that offers accurate
time and position data anywhere on Earth. It comprises of a system of orbiting satellites,
receivers on the ground, and satellite signals decoders. The US Department of Defence
created and maintains the GPS system, which has primarily military uses. But citizens now
have easy access to it and utilize it for a variety of things. By estimating the distance
between the receiver and the satellites using the time it takes for the signals to reach the
receiver, GPS receivers employ signals from numerous satellites to pinpoint the receiver's
precise location. Trilateration is the name given to this procedure. GPS has a wide range of
uses across many different fields and industries. Mobile phones, tablets, and wearable
technology all have GPS built in, enabling location-based applications like mapping,
geolocation, and real-time navigation. Additionally, GPS is used in logistics and
transportation management to track shipments, improve fleet management, and optimize
routes. It is essential for surveying, mapping, and geodesy because it enables precise
measurements of topographic characteristics and land [Link] is used by emergency
services, especially search and rescue operations, to find people in need and coordinate
rescue activities. In addition, it is used for environmental monitoring, weather
forecasting, and scientific study. GPS has revolutionized how we navigate and comprehend
our surroundings, enhancing safety, streamlining transportation, and allowing cutting-edge
applications. It has developed into a necessary tool for both personal and professional usage,
making a variety of tasks more convenient, effective, and accurate. The Global Positioning
System (GPS) Internet of Things (IoT) system combines the capabilities of GPS technology
with IoT to provide real-time tracking, localization, and remote monitoring of assets,
vehicles, and people. This technology uses IoT connections and GPS receivers to give
precise positioning and tracking of people or objects anywhere on Earth. GPS satellites give
the position data, which is subsequently wirelessly sent to a centralized platform for
processing and monitoring. Users can access GPS data remotely through IoT connections and
utilize web- or mobile-based applications to track the movements of items, automobiles, or
people in real-time. This improves visibility and makes it possible to geofence, track assets,
optimize routes, and coordinate emergency response. The system can also work with other
IoT gadgets and sensors to give thorough automation and monitoring. For instance, it may be
connected to temperature sensors to keep an eye on shipments that are temperature-sensitive
while they are being transported. Machine learning algorithms and data analysis.
4.5 NodeMCU 0.9

Pin mapping

Pin numbers written on the board itself do not correspond to ESP8266 GPIO
pin numbers. Constants are defined to make using this board easier:

static const uint8_t D0 = 16;


static const uint8_t D1 = 5;
static const uint8_t D2 = 4;
static const uint8_t D3 = 0;
static const uint8_t D4 = 2;
static const uint8_t D5 = 14;
static const uint8_t D6 = 12;
static const uint8_t D7 = 13;
static const uint8_t D8 = 15;
static const uint8_t D9 = 3;
static const uint8_t D10 = 1;

If you want to use NodeMCU pin 5, use D5 for pin number, and it will be translated to
‘real’ GPIO pin 14.

NodeMCU 1.0

This module is sold under many names for around $6.50 on AliExpress and
it’s one of the cheapest, fully integrated ESP8266 solutions. It’s an open
hardware design with an ESP-12E core and 4 MB of SPI flash. Acording to
the manufacturer, “with a micro USB cable, you can connect NodeMCU
devkit to your laptop and flash it without any trouble”. This is more or less
true: the board comes with a CP2102 onboard USB to serial adapter which just
works, well, the majority of the time. Sometimes flashing fails and you have to
reset the board by holding down FLASH + RST, then releasing FLASH, then
releasing RST. This forces the CP2102 device to power cycle and to be re-
numbered by Linux.
The board also features a NCP1117 voltage regulator, a blue LED on
GPIO16 and a 220k/100k Ohm voltage divider on the ADC input pin.

Olimex MOD-WIFI-ESP8266-DEV

This board comes with 2 MB of SPI flash and optional accessories (e.g.
evaluation board ESP8266-EVB or BAT-BOX for batteries). The basic
module has three solder jumpers that allow you to switch the operating mode
between SDIO, UART and FLASH. The board is shipped for FLASH
operation mode, with jumpersTD0JP=0, IO0JP=1,IO2JP=1.
4.6 GEOFENCING

Geofencing (geofencing) is an immensely useful and major feature of the software program,
it uses global positioning system (GPS) or radio frequency identification (RFID) to define the
characteristics of geographic boundaries. In fact, we can say that the geofence is a virtual
barrier. Geofencing is an innovative technology, an online market that provides active
contextual services, allowing users to easily find services of interest can easily subscribe and
allow providers to provide services for various applications, such as electronic billing,
contextual advertising or a tourism information system, even without additional
infrastructure. The main goal of this study is to understand how the use of spatial data can
improve advertising effectiveness for clients. The tracking and monitoring system is based on
global navigation satellite services, including geofencing functions, and can also contribute to
the accurate location of organizations or companies, and effectively hike up sales and
business prospects can now advertise on smartphones that have been inexpensively and
accurately tested instead of large billboards. Keywords: Geofencing, GPS, Geolocation,
Geofence, Geotification, Geo-Tourist Guide, Location-Based Services
The popularity of location-based services (LBS) has changed dramatically these days. The
first generation of LBS has been of great interest in the last few years. Knowledge of the
geographic location of mobile devices. Geographic information is used in many areas such as
computer software and physical security. In this case, most of the existing technology uses
GPS (Global Positioning System) to focus on pinpointing the user's exact position in an
outdoor environment. Another view of location-aware computing would focus on the user's
presence at the virtual boundary of a particular geographic landscape. The second alternative
view is a supplement to the first view called geofencing, and it offers many advantages. A
geofence refers to a geographic area of a virtual fence. According to almomani (2011). The
concept has been used to perform a variety of tasks, including anti-theft and tracking of
equipment, and automatic home surveillance systems. Social media also offers new ideas and
use cases for location-based services, including geographic networks. We are also working on
various technologies to improve the robustness and safety of these systems. The focus of
these studies is to develop a geofence system of geofence applications of robbery
management, house arrest, and accident management using Android smartphones. The goals
include: a) Develop an automated system that uses GPS technology to identify thefts in
specific geo-fenced areas. b) Analyse the importance of the geofencing system. Geofencing
combines the knowledge of the user's current location with the knowledge of the proximity of
the user to the location of possible interest. To mark a location of interest, specify its latitude
and longitude. To adjust the proximity of the position, add a radius. Latitude, longitude, and
radius define the geofence, creating a circular area around the location of interest, or nearby.

A geofence is a virtual limit of a real geographic area. It can be a radius around the location
or a set of predefined boundaries. Plot Research allows you to create geofences with a radius
of 50 to 50,000 meters. The process of using geofencing is called geofencing. Geofences
allow you to send notifications (for example) when users of your application are near a store.
Geofencing is a virtual barrier program that allows an administrator to set a trigger to send a
text message or email alert when a device enters or exits an administrator-defined limit.
Geofencing technology Geofencing has many features, including monitoring mobile assets
and people in geographic areas, which can benefit in many areas. Various geo-fencing
technologies have been developed to meet different real-world needs. The main technologies
are as follows.

[Link] Area :

This technology provides automatic control of moving objects moving on or around the
geofence area. An alert was issued when the cell phone entered and exited the border. The
size of the area varies from tens of meters to several kilometres. The shape of the geofence
can be a simple geometric figure such as a square or rectangle, or a complex shape such as a
complex polygon.

[Link] to a point of interest:

This technology is designed to detect the proximity of a vehicle related to a point of interest
(POI). In fact, the geofence is circles and the POI is in the centre. The radius is parameterized
according to the distance considered "close" to the POI of, from a few meters to tens of
kilometres. This method is the easiest way to implement geofencing as it only requires two
parameters, the centre coordinate and the radius value. The algorithm calculates the distance
between the moving object and the centre of the circle. Depending on whether this distance is
less than or greater than the radius value, moving objects will be considered inside or outside
the geofence, respectively.

[Link] compliance:

This technology involves monitoring moving objects throughout the journey from the
starting point to the final destination. Geo-fencing can ensure that vehicles do not stray from
their assigned route.

4.7 Panic Button System:

The gadget is equipped with panic alert system feature which mainly consist of a button that
is triggered only during certain abnormal/panic situations, this button is programmed in such
a way that, once it is triggered then multiple alerts in various forms occurs within few
seconds of time, SMS and also phone call is triggered to the parental phone from the safety
gadget GSM module to the parental phone, which consists of current location of gadget
fetched from its GPS and a pre-installed panic message seeking for help. An alert notification
on parental app is triggered via WiFi on safety gadget communicating to cloud where parental
app receives the information.

Safety gadget contains a GPS module which will fetch the current location and sends it to the
microcontroller for required processing, the safety gadget is also installed with the GSM
module to respond for location request sent via SMS from parental phone. The system is
connected to cloud via Wi-Fi technology and hence the GPS location is updated to the cloud
at regular intervals or on request, whenever parent want to monitor the location of safety
device then parental app can be used which fetches all the data from the updated cloud and
also display the current/live location of the safety gadget.

WEB USER INTERFACE:

The proposed system of CHILD PROTECTION SYSTEM will have a Mobile application
and Web application which will bring in all the mobile information of children to the
corresponding parent mobile and also to the centralized server. Espresso's ESP32EX delivers
highly integrated Wi-Fi SoC solution to meet users’ continuous demands for efficient power
usage, compact design and reliable performance in the Internet of Things industry. With the
complete and self contained Wi-Fi networking capabilities, ESP32EX can perform either as a
standalone application or as the slave to a host MCU. When ESP32EX hosts the application,
it promptly boots up from the flash. The integrated high-speed cache helps to increase the
system performance and optimize the system memory. Also, ESP32EX can be applied to any
microcontroller design as a Wi-Fi adaptor through SPI / SDIO or I2C / UART interfaces.
ESP32EX integrates antenna switches, RF balun, power amplifier, low noise receives
amplifier, filters and power management modules. The compact design minimizes the PCB
size and requires minimal external circuitries. Besides the Wi-Fi functionalities, ESP32EX
also integrates an enhanced version of Tensilica’s L106 Diamond series 32-bit processor and
on-chip SRAM. It can be interfaced with external sensors and other devices through the
GPIOs. Software Development Kit (SDK) provides sample codes for various applications.
Espresso Systems’ Smart Connectivity Platform (ESCP) enables sophisticated features
including fast switch between sleep and wakeup mode for energy efficient purpose, adaptive
radio biasing for low-power operation, advance signal processing, spur cancellation and radio
co-existence mechanisms for common cellular, Bluetooth, DDR, LVDS, LCD interference
mitigation.
4.8 ARDUINO SOFTWARE INSTALLATION

Arduino IDE (Integrated Development Environment) is required to program the Arduino


Uno board.

PROGRAMMING ARDUINO

Once Arduino IDE is installed on the computer, connect the board with computer using USB
cable. Now open the Arduino IDE and choose the correct board by selecting
Tools>Boards>Arduino Uno, and choose the correct Port by selecting Tools>Port. Arduino
Uno is programmed using Arduino programming language based on Wiring. To get it started
with Arduino Uno board and blink the built-in LED, load the example code by selecting
Files>Examples>Basics>Blink. Once the example code (also shown below) is loaded into
your IDE, click on the ‘upload’ button given on the top bar. Once the upload is finished, you
should see the Arduino’s built-in LED blinking. Below is the example code for blinking:

ARDUINO – INSTALLATION

After learning about the main parts of the Arduino UNO board, we are ready to learn how to
set up the Arduino IDE. Once we learn this, we will be ready to upload our program on the
Arduino board.

In this section, we will learn in easy steps, how to set up the Arduino IDE on our computer
and prepare the board to receive the program via USB cable.

Step 1: First you must have your Arduino board (you can choose your favorite board) and a
USB cable. In case you use Arduino UNO, Arduino Duemilanove, Nano, Arduino Mega
2560, or Diecimila, you will need a standard USB cable (A plug to B plug), the kind you
would connect to a USB printer as shown in the following image.

In case you use Arduino Nano, you will need an A to Mini-B cable instead as shown in the
following image
Step 2: Download Arduino IDE Software.

You can get different versions of Arduino IDE from the Download page on the Arduino
Official website. You must select your software, which is compatible with your operating
system (Windows, IOS, or Linux). After your file download is complete, unzip the file.

Step 3: Power up your board.

The Arduino Uno, Mega, Duemilanove and Arduino Nano automatically draw power from
either, the USB connection to the computer or an external power supply. If you are using an
Arduino Diecimila, you have to make sure that the board is configured to draw power from
the USB connection. The power source is selected with a jumper, a small piece of plastic
that fits onto two of the three pins between the USB and power jacks. Check that it is on the
two pins closest to the USB port.

Connect the Arduino board to your computer using the USB cable. The green power LED
(labeled PWR) should glow.

Step 4: Launch Arduino IDE.

After your Arduino IDE software is downloaded, you need to unzip the folder. Inside the
folder, you can find the application icon with an infinity label ([Link]). Doubleclick
the icon to start the IDE
Step 5: Open your first project.

Once the software starts, you have two options:

 Create a new project.

 Open an existing project example.

To create a new project, select File --> New

To open an existing project example, select File -> Example -> Basics -> Blink.

Here, we are selecting just one of the examples with the name Blink. It turns the LED on and
off with some time delay. You can select any other example from the list.
Step 6: Select your Arduino board.

To avoid any error while uploading your program to the board, you must select the correct
Arduino board name, which matches with the board connected to your computer.

Go to Tools -> Board and select your board.

Here, we have selected Arduino Uno board according to our tutorial, but you must select the
name matching the board that you are using.

Step 7: Select your serial port.

Select the serial device of the Arduino board. Go to Tools -> Serial Port menu. This is likely
to be COM3 or higher (COM1 and COM2 are usually reserved for hardware serial ports). To
find out, you can disconnect your Arduino board and re-open the menu, the entry that
disappears should be of the Arduino board. Reconnect the board and select that serial port.

Step 8: Upload the program to your board.

Before explaining how we can upload our program to the board, we must demonstrate the
function of each symbol appearing in the Arduino IDE toolbar
A- Used to check if there is any compilation error.

B- Used to upload a program to the Arduino board.

C- Shortcut used to create a new sketch.

D- Used to directly open one of the example sketch.

E- Used to save your sketch.

F- Serial monitor used to receive serial data from the board and send the serial data to the
board.

Now, simply click the "Upload" button in the environment. Wait a few seconds; you will see
the RX and TX LEDs on the board, flashing. If the upload is successful, the message "Done
uploading" will appear in the status bar.

Note: If you have an Arduino Mini, NG, or other board, you need to press the reset button
physically on the board, immediately before clicking the upload button on the Arduino
Software.
CHAPTER 5

RESULTS

PROPOSED KIT:

WORKING WITH GPS LIVE LOCATION:


RESULT: ALERTING MESSAGE VIA EMAIL

And a link is provided for live location of their child.


CHAPTER 6

FUTURE SCOPE
The IoT-based safety gadget for child monitoring and notification has immense potential for
future advancements, with various opportunities to enhance its functionality, scalability, and
user experience. One promising avenue is the integration of artificial intelligence (AI) and
machine learning (ML) algorithms to improve the system's capabilities. By leveraging
predictive analytics, the system could analyze patterns in the child’s location data or vital
signs to predict potential risks, such as deviations from usual routes or abnormal health
trends, and notify caregivers proactively. Another area for improvement is the incorporation
of advanced biometric authentication techniques. For example, fingerprint or facial
recognition modules could be integrated into the system, ensuring that only authorized
individuals can deactivate alarms or access critical information. This would provide an
additional layer of security, safeguarding sensitive data and preventing unauthorized access.
The system could also benefit from enhanced connectivity and interoperability. Upgrading to
5G networks and adopting edge computing technologies can significantly reduce data
transmission latency and improve real-time responsiveness, even in remote or rural areas with
limited network coverage. Additionally, interoperability with smart home devices and
existing IoT ecosystems could enable seamless integration into broader safety frameworks,
such as connecting the gadget to home security systems or parental control applications.

Furthermore, the addition of environmental monitoring features could expand the system’s
scope. Sensors capable of detecting environmental hazards, such as air quality, temperature
extremes, or proximity to dangerous areas, could provide valuable safety insights and further
enhance the device’s utility. For example, alerts for entering high-traffic zones or hazardous
environments could be incorporated to keep the child safe in a wider range of scenarios. The
future scope also includes exploring energy-efficient designs and sustainable materials for the
hardware components. Solar-powered modules or energy-harvesting techniques could be
employed to extend battery life and reduce the system's dependency on frequent recharging.
This would make the device more reliable for long-term use, especially during outdoor
activities.

Finally, scaling the system for broader applications can greatly expand its impact. The core
design can be adapted for other vulnerable groups, such as elderly individuals, individuals
with disabilities, or pets, addressing their specific safety and monitoring needs. Additionally,
the system could be enhanced with multilingual support and customizable features to cater to
diverse user demographics across different regions and cultures. By pursuing these
advancements, the IoT-based safety gadget can evolve into a comprehensive, intelligent, and
versatile safety management system, ensuring not only child safety but also contributing to
the broader goal of enhancing security and well-being in society.
CONCLUSION

While Google maps can also be used to observe and monitor the children's locations, the
intended method provides a more effective way to do so. Being safe and secure has the added
benefit of reducing child abuse, which is today's responsibility. The main task of this project
aims to design and build a little device that benefits from its own safety mechanism,
especially for children. This design is suggested as a solution to the majority of risky conflicts
faced by kids and will aid in their protection. With real-time location tracking, it can be used
to find misplaced children at any moment and notify their guardian or parent. In order to
combat GSM, the Arduino module incorporates a pulse detector and a Piezoelectric
accelerator in addition to using IT to increase communication. If a child abuse occurs, an
instant message with the location is sent to listed contacts and the nearby police stations are
immediately rescued.
REFERENCES

[1] McNally, B., Kumar, P., Hordatt, C., Mauriello, M. L., Naik, S.,Norooz, L., & Druin, A.
(2018, April). Co-designing mobile online safety applications with children. In Proceedings
of the 2018 CHI Conference on Human Factors in Computing Systems (pp. 1-9).

[2] Benisha, M., Prabu, R. T., Gowri, M., Vishali, K., Anisha, M.,Chezhiyan, P., & Elliot, C.
J. (2021, February). Design of Wearable Device for Child Safety. In 2021 Third International
Conference on Intelligent Communication Technologies and Virtual Mobile Networks
(ICICV) (pp. 1076-1080). IEEE.

[3] Jatti, A., Kannan, M., Alisha, R. M., Vijayalakshmi, P., & Sinha, S.(2016, May). Design
and development of an IOT based wearable device for the safety and security of women and
girl children. In 2016 IEEE International Conference on Recent Trends in Electronics,
Information & Communication Technology (RTEICT) (pp. 1108-1112). IEEE.

[4] Thamaraimanalan, T., Vivekk, S. P., Satheeshkumar, G., & Saravanan, P. (2018). Smart
garden monitoring system using [Link] Journal of Applied Science and Technology
(AJAST), 2(2),186-192.

[5] R. R. Oliveira, I. M. G. Cardoso, J. L. V Barbosa, C. A. da Costa,and M. P. Prado, “An


intelligent model for logistics management based on geofencing algorithms and RFID
technology,” Expert Syst. Appl., vol. 42, no. 15, pp. 6082–6097, 2015.

[6] R. Passarella, S. P. Raflesia, D. Lestarini, A. Rifai, and H. Veny,“MISSIONS: The Mobile-


Based Disaster Mitigation System inIndonesia,” J. Phys. Conf. Ser., vol. 1007, no. 1, p.
12033, 2018.

[7] Thamaraimanalan, T., Mohankumar, M., Dhanasekaran, S., & Anandakumar, H. (2021).
Experimental analysis of intelligent vehicle monitoring system using Internet of Things (IoT).
EAI Endorsed Transactions on Energy Web, 8(36).

[8] J. Helmy and A. Helmy, “The Alzimio App for Dementia, Autism & Alzheimer’ s: Using
Novel Activity Recognition Algorithms and Geofencing,” 2016.

[9] L. A. Schmidt and L. Riegger, “Moving geofence for machine tracking in agriculture.”
Google Patents, 2015.
[10] Winblad, B., Amouyel, P., Andrieu, S., Ballard, C., Brayne, C., Brodaty, H., ... &
Zetterberg, H. (2016). Defeating Alzheimer's disease and other dementias: a priority for
European science and society. The Lancet Neurology, 15(5), 455-532.

[11] Premkumar, M., Jeevanantham, V., & Anupallavi, S. (2021,November). Design of an


EEG-based transceiver with data decomposition for IoHT applications. In 2021 Fifth
International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (ISMAC)
(pp.258-262).IEEE.
APPENDIX

LCD CODE:
#include <LiquidCrystal.h>
const int rs = 7, en = 6, d4 = 5, d5 = 4, d6 = 3, d7 = 2;
LiquidCrystal lcd(rs, en, d4, d5, d6, d7);
int panic=A0;
int buzzer=A1;
#include <SoftwareSerial.h>
#include <AltSoftSerial.h>
#include <TinyGPS++.h>
//--------------------------------------------------------------
//GPS Module RX pin to Arduino 9
//GPS Module TX pin to Arduino 8
AltSoftSerial neogps;
TinyGPSPlus gps;
boolean multiple_sms = false;
unsigned long previousMillis=0;
unsigned long int previoussecs = 0;
unsigned long int currentsecs = 0;
unsigned long currentMillis = 0;
int secs = 0;
int pmints = 0;
int mints = 0; // current mints
int interval= 1 ; // updated every 1 second
GEO FENCE CODE:
//--------------------------------------------------------------
// Size of the geo fence (in meters)
const float maxDistance = 20;
//--------------------------------------------------------------
float initialLatitude = 17.42395;//17.436121800847783, 78.44085906571763
float initialLongitude = 78.29378;

float latitude, longitude;


//--------------------------------------------------------------
void getGps(float& latitude, float& longitude);
/
***************************************************************************
**************
* setup() function

***************************************************************************
**************/
void setup()
{
pinMode(buzzer,OUTPUT);digitalWrite(buzzer,HIGH);
pinMode(panic,INPUT_PULLUP);
[Link](16, 4);
[Link]("hello, world!");delay(1000);
//--------------------------------------------------------------
//[Link]("Arduino serial initialize");
[Link](9600);
//[Link]("NEO6M serial initialize");
[Link](9600);
}
/
***************************************************************************
**************
* loop() function

***************************************************************************
**************/
void loop()
{
int panicval=digitalRead(panic);
if(panicval==LOW)
{
digitalWrite(buzzer,LOW);delay(1000);digitalWrite(buzzer,HIGH);
[Link]();[Link]("PANIC ALERT....");
String sms_data;
sms_data = "PANIC Alert! The children is outside the fence.\r";
sms_data += "[Link]
sms_data += String(latitude) + "," + String(longitude);

[Link](sms_data);delay(1000);
}
//--------------------------------------------------------------
getGps(latitude, longitude);
//--------------------------------------------------------------
float distance = getDistance(latitude, longitude, initialLatitude, initialLongitude);
//--------------------------------------------------------------
/*
[Link]("Latitude= "); [Link](latitude, 6);
[Link]("Lngitude= "); [Link](longitude, 6);
[Link]("initialLatitude= "); [Link](initialLatitude, 6);
[Link]("initialLngitude= "); [Link](initialLongitude, 6);
[Link]("current Distance= "); [Link](distance);
*/
//--------------------------------------------------------------
[Link](); [Link]("[Link]="); [Link](latitude, 5);delay(500);
[Link](0,1); [Link]("[Link]="); [Link](longitude,5 );delay(500);
[Link](0,2); [Link]("[Link]="); [Link](initialLatitude, 5);delay(500);
[Link](0,3); [Link]("[Link]="); [Link](initialLongitude, 5);delay(1000);
[Link](); [Link]("Distance From");
[Link](0,1);[Link]("Starting Point");
[Link](0,2);[Link](distance);delay(1000);

if(distance > maxDistance)


{
digitalWrite(buzzer,LOW);delay(1000);digitalWrite(buzzer,HIGH);
[Link](0,2); [Link]("ALERT...");delay(1000);
String sms_data;
sms_data = "Alert! The children is outside the fence.\r";
sms_data += "[Link]
sms_data += String(latitude) + "," + String(longitude);

[Link](sms_data);delay(1000);
}

DISTANCE:
/
***************************************************************************
**************
* getDistance() function
***************************************************************************
**************/

// Calculate distance between two points


float getDistance(float flat1, float flon1, float flat2, float flon2) {

// Variables
float dist_calc=0;
float dist_calc2=0;
float diflat=0;
float diflon=0;

// Calculations
diflat = radians(flat2-flat1);
flat1 = radians(flat1);
flat2 = radians(flat2);
diflon = radians((flon2)-(flon1));

dist_calc = (sin(diflat/2.0)*sin(diflat/2.0));
dist_calc2 = cos(flat1);
dist_calc2*=cos(flat2);
dist_calc2*=sin(diflon/2.0);
dist_calc2*=sin(diflon/2.0);
dist_calc +=dist_calc2;

dist_calc=(2*atan2(sqrt(dist_calc),sqrt(1.0-dist_calc)));

dist_calc*=6371000.0; //Converting to meters

return dist_calc;
}

/
***************************************************************************
**************
* getGps() Function
***************************************************************************
**************/
void getGps(float& latitude, float& longitude)
{
// Can take up to 60 seconds
boolean newData = false;
for (unsigned long start = millis(); millis() - start < 2000;){
while ([Link]()){
if ([Link]([Link]())){
newData = true;
break;
}
}
}

if (newData) //If newData is true


{
latitude = [Link]();
longitude = [Link]();
newData = false;
}
else {
[Link]("No GPS data is available");
latitude = 0;
longitude = 0;
}
}

You might also like