Automation Archives - Westeserve

Automation

Checking in on IoT

First, we lay a proper foundation of IoT, its various concepts, and then its capabilities or use cases. IoT is short for the Internet of Things. With the advent of wireless sensor technology, a lot of times we as individuals have inadvertently run into or used smart technology (IoT) from time to time. Our smartphones are considered smart due to their ability to respond wirelessly to signals via the internet. The concept of IoT is that manufacturers are increasingly able to fit in chips or micro-computers on a variety of products for numerous reasons ranging from flexibility to efficiency, more recent examples include a light switch with less than 1 MB of embedded memory that can communicate wirelessly with host IoT apps such as Alexa for actions ranging from ON or OFF to dimming functions. The ability for these gadgets to communicate with each other with the help of the wireless signal exchange whether it’s over the phone (via wifi), the internet, or via the cloud is called IoT. Now having set the foundation above, let’s discuss the reason why IoT has come to stay. IoT applications are far-reaching further emphasizing the fact that human interactions are increasingly becoming digitalized. The information economy capitals of the world have long viewed information as the new gold. Therefore, any human endeavor that eases the burden of carrying out a particular task be it in the area of organization, management, and processing will attract all the much-needed attention it deserves. The possibilities of IoT almost seem endless as we will see shortly. The more we try to break into newer frontiers of technology for example from the possibility of space mining to uncovering more dynamics of artificial intelligence (AI), the more IoT continues to create waves of impact. For the thinking man, there is no existing threshold, all it needs is further exploratory research and development over time. In the present, we can say for a fact that the future is mostly directed by those who are capable of embracing this opportunity and rechanneling it for the benefit of humanity. Companies whose success rate and efficiency are driven by the more data they acquire about their users are seeing IoT as the holy grail. There aren’t many complex calculations or permutations required to see that we are currently living out the solutions or answers by humanity’s forebears who first introduced the world to smart gadgets, smart buildings, and now smart cities etc. The wider reach of IoT includes but is not limited to;   Home Automation Smart Homes are becoming more popular as recent technological manufacturers are increasingly incorporating smartness into everyday gadgets or equipment. Your entire day-to-day itinerary can be planned and scheduled using a pre-arranged routine. It begins with the push of a single button and it sets the schedule for the day. Your smart refrigerator is set to auto-initiate a response to dwindling food supplies, your car is set to notify you of upcoming maintenance activity, and your smartwatch lists all activities via a voice prompt. You head out of the house prepared and the car automatically navigates through traffic allowing you time to think about more pressing needs. You get to work and the home system automatically chimes through your mobile about an unexpected visit and upon confirmation, you grant access to the visitor. The automatic security camera powered by motion technology alerts you about what is going on at home while you are away. These and many more are just some of the features that the home automation solution presents. Below are some home automation smart devices and their areas of application Home system: a home system is a software service that serves as the central IoT command point where all devices are linked to and can be used to access all functionality. It is multifunctional, it can be controlled remotely using Wi-Fi or over the internet using its custom access point. It’s used for security purposes where all locks are controlled wirelessly or manually. It can come in different configurations from different manufacturers. Dimmers: These are chips or MCUs embedded in simple light switches that enable remote access. They are responsible for the dimming operation of the lights in the home. The lights can be set to dim after leaving the room or to dim to a level of brightness. Leak detectors: These are actuators that sense different types of leakages ranging from gas leaks to water leaks. This is synced with the home system to enable timely leak detection. Thermostats: these are smart temperature readers that are also connected to the home system. It can be used for different purposes. This includes switching on the air conditioners or heaters when it senses that the temperature set point is abnormal. It can also be used when unusually high temperatures are sensed in the case of a fire outbreak. Smart Cameras: These devices are increasingly getting smaller and more sophisticated. The smaller they are, the less conspicuous they appear. This helps deter intruders and also conveniently gather evidence when the subject matter involves some level of discretion. Motion Detectors: These are sensors that detect unwanted motion and are used extensively for perimeter guiding systems. It serves as a security watchdog. Its sensitivity can be adjusted to help capture only human movement. these and many unmentioned devices are used in the implementation of IoT in homes. When we want to achieve this for the different home units in a high-rise building, we can set all devices to communicate with each other. This is where smart buildings come into the picture.   Industrial Application Industrial IoT (IIoT) refers to the application of IoT in industrial settings for the instrumentation of machinery that is geared to communicate using control sensors and devices that engage Cloud technologies. In the industrial application of IoT, we discuss about the use of these control sensors in the everyday manufacturing of goods and services and how they can be set to communicate with each other so

Checking in on IoT Read More »

How to properly diagnose and proffer solutions to real-life security needs using IoT tools.

On account of the broad nature of the topic, we will narrow our discussion to one Use Case for the sake of clarity and comprehension. To begin any process of problem solving we begin by defining it. Problem-solving is a systematic process that involves steps. Before delving into the problem-solving process let’s examine the reason or reasons why a problem is prone to recurrence; Unidentified and Underlying issue: this is akin to having a short-term solution bias. Solutions aimed at providing immediate relief may not be sustainable in the long term. Inadequate Root Cause Analysis: when a problem is not properly defined or identified and a solution is proffered, no matter the well-meaning intentions, research has shown that there is a high chance of the problem recurring. Insufficient Implementation: due to the unavailability of the right tools, expertise, and resources, lasting solutions become easily far-fetched. Lack of monitoring and follow-up: without a preventive maintenance culture of effective feedback and scheduled time-based monitoring, the chances of a problem resurfacing are usually very high. Complexity: some problems are complex and will require more ongoing adjustments. This is because some of the problems are part of a larger one and hence completely solving it requires more effort over time using updates. Given the above, we immediately see why there is always a need to correctly diagnose and proffer a solution in any given situation because the consequences are mostly dire. Homeowners, property managers facility administrators, and a host of other key responsibilities are bequeathed with this situation most of the time. The following are the best practices when it comes to proper diagnoses of real-life security or comfortability needs Identify the problem: to understand a problem based on the needs of the moment, we start by gathering the relevant information. Also, we determine the extent or boundaries of the problem this is called the scope. We also differentiate between symptoms of the problem and its root cause. Analyze the problem: After gathering the required data, we can now analyze the problem to understand its context and implications. There are different techniques used in carrying out analysis. Some of these techniques are already popular and have grown in their use due to adoption. There are 5 Whys, Fishbone Diagram, RCA or Root Cause Analysis Generate Potential Solution: when analysis has been concluded, it’s now time to generate potential solutions. We also consider several factors such as the resources available, the potential impact of the solution, and the long- and short-term issues that will be encountered going forward. Evaluate and Select Solution: All solutions are thrown in the mix using a chart or a visual queue such as a decision tree Develop an Action Plan: this comes in after a vote of confidence is passed at the solutions stage. All factors are considered long-term and short-term simultaneously. Implement the Solution. Here we begin gathering the resources required and then we can now start the implementation by putting the action plan into practice. Evaluate the Results: From here we gather the necessary feedback needed to ensure the procedure or solution worked. If there exists an issue that was not considered or was an oversight, it is immediately worked on accordingly with the most critical concerns addressed first. Let’s look at a real-life case study to see how the problem is defined and the solution proffered: Case Study A shop was burgled over the night and was only discovered in the morning after the incident. Goods worth millions were carted away at the expense of the shop owner. Fortunately, there was insurance cover which will cover some costs and possibly get the business up and running in no time. but let’s take a break here, things could have played out differently if some factors were in place. Problem Definition: this is a case of a security breach. From the information gathered, there was no surveillance footage, it happened at night when visibility was low, Security personnel on duty were possibly distracted, there was no alarm system in place and hence no system breach triggered. Previous records showed that it was not a first-time occurrence. In this case, the symptoms were financial loss and property damage. The root cause was identified to be a skeletal or minimal security apparatus that was inefficient around the clock. In consideration, the shop owner could either file a legal action against the security company and wait for security beef up or activate personal security. For several reasons, the latter and not the former is the best course of action to take because we were informed by the case study that an insurance process was involved. To prevent such incidents in the future, a robust IoT-based security system can be implemented in the shop. Here is a more comprehensive solution: IoT-based Security System for the Shop Smart Surveillance Cameras: 24/7 Monitoring: Install high-definition, night-vision cameras both inside and outside the shop to monitor activities around the clock. Real-time Alerts: Cameras equipped with motion detection and AI can send real-time alerts to the shop owner’s smartphone and security personnel if unusual activity is detected during closed hours. Cloud Storage: Store footage securely in the cloud for easy access and review, ensuring evidence is available if needed. Smart Alarm System: Intrusion Detection: Install sensors on doors and windows that trigger alarms if forced entry is detected. Silent Alarms: Set up silent alarms that alert the shop owner and authorities immediately without tipping off the intruders. Integration with Surveillance: Link the alarm system with surveillance cameras to start recording and send alerts when the alarm is triggered. Access Control System: Smart Locks: Use IoT-enabled smart locks that can be controlled remotely and log entry and exit times. Biometric Access: Implement biometric or RFID access controls to limit and monitor who can enter the shop, especially after hours. Remote Access Management: Allow the shop owner to grant or revoke access remotely, ensuring only authorized personnel can enter. Environmental Sensors: Glass Break Sensors: Install sensors that detect

How to properly diagnose and proffer solutions to real-life security needs using IoT tools. Read More »

Shopping Cart

2024©Westeserve. All rights reserved.

Scroll to Top