T
E
L
KO
MNIK
A
, V
ol
.
1
7
,
No.
6
,
Dec
e
mb
er
201
9
, p
p.
3
21
1
~
3217
IS
S
N:
1
69
3
-
6
93
0
,
accr
ed
ited
F
irst
Gr
ad
e b
y K
em
en
r
istekdikti,
Decr
ee
No: 2
1/E/
K
P
T
/20
18
DOI:
10.12928/TE
LK
OM
N
IK
A
.v
1
7
i
6
.
13142
◼
32
11
Rec
ei
v
ed
Ma
y
16
,
20
1
9
; R
ev
i
s
ed
J
u
l
y
2
, 2
01
9
; A
c
c
ep
t
ed
J
ul
y
18
,
20
1
9
Desig
n an
d real
iz
atio
n
of
mo
tio
n d
e
tect
or sys
te
m
fo
r h
ou
se
secur
ity
Z
ainab G
. Fai
se
l
*
1
,
Ma
ys
a
m Sa
m
ee
r
Hu
ss
ein
2
,
Am
any Moh
amm
ad Ab
o
o
d
3
Com
p
u
t
e
r En
g
i
n
e
e
ri
n
g
T
e
c
h
n
i
q
u
e
s
De
p
a
rt
m
e
n
t,
Al
E
s
ra
a
Un
i
v
e
r
s
i
t
y
Co
l
l
e
g
e
,
Ba
g
h
d
a
d
,
Ira
q
*C
o
rre
s
p
o
n
d
i
n
g
a
u
th
o
r,
e
-
m
a
i
l
:
z
a
i
n
a
b
.
g
h
a
z
i
@e
s
ra
a
.
e
d
u
.
i
q
1
,
m
a
y
s
a
m
@es
r
a
a
.e
d
u
.i
q
2
,
a
m
a
n
y
@e
s
ra
a
.
e
d
u
.
i
q
3
Ab
strac
t
In
th
i
s
p
a
p
e
r,
t
h
e
d
e
s
i
g
n
a
n
d
r
e
a
l
i
z
a
t
i
o
n
o
f
m
o
t
i
o
n
d
e
t
e
c
to
r
s
y
s
te
m
f
o
r
h
o
u
s
e
s
e
c
u
ri
t
y
b
a
s
e
d
G
SM
n
e
two
rk
i
s
p
re
s
e
n
t
s
.
T
h
e
d
e
v
e
l
o
p
m
e
n
t
o
f
m
i
c
ro
c
o
n
tro
l
l
e
r
c
a
rri
e
d
o
u
t
i
n
tru
d
e
r
d
e
t
e
c
t
i
o
n
th
a
t
s
u
p
p
o
rt
s
tra
c
k
i
n
g
te
c
h
n
i
q
u
e
s
to
p
ro
v
i
d
e
v
i
ta
l
s
e
c
u
ri
t
y
wit
h
c
o
n
tro
l
a
n
d
a
l
e
rt
o
p
e
r
a
ti
o
n
i
n
s
i
d
e
a
n
d
o
u
t
s
i
d
e
th
e
h
o
m
e
.
Th
e
p
i
v
o
t
o
f
s
e
c
u
ri
t
y
o
n
th
e
i
n
t
e
g
ra
ti
o
n
t
h
e
m
o
ti
o
n
d
e
te
c
to
r
a
n
d
c
a
m
e
ra
s
i
n
to
web
a
p
p
l
i
c
a
ti
o
n
s
h
a
s
b
e
c
o
m
e
m
o
re
i
n
t
e
re
s
te
d
.
Th
e
s
m
a
rt
s
u
rv
e
i
l
l
a
n
c
e
Pi
c
a
m
e
ra
o
b
ta
i
n
th
e
i
n
p
u
t
fro
m
th
e
m
o
ti
o
n
d
e
te
c
t
o
r
a
n
d
c
o
n
tro
l
l
e
r
whi
c
h
i
s
s
e
n
d
t
h
e
v
i
d
e
o
to
t
h
e
web
s
e
r
v
e
r
a
l
l
o
win
g
th
e
h
o
m
e
o
wne
r
t
o
a
c
c
e
s
s
th
i
s
v
i
d
e
o
b
y
u
s
e
w
e
b
a
p
p
l
i
c
a
t
i
o
n
s
.
An
i
n
tru
s
i
o
n
a
l
e
rt
s
e
n
d
to
th
e
o
wne
r
b
y
m
e
a
n
o
f
m
e
s
s
a
g
e
v
i
a
m
o
b
i
l
e
a
n
d
b
u
z
z
e
rs
a
l
a
rm
s
l
o
c
a
te
d
a
t
s
u
i
ta
b
l
e
d
i
s
ta
n
c
e
.
T
h
i
s
s
y
s
te
m
i
s
ty
p
i
f
y
p
ro
fi
c
i
e
n
t
v
i
d
e
o
c
a
m
e
ra
fo
r
r
e
m
o
te
s
e
n
s
i
n
g
a
n
d
tra
c
k
i
n
g
wit
h
l
i
v
e
v
i
d
e
o
fo
r
s
u
c
c
e
e
d
i
n
g
p
l
a
y
a
g
a
i
n
t
o
o
f
fe
rs
e
ff
i
c
i
e
n
t
a
n
d
e
a
s
y
i
m
p
l
e
m
e
n
ta
t
i
o
n
wit
h
o
m
n
i
p
re
s
e
n
t
s
u
rv
e
i
l
l
a
n
c
e
s
o
l
u
ti
o
n
.
Key
w
ords
:
h
o
m
e
s
e
c
u
ri
t
y
,
m
o
ti
o
n
d
e
te
c
ti
o
n
,
Pi
c
a
m
e
ra
Copy
righ
t
©
2
0
1
9
Uni
v
e
rsi
t
a
s
Ahm
a
d
D
a
hl
a
n.
All
rig
ht
s
r
e
s
e
rve
d
.
1.
Int
r
o
d
u
ctio
n
T
he
s
ec
urit
y
l
ev
e
l
i
n
the
ho
me
be
c
om
es
mo
r
e
i
mp
orta
nt
a
n
d
en
ha
nc
e
d
s
y
s
tem
al
way
s
[1
].
M
an
y
s
ec
urit
y
t
ec
hn
i
qu
es
h
av
e
b
ee
n
en
ha
nc
ed
s
uc
h
as
t
he
s
o
ph
i
s
t
i
c
ate
d
wea
po
ns
,
s
ec
urit
y
off
i
c
ers
,
a
l
arms
an
d
oth
ers
wer
e
prod
uc
e
d
th
e
s
oft
war
e
an
d
e
l
ec
tr
on
i
c
ha
r
dw
are
i
nte
grati
on
[
2].
T
he
h
om
e
s
e
c
urit
y
i
s
on
e
of
th
e
m
os
t
i
mp
ortant
s
af
ety
s
y
s
tem
s
whi
c
h
are
r
eq
ui
r
e
d
for
al
l
s
oc
i
a
l
gro
up
s
[3]
.
A
ny
ho
me
n
ee
d
to
be
mo
n
i
tore
d
at
al
l
t
i
me
fr
om
fi
r
e,
t
he
ft
an
d
s
ho
r
t
c
i
r
c
ui
ts
c
as
es
.
I
n
ex
i
s
ti
ng
t
i
m
e,
t
he
r
a
te
of
c
r
i
me
s
i
nc
l
ud
e
mu
r
de
r
,
fi
r
e
an
d
r
o
bb
ery
i
s
i
nc
r
ea
s
ed
an
d
wor
r
y
i
ng
t
he
hu
m
.
T
he
r
efo
r
e,
ho
us
e
s
u
r
v
ei
l
l
an
c
e
s
y
s
tem
s
ho
u
l
d
b
e
i
mp
r
ov
ed
to
be
mo
r
e
v
a
l
ua
bl
e
.
Nowa
da
y
s
,
de
v
el
op
er
a
nd
r
es
ea
r
c
he
r
s
c
om
e
up
wi
th
wi
de
r
a
ng
e
of
s
ec
urit
y
s
y
s
tem
s
tha
t
are
de
p
l
oy
e
d
at
ho
us
es
i
n
r
em
ot
e
area
a
nd
i
n
du
s
tr
i
a
l
i
n
s
am
e
t
i
me
[
4].
A
nu
mb
er
of
the
s
e
s
tu
di
es
ha
v
e
r
ea
l
i
z
ed
an
d
oth
er
i
s
i
n
progr
es
s
.
A
c
om
b
i
na
ti
o
n
of
s
oft
war
e
an
d
h
ardwar
e
i
s
th
e
ma
i
n
tas
k
i
n
s
ec
urit
y
s
y
s
tem
t
ha
t
prot
ec
ts
th
e
p
r
op
erti
es
a
nd
l
i
fe
i
n
c
o
mm
erc
i
al
bu
i
l
di
ng
an
d
r
es
i
d
en
t
i
a
l
pl
ac
e
fr
om
i
nte
r
r
up
t
i
o
n
[5]
.
T
he
i
de
a
of
s
ec
urit
y
de
s
i
g
n
c
om
es
aft
er
pe
r
c
ei
v
e
d
tha
t
t
he
v
a
l
ue
of
l
i
f
e
c
ou
l
d
be
l
os
t
t
hroug
h
f
i
r
e
or
r
ob
be
r
y
wi
tho
ut
pr
i
or
war
ni
n
g
da
ta
[
6].
W
i
t
h
ti
me
,
the
s
ec
ur
i
ty
s
y
s
tem
s
ha
v
e
de
v
el
op
e
d
fr
o
m
s
i
mp
l
e
c
o
ntro
l
to
hi
gh
tec
hn
o
l
og
i
c
al
me
th
od
s
[
7].
B
y
us
i
n
g
A
r
du
i
no
k
i
ts
,
the
G
S
M
ba
s
ed
h
ou
s
e
s
ec
ur
i
ty
s
y
s
tem
ha
s
be
en
pro
po
s
e
d
by
[8]
.
Lo
w
c
os
t
s
ma
r
t
s
ec
u
r
i
ty
P
i
c
am
era
w
i
th
n
i
g
h
v
i
s
i
on
c
ap
a
bi
l
i
ty
w
i
th
p
as
s
i
v
e
i
nfrar
e
d
s
en
s
or
ha
s
s
ug
ge
s
ted
by
[9]
.
Nu
me
r
ou
s
tec
hn
i
q
ue
s
o
f
h
om
e
s
ec
urit
y
de
v
e
l
op
me
nt
an
d
i
nv
es
ti
g
ati
on
ha
v
e
be
e
n
s
ub
j
ec
ted
as
i
n
[10
-
3
7
]
.
A
n
a
uto
ma
t
i
c
c
on
tr
ol
a
nd
ef
fi
c
i
en
t
po
wer
c
on
s
um
pt
i
on
s
ec
urit
y
s
y
s
tem
ha
s
be
e
n
propos
e
d
by
[
3
8
]
as
s
ho
w
i
n
F
i
gu
r
e
1.
In
t
hi
s
wor
k
,
m
an
y
tec
hn
i
qu
es
wer
e
us
e
d
t
o
prov
i
de
eff
ec
ti
v
e
a
l
g
orit
h
ms
s
ec
urit
y
s
y
s
tem
w
hi
c
h
i
s
r
e
al
i
z
ed
u
s
i
n
g
py
tho
n
s
c
r
i
pt
as
i
l
l
us
tr
at
ed
i
n Fi
gu
r
e
2.
2.
S
ec
u
r
it
y
S
ys
t
e
m Stat
e
Fl
o
w
Mod
el
T
he
ho
us
e
al
ar
m
s
y
s
tem
i
nc
l
ud
e
s
en
s
ors
,
ev
en
t,
m
ot
i
on
s
an
d
al
l
s
y
s
tem
ac
ti
v
i
t
i
es
ha
s
be
en
d
es
i
g
ne
d
a
nd
r
un
ni
ng
i
n
MA
T
LA
B
as
s
ho
wi
ng
i
n
F
i
gu
r
e
3.
I
n
thi
s
de
s
i
gn
,
w
h
en
the
s
y
s
tem
de
tec
ts
an
i
ntrus
i
on
p
erm
i
t
a
c
ertai
n
t
i
m
e
for
a
l
arm
t
o
be
di
s
a
bl
e
an
d
oth
erw
i
s
e
c
al
l
s
th
e
ho
us
e
owne
r
s
.
T
h
i
s
s
y
s
tem
i
l
l
us
tr
ate
s
h
ow
t
o
us
e
o
utp
u
t
ev
en
ts
to
d
eriv
e
al
l
b
l
oc
k
s
a
nd
h
ow
to
us
e
di
r
ec
t
ev
en
t
broa
dc
as
ti
n
g
t
o
c
oo
r
d
i
na
te
be
tw
ee
n
p
ara
l
l
e
l
s
ta
tes
.
A
d
di
t
i
on
al
l
y
,
t
hi
s
mo
d
el
c
ou
l
d
Evaluation Warning : The document was created with Spire.PDF for Python.
◼
IS
S
N:
16
93
-
6
93
0
T
E
L
KO
MNIK
A
V
ol
.
1
7
,
No
.
6
,
D
ec
em
b
er
20
19
:
32
1
1
-
3217
3212
s
ho
w
ho
w
to
us
e
th
e
fu
nc
ti
on
c
al
l
tr
i
gg
er
t
o
s
i
m
u
l
ate
t
he
s
ec
urit
y
s
y
s
tem
w
hi
c
h
r
eq
u
i
r
ed
t
o
be
ev
ery
s
o o
fte
n
trig
ge
r
e
d.
F
i
gu
r
e
1
.
H
um
a
n m
ov
em
e
n
t d
et
ec
ti
o
n [
3
9]
F
i
gu
r
e
2
.
F
l
ow c
h
art r
ep
r
es
en
tat
i
o
n o
f
the
prop
os
ed
s
e
c
urit
y
s
y
s
tem
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KO
MNIK
A
IS
S
N: 1
69
3
-
6
93
0
◼
Des
i
gn
an
d rea
l
i
z
at
i
o
n o
f
m
oti
o
n d
ete
c
tor s
y
s
tem
f
or h
ou
s
e s
ec
urit
y
(
Z
a
i
na
b G. F
ai
s
el
)
3213
F
i
gu
r
e
s
4
a
nd
5
s
ho
w
th
e
do
or
a
nd
w
i
nd
ow
s
tat
e
s
tat
us
whi
c
h
i
s
v
aria
b
l
e
a
t
ea
c
h
up
da
te.
H
en
c
e,
i
f
th
e
s
en
s
or
v
aria
b
l
e
i
s
tr
ue
,
t
he
br
o
ad
c
as
ti
n
g
ev
e
nt
i
s
s
en
t
to
al
arm
c
o
nd
i
ti
on
an
d
w
he
n
t
he
s
e
ns
or
i
s
ac
ti
v
e,
th
e
a
l
ert
ev
e
nts
c
ou
l
d
broadc
as
t,
o
the
r
w
i
s
e,
th
e
war
m
ev
en
t
i
s
broad
c
as
t
i
ng
.
T
he
m
oti
on
s
en
s
or
ev
en
t
i
l
l
us
tr
ate
d
i
n
F
i
gu
r
e
6
r
ep
r
es
en
ts
the
i
np
ut
fr
o
m
th
i
s
s
en
s
or
whi
c
h
c
ou
l
d
be
s
po
r
ad
i
c
,
an
d
th
en
th
e
de
-
bo
un
c
i
ng
s
tat
e
i
s
us
ed
.
T
he
s
tat
e
of
de
-
bo
un
c
i
n
g
r
em
ai
ns
ac
t
i
v
e
whi
l
e
m
oti
on
s
en
s
or
i
s
tr
ue
an
d
aft
er
c
erta
i
n
de
l
ay
du
r
at
i
on
,
the
al
ert
ev
en
t
c
ou
l
d
broa
dc
as
t.
In
c
as
e
of
an
a
l
ert
ev
en
t
i
s
broadc
as
t
ed
to
th
e
a
l
arm
s
tat
e,
the
pe
n
di
ng
s
t
ate
wi
l
l
b
e
a
c
ti
v
ate
d
for
de
l
ay
du
r
at
i
on
.
If
t
he
d
i
s
ab
l
e
of
al
ar
m
i
s
no
t
es
tab
l
i
s
h
ed
throug
h
the
de
l
ay
du
r
at
i
on
,
the
n
t
he
ho
us
e
ow
ne
r
s
i
s
di
r
ec
tl
y
c
on
tac
te
d
by
the
ou
tpu
t
ev
en
t.
F
i
gu
r
e
7 s
ho
ws
t
he
a
l
ar
m a
c
ti
v
i
ty
s
tat
e f
l
o
w mo
de
l
.
F
i
gu
r
e
3
. H
ou
s
e s
ec
uri
ty
s
tat
e f
l
ow
mo
d
el
F
i
gu
r
e
4
.
D
oo
r
/w
i
nd
ow a
c
t
i
v
i
ty
s
tat
e f
l
ow
mo
d
el
Evaluation Warning : The document was created with Spire.PDF for Python.
◼
IS
S
N:
16
93
-
6
93
0
T
E
L
KO
MNIK
A
V
ol
.
1
7
,
No
.
6
,
D
ec
em
b
er
20
19
:
32
1
1
-
3217
3214
3.
Result
s
and
Dis
cussion
T
o
ac
h
i
ev
e
th
e
go
a
l
of
h
ou
s
e
s
ec
ur
i
ty
s
y
s
tem
,
th
e
s
oft
war
e
an
d
h
ardwar
e
p
arts
i
n
the
propos
ed
s
y
s
tem
are
c
om
bi
ne
d
a
nd
i
m
pl
em
e
nte
d
i
n
MA
T
A
B
.
T
h
e
h
ardwar
e
e
qu
i
pm
en
ts
us
ed
t
o
p
erfor
ms
t
he
s
urv
ei
l
l
an
c
e
po
s
s
i
bi
l
i
ty
,
wh
i
l
e
th
e
s
oft
war
e
p
art
driv
es
the
o
pe
r
ati
on
s
an
d
en
ab
l
i
ng
al
l
fun
c
t
i
on
s
of
c
on
ne
c
t
ed
c
o
mp
on
e
nts
.
T
o
en
s
ure
t
he
ho
us
e
s
ec
ur
i
ty
wi
th
m
i
n
i
mu
m
c
os
t,
the
i
ns
t
al
l
at
i
on
of
s
urv
ei
l
l
an
c
e
s
y
s
tem
i
s
b
as
ed
s
oft
war
e
v
i
a
G
S
M
n
etwo
r
k
.
T
he
s
en
s
or
s
en
s
i
ti
v
i
ty
i
s
i
ns
ta
l
l
ed
at
1
5
me
ters
to
en
ha
nc
e
the
s
y
s
tem
op
er
ati
on
s
by
c
areful
l
oc
at
i
on
s
of
P
i
c
am
era
an
d
s
en
s
ors
.
F
i
gu
r
e
8
s
ho
ws
the
s
y
s
tem
tr
i
gg
e
r
s
ov
er
al
l
t
i
me
i
n
y
el
l
ow
c
ol
or
l
i
ne
.
T
he
l
oc
ati
on
s
of
s
e
ns
ors
i
s
s
etu
p
i
n
s
uc
h
a
w
ay
tha
t
i
nte
r
l
op
er
wa
l
k
ac
r
os
s
the
fi
e
l
d
o
f
v
i
s
i
o
n
i
mp
r
ov
e
t
he
p
erfor
ma
nc
e
i
n
mo
ti
on
d
i
s
c
ov
erin
g
as
c
om
pa
r
ed
w
i
th
l
oc
at
i
on
s
i
n
c
as
e
of
i
nt
erlo
pe
r
wal
k
s
tr
ai
g
ht
to
war
ds
the
s
en
s
ors
.
A
ny
m
ov
em
e
nts
wi
thi
n
15
m
ete
r
s
wi
l
l
r
e
al
i
z
e
by
P
i
c
am
era
an
d
c
ap
t
ured.
T
he
c
on
tr
ol
l
e
r
progr
a
ms
r
eq
ui
r
e
d
for
v
i
d
eo
r
ec
or
d
an
d
tr
an
s
mi
tt
ed
t
o
th
e
s
erv
er
of
the
w
eb
.
I
n
c
as
e
of
m
oti
on
was
de
t
ec
ted
by
s
en
s
or,
t
he
pro
gram
en
ab
l
e
P
i
c
a
m
era
to
c
a
ptu
r
e
a
nd
s
av
e
the
i
ma
ge
s
.
T
he
al
erts
of
th
e
s
y
s
tem
to
the
ho
us
e
ow
ne
r
s
ab
o
ut
an
y
i
n
tr
us
i
on
aro
un
d
the
h
ou
s
e
c
o
ul
d
b
e
s
en
t
v
i
a
G
S
M
n
etwo
r
k
wh
i
c
h
i
s
r
efe
r
the
ho
us
e
m
em
be
r
s
to
the
web
ap
p
l
i
c
at
i
on
s
to
watc
h
th
e
v
i
de
o
r
ec
orde
d
by
th
e
s
y
s
tem
.
In
th
i
s
i
ns
tan
t
,
t
he
h
ou
s
e
me
m
be
r
s
c
ou
l
d
tak
e t
he
r
e
qu
i
r
e
d s
te
ps
to
ov
erc
om
e a
ny
fu
r
th
er dam
a
ge
t
o t
h
e p
r
o
pe
r
t
i
es
.
F
i
gu
r
e
5
.
W
i
nd
ow
ev
en
ts
s
t
ate
f
l
ow
mo
d
el
F
i
gu
r
e
6
.
M
oti
on
s
e
ns
or s
ta
te
fl
ow m
od
e
l
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KO
MNIK
A
IS
S
N: 1
69
3
-
6
93
0
◼
Des
i
gn
an
d rea
l
i
z
at
i
o
n o
f
m
oti
o
n d
ete
c
tor s
y
s
tem
f
or h
ou
s
e s
ec
urit
y
(
Z
a
i
na
b G. F
ai
s
el
)
3215
F
i
gu
r
e
7
.
A
l
ar
m a
c
t
i
v
i
ty
s
tat
e f
l
ow m
od
e
l
F
i
gu
r
e
8
.
T
r
i
gg
ers
of
s
ec
urit
y
s
y
s
tem
4.
Co
n
clus
ion
T
hi
s
wor
k
i
ntro
du
c
es
a
dv
an
c
e
s
ec
uri
ty
s
y
s
tem
f
or
ho
us
e
s
afe
ty
wi
th
de
v
el
op
me
nt
al
ertn
es
s
of
i
mp
ortanc
e
s
e
c
urit
y
i
n
ho
m
e
own
ers
,
wor
k
ers
,
r
es
i
de
nti
al
a
nd
c
om
m
erc
i
al
b
ui
l
di
ng
are
on
the
l
o
ok
ou
t
for
e
ffe
c
ti
v
e
s
urv
ei
l
l
a
nc
e
s
y
s
tem
.
T
he
i
ntrus
i
o
n
d
ete
c
t
i
on
i
nt
o
the
off
i
c
e
or
ho
us
e
i
s
ma
d
e
po
s
s
i
b
l
e
u
s
i
ng
pa
s
s
i
v
e
i
n
fr
ared
s
en
s
ors
whi
c
h
us
e
th
e
r
a
di
ati
o
n
th
at
al
ert
a
ny
hu
ma
n
mo
t
i
on
ac
r
os
s
th
e
mo
v
em
en
t.
T
he
s
ug
g
es
ted
de
s
i
gn
i
s
p
ower
eff
i
c
i
en
t
a
nd
p
arti
c
u
l
arl
y
ap
p
l
i
c
ab
l
e
i
n
l
oc
ati
on
s
w
i
th
l
ow
p
ower
c
o
ns
um
p
ti
o
n.
It's
a
bs
ol
u
tel
y
c
h
al
l
en
gi
n
g
to
ha
v
e
i
mp
l
e
me
nt
ati
on
o
f
thi
s
w
o
r
k
wi
th
i
nc
r
ed
i
b
l
e
a
pp
l
i
c
at
i
on
an
d
po
s
s
i
b
i
l
i
ty
.
T
h
e
fu
l
l
a
uto
ma
t
i
on
r
ea
l
i
z
ati
on
i
n
r
ea
l
t
i
m
e
s
y
s
tem
m
i
gh
t
be
oc
c
up
i
ed
a
nd
bi
o
me
tr
i
c
s
c
an
n
er
t
ha
t
prov
i
de
m
on
i
tori
ng
an
d
s
ec
ur
i
ty
tas
k
s
.
T
h
i
s
wi
l
l
m
ak
e
i
t
f
ea
s
i
bl
e
for
ho
us
e
own
er
to
ha
v
e
i
n
t
erv
al
th
at
t
he
i
r
be
l
on
g
i
ng
are
protec
t
ed
.
T
o
prov
i
d
e
m
ore
eff
ec
t
i
v
e
an
d
s
en
s
i
t
i
v
e
s
en
s
or
i
s
s
ug
ge
s
te
d
for
en
ha
nc
ed
pe
r
form
an
c
e.
Evaluation Warning : The document was created with Spire.PDF for Python.
◼
IS
S
N:
16
93
-
6
93
0
T
E
L
KO
MNIK
A
V
ol
.
1
7
,
No
.
6
,
D
ec
em
b
er
20
19
:
32
1
1
-
3217
3216
Ref
er
en
ce
[1
]
Vi
n
Te
c
h
Sy
s
te
m
s
.
Ba
c
k
to
Ba
s
i
c
s
:
Wh
e
r
e
Did
th
e
B
u
rg
l
a
r
Al
a
rm
Com
e
Fro
m
?
.
Av
a
i
l
a
b
l
e
:
h
tt
p
s
:/
/v
i
n
te
c
h
n
o
l
o
g
y
.
c
o
m
/2
0
1
1
/0
4
/0
8
/b
a
c
k
-
to
-
b
a
s
i
c
s
-
w
h
e
re
-
did
-
th
e
-
b
u
r
g
l
a
r
-
a
l
a
r
m
-
c
o
m
e
-
fr
o
m
/
.
1
8
J
u
n
e
2
0
1
8
.
[2
]
G
SM
Ba
s
e
d
Hom
e
S
e
c
u
ri
ty
Al
a
r
m
S
y
s
t
e
m
Us
i
n
g
Ar
d
u
i
n
o
.
2
0
1
6
.
Av
a
i
l
a
b
l
e
:
h
tt
p
s
:/
/www
.e
l
e
c
tro
n
i
c
s
h
u
b
.o
r
g
/a
rd
u
i
n
o
-
g
s
m
-
h
o
m
e
-
s
e
c
u
r
i
ty
-
a
l
a
rm
-
s
y
s
te
m
/
.
4
J
u
l
y
2
0
1
8
.
[3
]
Bh
a
v
a
n
i
AN,
J
a
m
i
TU,
A
s
h
o
k
G
A
.
L
o
w
C
o
s
t
Sm
a
rt
Se
c
u
ri
ty
Ca
m
e
ra
wit
h
Nig
h
t
Vi
s
i
o
n
Cap
a
b
i
l
i
t
y
Us
i
n
g
R
a
s
p
b
e
rry
Pi
a
n
d
PIR
Se
n
s
o
r
.
In
t
e
rn
a
t
i
o
n
a
l
J
o
u
rn
a
l
o
f
Ad
v
a
n
c
e
d
T
e
c
h
n
o
l
o
g
y
a
n
d
In
n
o
v
a
ti
v
e
Res
e
a
r
c
h
(I
J
ATI
R)
.
2016
;
8
(
21
)
:
4053
-
4
0
5
6
.
[4
]
O
l
a
re
waj
u
IK,
Ay
o
d
e
l
e
O
E,
M
i
c
h
a
e
l
FO,
Al
a
b
a
ES,
Ab
i
o
d
u
n
RO
.
Des
i
g
n
a
n
d
Con
s
tr
u
c
ti
o
n
o
f
a
n
Au
to
m
a
ti
c
Hom
e
Se
c
u
ri
t
y
Sy
s
te
m
b
a
s
e
d
o
n
G
SM
Te
c
h
n
o
l
o
g
y
a
n
d
Em
b
e
d
d
e
d
M
i
c
r
o
c
o
n
tr
o
l
l
e
r
Uni
t
.
Am
e
ri
c
a
n
J
o
u
r
n
a
l
o
f
El
e
c
tr
i
c
a
l
a
n
d
Co
m
p
u
t
e
r En
g
i
n
e
e
ri
n
g
.
2
0
1
7
;
1
(
1
)
:
25
-
32
.
[5
]
O
y
e
d
e
p
o
SO
.
En
e
r
g
y
i
n
Pe
r
s
p
e
c
t
i
v
e
o
f
Su
s
ta
i
n
a
b
l
e
De
v
e
l
o
p
m
e
n
t
i
n
Nig
e
ri
a
.
S
u
s
t
a
i
n
a
b
l
e
En
e
rg
y
.
2013
;
1
(
2
)
:
14
–
25.
[6
]
Hori
n
o
v
S,
Hor
i
n
o
v
a
S
.
En
e
rg
y
m
a
n
a
g
e
m
e
n
t
s
y
s
te
m
s
.
G
CSEEA
G
l
o
b
a
l
Con
f
e
re
n
c
e
o
n
S
u
s
ta
i
n
a
b
l
e
En
v
i
ro
n
m
e
n
t,
E
n
e
rg
y
a
n
d
Ag
ri
c
u
l
t
u
re
.
2
0
1
7
:
1
–
8
.
[
7
]
In
tro
d
u
c
ti
o
n
t
o
PIR
Se
n
s
o
r
a
n
d
In
t
e
g
ra
t
i
n
g
It
Wi
th
Ard
u
i
n
o
.
Av
a
i
l
a
b
l
e
:
h
tt
p
:/
/www
.i
n
s
tr
u
c
t
a
b
l
e
s
.
c
o
m
/i
d
/I
n
tro
d
u
c
ti
o
n
-
to
-
PIR
-
Se
n
s
o
r
-
a
n
d
-
In
te
g
ra
t
i
n
g
-
It
-
Wi
t
h
/
.
0
3
Au
g
u
s
t
2
0
1
8
.
[8
]
Upa
s
a
n
a
A,
M
a
n
i
s
h
a
B,
M
o
h
i
n
i
G
,
Pra
d
n
y
a
K
.
Rea
l
Ti
m
e
Se
c
u
ri
ty
Us
i
n
g
Hum
a
n
M
o
ti
o
n
Det
e
c
t
i
o
n
.
In
te
rn
a
ti
o
n
a
l
J
o
u
r
n
a
l
o
f
Com
p
u
te
r Sc
i
e
n
c
e
a
n
d
M
o
b
i
l
e
C
o
m
p
u
ti
n
g
.
2
0
1
5
;
4
:
2
4
5
-
2
5
0
.
[9
]
Pa
te
l
PB,
Cho
k
s
i
VM
,
J
a
d
h
a
v
S,
Po
td
a
r
M
B
.
S
m
a
rt
M
o
t
i
o
n
Det
e
c
ti
o
n
Sy
s
te
m
Us
i
n
g
Ras
p
b
e
rry
Pi
.
In
te
rn
a
ti
o
n
a
l
J
o
u
r
n
a
l
o
f
Ap
p
l
i
e
d
I
n
fo
rm
a
t
i
o
n
S
y
s
te
m
s
.
2
0
1
6
;
10
(5
)
:
37
-
40
.
[1
0
]
Cha
ra
d
v
a
M
J
,
Se
j
p
a
l
RV,
Sa
r
wad
e
NP
.
A
s
tu
d
y
o
f
M
o
t
i
o
n
Det
e
c
t
i
o
n
M
e
th
o
d
fo
r
Sm
a
rt
Ho
m
e
S
y
s
t
e
m
.
In
te
rn
a
ti
o
n
a
l
J
o
u
r
n
a
l
o
f
I
n
n
o
v
a
ti
v
e
R
e
s
e
a
rc
h
i
n
A
d
v
a
n
c
e
d
En
g
i
n
e
e
r
i
n
g
.
2
0
1
4
;
1
(
5
)
:
1
4
8
-
1
5
1
.
[1
1
]
S
Ka
p
re
SS,
Sa
l
u
n
k
h
e
SS,
T
h
a
k
k
a
r
RM
,
Pa
w
a
r
AP,
M
a
l
u
s
a
re
O
A
.
Ad
v
a
n
c
e
d
Se
c
u
ri
t
y
G
u
a
rd
wit
h
PIR
s
e
n
s
o
r
fo
r
Com
m
e
r
c
i
a
l
a
n
d
Res
i
d
e
n
ti
a
l
u
s
e
.
In
t
e
rn
a
t
i
o
n
a
l
J
o
u
rn
a
l
fo
r
Ad
v
a
n
c
e
R
e
s
e
a
r
c
h
in
En
g
i
n
e
e
ri
n
g
a
n
d
T
e
c
h
n
o
l
o
g
y
.
2014
;
2
(
XI
):
29
-
3
4
.
[1
2
]
Del
l
o
s
a
R
.
Dev
e
l
o
p
m
e
n
t
o
f
a
n
An
ti
-
Th
e
ft
De
v
i
c
e
u
s
i
n
g
M
o
ti
o
n
De
te
c
t
i
o
n
a
n
d
Bo
d
y
Te
m
p
e
ra
tu
re
.
As
i
a
n
Pa
c
i
fi
c
J
o
u
rn
a
l
o
f
M
u
l
ti
d
i
s
c
i
p
l
i
n
a
ry
Re
s
e
a
rc
h
.
2
0
1
4
;
2
(
6
):
121
-
124.
[1
3
]
Kh
a
ra
t
P
,
K
h
a
ra
t
J
.
W
i
re
l
e
s
s
In
tr
u
s
i
o
n
Det
e
c
ti
o
n
S
y
s
t
e
m
U
s
i
n
g
W
i
re
l
e
s
s
S
e
n
s
o
r
Net
wor
k
:
A Co
n
c
e
p
tu
a
l
F
ra
m
e
.
In
te
r
n
a
ti
o
n
a
l
J
o
u
r
n
a
l
o
f
El
e
c
tr
o
n
i
c
s
a
n
d
El
e
c
tri
c
a
l
E
n
g
i
n
e
e
ri
n
g
.
2014
;
2
:
80
-
84
.
[1
4
]
Ba
n
g
a
l
i
J
,
S
h
a
l
i
g
ra
m
A
.
Des
i
g
n
a
n
d
I
m
p
l
e
m
e
n
ta
ti
o
n
o
f
Se
c
u
ri
t
y
Sy
s
te
m
fo
r
Sm
a
rt
Hom
e
b
a
s
e
d
o
n
G
SM
t
e
c
h
n
o
l
o
g
y
.
In
t
e
rn
a
t
i
o
n
a
l
J
o
u
r
n
a
l
o
f
Sm
a
rt
Hom
e
.
2013
;
7
(
6)
:
2
0
1
-
2
0
8
.
[1
5
]
Fre
j
l
i
c
h
o
ws
k
i
D,
G
o
ś
c
i
e
ws
k
a
K,
Fo
rc
z
m
a
ń
s
k
i
P,
Hof
m
a
n
R
.
Sm
a
rt
M
o
n
i
t
o
r
-
An
In
te
l
l
i
g
e
n
t
Se
c
u
r
i
t
y
Sy
s
te
m
f
o
r
th
e
Pro
te
c
ti
o
n
o
f
In
d
i
v
i
d
u
a
l
s
a
n
d
S
m
a
l
l
Pro
p
e
rti
e
s
wit
h
th
e
Po
s
s
i
b
i
l
i
ty
o
f
Ho
m
e
A
u
to
m
a
ti
o
n
.
O
p
e
n
Ac
c
e
s
s
Se
n
s
o
r
s
.
2014
;
1
4
(6
)
:
9923
-
9
9
4
8
.
[1
6
]
J
o
s
e
p
h
G
M
,
Nw
a
n
k
wo
EL
,
E
n
i
o
l
a
O
M
,
En
e
h
CD
.
Des
i
g
n
o
f
a
Rea
l
–
Ti
m
e
M
i
c
ro
c
o
n
tro
l
l
e
r
b
a
s
e
d
G
SM
-
Em
b
e
d
d
e
d
I
n
tru
s
i
o
n
Se
c
u
ri
ty
Sy
s
te
m
.
In
t
e
rn
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
Sc
i
e
n
t
i
fi
c
a
n
d
En
g
i
n
e
e
ri
n
g
Res
e
a
r
c
h
.
2015
;
6
:
232
-
241
.
[1
7
]
M
e
n
d
o
z
a
R,
M
a
l
i
j
a
n
B,
Cal
d
o
RB
.
Dev
e
l
o
p
m
e
n
t
o
f
Sm
a
rt
Fa
rm
Se
c
u
r
i
ty
S
y
s
t
e
m
wit
h
Al
a
r
m
M
e
c
h
a
n
i
s
m
Us
i
n
g
I
m
a
g
e
Pro
c
e
s
s
i
n
g
.
L
p
u
-
L
a
g
u
n
a
J
o
u
rn
a
l
o
f
En
g
i
n
e
e
ri
n
g
a
n
d
Com
p
u
t
e
r
Stu
d
i
e
s
.
2016
;
3
:
73
-
84
.
[1
8
]
Bh
a
tk
u
l
e
AV,
Sh
i
n
d
e
UB,
Za
n
war
SR
.
Hom
e
b
a
s
e
d
Se
c
u
ri
t
y
Con
tro
l
Sy
s
te
m
Us
i
n
g
Ras
p
b
e
rry
Pi
a
n
d
G
SM
.
In
te
r
n
a
t
i
o
n
a
l
J
o
u
rn
a
l
o
f
In
n
o
v
a
t
i
v
e
Res
e
a
rc
h
i
n
Com
p
u
te
r
a
n
d
C
o
m
m
u
n
i
c
a
t
i
o
n
En
g
i
n
e
e
r
i
n
g
.
2016
;
4
(
9
):
1
6
2
5
9
-
1
6
2
6
4
.
[
19
]
J
u
s
o
h
M
H
,
B
i
n
J
a
m
a
l
i
M
F
,
B
i
n
Za
i
n
a
l
Ab
i
d
i
n
AF
,
Su
l
a
i
m
a
n
AA,
Hus
s
i
n
M
F
.
Wi
-
Fi
a
n
d
G
SM
Ba
s
e
d
M
o
ti
o
n
Se
n
s
o
r
fo
r
Hom
e
Se
c
u
ri
ty
Sy
s
te
m
Ap
p
l
i
c
a
ti
o
n
.
4
th
In
te
r
n
a
ti
o
n
a
l
Con
f
e
re
n
c
e
o
n
El
e
c
tr
o
n
i
c
Dev
i
c
e
s
,
Sy
s
te
m
s
a
n
d
Ap
p
l
i
c
a
ti
o
n
s
.
2
0
1
5
;
9
9
(1
):
1
-
7
.
[2
0
]
Es
e
o
s
a
O
,
Pro
m
i
s
e
E
.
G
SM
Ba
s
e
d
In
te
l
l
i
g
e
n
t
Ho
m
e
Se
c
u
ri
ty
Sy
s
te
m
fo
r
In
tr
u
s
i
o
n
Det
e
c
t
i
o
n
.
In
te
rn
a
ti
o
n
a
l
J
o
u
r
n
a
l
o
f
En
g
i
n
e
e
ri
n
g
a
n
d
Te
c
h
n
o
l
o
g
y
.
2
0
1
4
;
4
:
595
-
6
0
5
.
[2
1
]
O
y
e
b
o
l
a
BO
.
M
i
c
ro
c
o
n
tro
l
l
e
r
b
a
s
e
d
m
o
ti
o
n
d
e
te
c
ti
o
n
a
l
a
rm
Sy
s
t
e
m
u
s
i
n
g
PIR
s
e
n
s
o
r
.
Th
e
Sa
a
p
a
d
e
J
o
u
rn
a
l
o
f
M
a
n
a
g
e
m
e
n
t,
S
c
i
e
n
c
e
a
n
d
T
e
c
h
n
o
l
o
g
y
.
2015
;
1
:
2
3
0
-
236
.
[
22
]
Ad
e
j
u
m
o
b
i
IA,
Wa
r
a
ST,
Ad
e
b
i
s
i
O
I,
A
k
i
n
w
a
n
d
e
O
A
.
E
c
o
n
o
m
i
c
s
O
f
Us
i
n
g
En
e
rg
y
S
a
v
i
n
g
L
o
a
d
s
fo
r
El
e
c
tr
i
c
a
l
Se
r
v
i
c
e
s
.
Um
u
d
i
k
e
J
o
u
rn
a
l
o
f
E
n
g
i
n
e
e
ri
n
g
a
n
d
T
e
c
h
n
o
l
o
g
y
.
2
0
1
6
;
2
(
1
)
:
1
4
4
-
52
.
[2
3
]
Pa
p
a
n
t
o
n
i
o
u
S,
M
a
n
g
i
l
i
S,
M
a
n
g
i
a
l
e
n
t
i
I
.
Us
i
n
g
i
n
t
e
l
l
i
g
e
n
t
B
u
i
l
d
i
n
g
En
e
rg
y
M
a
n
a
g
e
m
e
n
t
Sy
s
te
m
fo
r
th
e
i
n
t
e
g
ra
t
i
o
n
o
f
s
e
v
e
r
a
l
s
y
s
te
m
s
to
o
n
e
o
v
e
ra
l
l
m
o
n
i
to
ri
n
g
a
n
d
m
a
n
a
g
e
m
e
n
t
s
y
s
t
e
m
.
En
e
rg
y
Pro
c
e
d
i
a
.
2017
;
1
1
1
:
6
3
9
–
6
4
7
.
[2
4
]
Roc
h
a
P,
Si
d
d
i
q
u
i
A,
Sta
d
l
e
r
M
.
Im
p
r
o
v
i
n
g
e
n
e
rg
y
e
ff
i
c
i
e
n
c
y
v
i
a
s
m
a
r
t
b
u
i
l
d
i
n
g
e
n
e
r
g
y
m
a
n
a
g
e
m
e
n
t
s
y
s
te
m
s
:
A
c
o
m
p
a
r
i
s
o
n
wi
th
p
o
l
i
c
y
m
e
a
s
u
re
s
.
En
e
rg
y
a
n
d
B
u
i
l
d
i
n
g
s
.
2
0
1
5
;
88
:
203
–
213.
[2
5
]
M
.
Wa
s
e
e
m
,
M
.
M
o
u
r
s
h
e
d
,
D.
M
u
n
d
o
w,
M
.
Si
s
i
n
n
i
.
Bu
i
l
d
i
n
g
e
n
e
rg
y
m
e
te
r
i
n
g
a
n
d
e
n
v
i
ro
n
m
e
n
ta
l
m
o
n
i
to
ri
n
g
–
A
s
ta
te
-
of
-
th
e
-
a
rt
re
v
i
e
w
a
n
d
d
i
re
c
ti
o
n
s
fo
r
fu
tu
r
e
re
s
e
a
r
c
h
.
En
e
r
g
y
a
n
d
B
u
i
l
d
i
n
g
s
.
2
0
1
6
;
120
:
85
–
1
0
2
.
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KO
MNIK
A
IS
S
N: 1
69
3
-
6
93
0
◼
Des
i
gn
an
d rea
l
i
z
at
i
o
n o
f
m
oti
o
n d
ete
c
tor s
y
s
tem
f
or h
ou
s
e s
ec
urit
y
(
Z
a
i
na
b G. F
ai
s
el
)
3217
[2
6
]
L
a
b
e
o
d
a
n
T
,
Ze
i
l
e
r W
,
Bo
x
e
m
G
,
Zh
a
o
Y
.
O
c
c
u
p
a
n
c
y
m
e
a
s
u
re
m
e
n
t
i
n
c
o
m
m
e
r
c
i
a
l
o
ff
i
c
e
b
u
i
l
d
i
n
g
s
f
o
r
d
e
m
a
n
d
-
d
r
i
v
e
n
c
o
n
tr
o
l
a
p
p
l
i
c
a
ti
o
n
s
—
A
s
u
rv
e
y
a
n
d
d
e
te
c
ti
o
n
s
y
s
t
e
m
e
v
a
l
u
a
ti
o
n
.
E
n
e
rg
y
B
u
i
l
d
.
2
0
1
5
;
93
:
3
0
3
–
3
1
4
.
[2
7
]
Nw
o
y
e
CD
,
Us
i
k
a
l
u
M
R,
Ba
b
a
ri
m
i
s
a
IO,
A
c
h
u
k
a
J
A,
Ay
a
ra
WA
.
Con
s
tru
c
ti
o
n
o
f
An
Au
to
m
a
ti
c
Po
wer
Swit
c
h
u
s
i
n
g
In
fr
a
re
d
M
o
ti
o
n
Se
n
s
o
r
.
J
o
u
rn
a
l
o
f
In
f
o
rm
a
ti
c
s
a
n
d
M
a
th
e
m
a
t
i
c
a
l
Sc
i
e
n
c
e
s
.
2017
;
9
(
2
)
:
331
–
3
3
7
.
[
2
8
]
Nag
y
Z,
Yo
n
g
FY,
Fre
i
M
,
S
c
h
l
u
e
t
e
r
A
.
O
c
c
u
p
a
n
t
c
e
n
te
re
d
l
i
g
h
t
i
n
g
c
o
n
tr
o
l
fo
r
c
o
m
fo
rt
a
n
d
e
n
e
r
g
y
e
ff
i
c
i
e
n
t
b
u
i
l
d
i
n
g
o
p
e
ra
ti
o
n
.
En
e
rg
y
B
u
i
l
d
.
2
0
1
5
;
94
:
1
0
0
–
108.
[
29
]
Sa
th
i
s
h
k
u
m
a
r
M
,
Ra
j
i
n
i
S
.
Sm
a
rt
Su
r
v
e
i
l
l
a
n
c
e
Sy
s
te
m
Us
i
n
g
PIR
S
e
n
s
o
r
Net
wor
k
a
n
d
G
SM
.
In
te
rn
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
Ad
v
a
n
c
e
d
Re
s
e
a
r
c
h
i
n
Com
p
u
t
e
r
En
g
i
n
e
e
r
i
n
g
&
Te
c
h
n
o
l
o
g
y
(
IJ
ARC
ET)
.
2015
;
4
(
1
)
:
7
0
-
74
.
[
3
0
]
Cha
n
d
ra
m
o
h
a
n
J
,
Na
g
a
ra
j
a
n
R,
Sa
th
e
e
s
h
k
u
m
a
r
K,
A
j
i
th
k
u
m
a
r
N,
G
o
p
i
n
a
th
PA,
Ra
n
j
i
t
h
k
u
m
a
r
S
.
In
te
l
l
i
g
e
n
t
Sm
a
rt
Hom
e
Au
to
m
a
ti
o
n
a
n
d
Se
c
u
ri
t
y
Sy
s
te
m
Us
i
n
g
Ard
u
i
n
o
a
n
d
Wi
-
fi
.
In
te
rn
a
t
i
o
n
a
l
J
o
u
rn
a
l
o
f
En
g
i
n
e
e
ri
n
g
a
n
d
Co
m
p
u
te
r Sc
i
e
n
c
e
.
2
0
1
7
;
6
(
3
)
:
2
0
6
9
4
–
2
0
6
9
8
.
[
3
1
]
Pra
s
a
n
n
a
V
,
Ba
s
h
a
SH
.
Ho
m
e
Au
to
m
a
t
i
o
n
B
a
s
e
d
o
n
Ar
d
u
i
n
o
.
In
te
r
n
a
t
i
o
n
a
l
J
o
u
rn
a
l
o
f
In
n
o
v
a
ti
v
e
Res
e
a
r
c
h
i
n
El
e
c
tr
i
c
a
l
,
El
e
c
tr
o
n
i
c
s
,
In
s
tru
m
e
n
ta
ti
o
n
a
n
d
Co
n
t
ro
l
En
g
i
n
e
e
ri
n
g
.
2
0
1
6
;
4
(
10
)
:
18
–
21
.
[
3
2
]
O
ż
a
d
o
wi
c
z
A
,
G
re
l
a
J
.
E
n
e
rg
y
s
a
v
i
n
g
i
n
th
e
s
tre
e
t
l
i
g
h
t
i
n
g
c
o
n
tro
l
s
y
s
t
e
m
—
a
n
e
w
a
p
p
r
o
a
c
h
b
a
s
e
d
o
n
t
h
e
EN
-
1
5
2
3
2
s
ta
n
d
a
rd
.
E
n
e
rg
y
Ef
fi
c
i
e
n
c
y
.
2
0
1
7
:
5
6
3
–
5
7
6
.
[
3
3
]
Ku
m
a
r
K,
S
e
n
N,
A
z
i
d
S,
M
e
h
ta
U
.
A
Fu
z
z
y
D
e
c
i
s
i
o
n
i
n
Sm
a
rt
F
i
re
a
n
d
Ho
m
e
Se
c
u
r
i
t
y
Sy
s
te
m
.
Pro
c
e
d
i
a
Co
m
p
u
t
.
Sc
i
.
2
0
1
7
;
1
0
5
:
93
–
98
.
[
3
4
]
Ab
d
u
l
ra
h
m
a
n
TA
,
I
s
i
we
k
p
e
n
i
OH
,
Su
ra
j
u
d
e
e
n
b
a
k
i
n
d
e
NT
,
O
tu
o
z
e
AO
.
De
s
i
g
n
,
Sp
e
c
i
fi
c
a
ti
o
n
a
n
d
Im
p
l
e
m
e
n
ta
t
i
o
n
o
f
a
Dis
tri
b
u
te
d
Ho
m
e
Au
to
m
a
ti
o
n
S
y
s
te
m
.
Pro
c
e
d
i
a
Com
p
u
t
.
Sc
i
.
2
0
1
6
;
94
:
4
7
3
–
4
78
.
[
3
5
]
Sk
o
c
i
r
P,
Kri
v
i
c
P,
T
o
m
e
l
j
a
k
M
,
Ku
s
e
k
M
,
J
e
z
i
c
G
.
Ac
ti
v
i
t
y
d
e
te
c
ti
o
n
i
n
s
m
a
rt
h
o
m
e
e
n
v
i
ro
n
m
e
n
t
.
Pro
c
e
d
i
a
Co
m
p
u
t
.
Sc
i
.
2
0
1
6
;
96
:
672
–
6
8
1
.
[
3
6
]
J
ra
d
i
M
,
Sa
n
g
o
g
b
o
y
e
FC,
M
a
tt
e
ra
CG
,
Kj
æ
rg
a
a
r
d
M
B,
Ve
j
e
C,
J
ørg
e
n
s
e
n
BN
.
A
Wo
rl
d
Cl
a
s
s
En
e
rg
y
Eff
i
c
i
e
n
t
Un
i
v
e
rs
i
ty
B
u
i
l
d
i
n
g
b
y
Da
n
i
s
h
2
0
2
0
.
E
n
e
rg
y
Pro
c
e
d
i
a
.
2
0
1
7
;
1
3
2
:
21
–
26
.
[
3
7
]
Si
n
g
a
ra
v
e
l
a
n
A,
Ko
ws
a
l
y
a
M
.
Des
i
g
n
a
n
d
Im
p
l
e
m
e
n
t
a
ti
o
n
o
f
Sta
n
d
b
y
Po
wer
Sa
v
i
n
g
Sm
a
rt
So
c
k
e
t
wit
h
W
i
r
e
l
e
s
s
S
e
n
s
o
r Ne
two
r
k
.
Pro
c
e
d
i
a
Co
m
p
u
t.
Sc
i
.
2
0
1
6
;
92
:
3
0
5
–
3
1
0
.
[
3
8
]
Kh
a
l
a
f
HA,
To
l
b
a
AS,
Ra
s
h
i
d
M
Z
.
Ev
e
n
t
tr
i
g
g
e
re
d
i
n
te
l
l
i
g
e
n
t
v
i
d
e
o
re
c
o
rd
i
n
g
s
y
s
te
m
u
s
i
n
g
M
SSSI
M
fo
r s
m
a
rt
h
o
m
e
s
e
c
u
r
i
ty
.
Ai
n
S
h
a
m
s
En
g
.
J
.
2
0
1
6
;
9
(4
):
1
5
2
7
-
1533.
Evaluation Warning : The document was created with Spire.PDF for Python.