Latex Secure Home Automation
Latex Secure Home Automation
Latex Secure Home Automation
INTRODUCTION
The main objec-ve of this project is to empower investors by providing a comprehensive stock market
analysis and forecas-ng pla:orm that integrates fundamental and technical analyses, visualiza-on tools, and real-
-me news and recommenda-ons for informed decision-making.
1.1 Introduc,on
The project aims to provide comprehensive financial analysis and forecas-ng tools for investors
interested in the stock market. Leveraging a variety of Python libraries and financial APIs, the system offers
a wide array of func-onali-es, including fundamental analysis, technical analysis, -me series modelling, and
stock price forecas-ng.
One of the primary features of the project is fundamental analysis, which evaluates a company's financial
health and performance through key metrics such as debt-to-equity ra-o, price-to-book ra-o, and dividend
yield. This analysis helps investors make informed decisions about whether to buy, sell, or hold a par-cular
stock.
Addi-onally, the system incorporates technical analysis techniques such as moving averages, rela-ve
strength index (RSI), moving average convergence divergence (MACD), Bollinger Bands, and average true
range (ATR). These tools enable users to iden-fy trends, momentum, vola-lity, and poten-al reversal points
in stock prices, aiding in tac-cal trading strategies.
Moreover, the project integrates -me series modelling using autoregressive integrated moving average
(ARIMA) models to forecast future stock prices. By analysing historical price data, the system generates
forecasts along with confidence intervals, empowering investors with insights into poten-al future price
movements.
Furthermore, the project provides visualiza-on tools u-lizing libraries like Matplotlib, Plotly, and
Seaborn to create intui-ve charts and graphs, enhancing the interpretability of the analyzed data.
Overall, the project serves as a comprehensive pla:orm for investors to perform detailed analysis, gain
insights, and make data-driven decisions in the dynamic and compe--ve world of stock trading.
1.2 Problem Formula,on
The financial markets are characterized by complexity, vola-lity, and vast amounts of data. Investors face
challenges in making informed decisions due to the overwhelming volume of informa-on and the need for accurate
analysis. The primary problem addressed by this project is the lack of a unified and user-friendly tool that combines
fundamental and technical analysis with -me series forecas-ng for stock market investments. Investors oSen struggle
with iden-fying suitable stocks for their por:olios, considering factors like debt ra-os, valua-on metrics, and dividend
yields. Addi-onally, the absence of robust technical analysis tools makes it challenging to grasp short-term trends,
poten-al reversals, and entry/exit points. Moreover, forecas-ng stock prices accurately is a complex task that
demands a sophis-cated approach. Exis-ng tools may lack the integra-on of advanced -me series modelling
techniques, hindering the ability to predict future stock movements with confidence. Therefore, the project aims to
formulate a solu-on that amalgamates fundamental and technical analyses, along with advanced -me series
forecas-ng, into a cohesive pla:orm. This pla:orm addresses the challenges faced by investors in comprehensively
assessing and predic-ng stock market behaviour, providing a valuable resource for strategic decision-making in
financial investments.
1.3 Mo,va,on
In the dynamic landscape of financial markets, the need for a robust, all-encompassing tool is evident. Investors
require a comprehensive solu-on that seamlessly integrates fundamental analysis, technical indicators, and cuVng-
edge -me series forecas-ng. This project is mo-vated by the desire to empower investors with a single pla:orm that
simplifies complex financial data, aids in decision-making, and enhances their ability to navigate the complexi-es of
the stock market. The goal is to make financial insights accessible to both seasoned investors and those new to the
world of stock trading.
The proposed system integrates Python libraries and financial APIs to offer comprehensive stock market analysis and
forecas-ng. It includes fundamental and technical analysis tools, -me series modelling with ARIMA, visualiza-on
capabili-es, and features for fetching stock market news and recommenda-ons. This holis-c approach empowers
investors with -mely informa-on and insights, facilita-ng informed decision-making and strategic investment
planning.
1.5 Scope of the Project
The project aims to develop a versa-le pla:orm for stock market analysis and forecas-ng. It includes func-onali-es
such as fundamental and technical analysis, -me series modelling, visualiza-on tools, and integra-on with APIs for
fetching stock market news and recommenda-ons. The pla:orm aims to cater to investors of varying exper-se levels,
providing them with a comprehensive toolkit to make informed decisions and op-mize their investment strategies in
the dynamic stock market environment.
The project encompasses the development of a comprehensive stock market analysis and forecas-ng pla:orm with
the following components:
1. Fundamental Analysis: The system assesses a stock's financial health based on metrics like debt-to-equity ra-o,
price-to-book ra-o, and dividend yield.
2. Technical Analysis: U-lizing tools such as moving averages, RSI, MACD, Bollinger Bands, ATR, and OBV, the system
aids in iden-fying trends, vola-lity, and poten-al reversal points.
3. Time Series Modelling: ARIMA models are employed for forecas-ng future stock prices, providing insights into
poten-al price movements.
4. Visualiza9on: The pla:orm includes visualiza-on tools using libraries like Matplotlib, Plotly, and Seaborn for
crea-ng intui-ve charts and graphs.
5. News and Recommenda9ons: Integra-on with financial APIs allows the system to fetch stock market news and
recommenda-ons, providing users with -mely informa-on for decision-making.
6. User Interac9on: The system allows users to input a specific stock for detailed informa-on, analysis, and
forecas-ng.
7. Risk Analysis: The pla:orm calculates and visualizes vola-lity, risk vs. return, and Sharpe ra-o, aiding users in
assessing risk-adjusted performance.
The overall goal is to empower investors with a unified tool that combines various analyses, visualiza-on, and external
informa-on to facilitate well-informed decision-making in the stock market.
1923ITP001
Chapter 2
LITERATURE SURVEY
A literature survey typically involves a systema-c search for relevant literature using appropriate keywords and
search terms, followed by a cri-cal evalua-on of the quality and relevance of the iden-fied literature. The survey
should be comprehensive and objec-ve, and the findings should be documented and referenced to ensure
transparency and accuracy. By leveraging the insights gained from a literature survey, project teams can improve the
quality and effec-veness of their research or development efforts, ensure the project’s relevance and impact, and
contribute to the advancement of knowledge in the field.
Literature Review
Dey, Roy, and Das [1] Technology alters peoples daily rou-nes, An android app is created to assist old individuals
who are unable to aid themselves, and this created system is used by people who live alone. This systems
implementa-on makes use of WIFI and an easy-to-use web server, both of which have the poten-al for future growth
when combined with improved sensors to boost sensor precision (like up to street Nights)
Sunehra and Ramana [2] Users can access household equipment at any -me by connec-ng to the network
and controlling them as necessary. This system also offers security as it sends an email no-ce to the user when it
detects an intruder or person The system is operated via a web page and a telegram bot.
Internet of Things. The primary benefit of this system is that it offers users both text and voice communica-on op-ons.
A chat bot applica-on will be used for the users text input, and a voice assistant will be used for the users voice input.
Biswas and Mynuddin [4] Three levels of security have been guaranteed. Use of NFC tags with a PIR mo-on
sensor and a password. The door wont open if one of them isnt there. A lock is ajached to the shaS of the
servomotor that will be used to unlock the door. When the incorrect password is entered, the LCD shows error text.
Kodali, Jain, Bose, et al. [5] By managing and interac-ng with remote control of home appliances, the IOT
offers a comfortable way of living to people. Two Node MCUs are present in the proposed system. The Node MCU
(Node micro controller unit) is an open-source device that combines hardware and soSware to create a far less
expensive system based on the ESP8266 chip.
Dash and Choudekar [6] While an automated home can be referred to or classified as a smart home, a
wireless home automa-on system employing the internet of things employs computers or mobile devices to operate
features automa-cally through the internet from anywhere in the globe.
Nakrani, Panchal, Thakkar, et al. [7] These systems oSen include a detec-ng and actua-on layer made up of
passive infrared sensors, also referred to as mo-on sensors, and web cameras for security.
Reddy, Cheerla, Inthiyaz, et al. [8] In this system, devices including ligh-ng, fans, and camera access are
employed. Any internet-capable device, such as a smart phone or laptop, may be used to control home appliances
thanks to an Android applica-on and a Telegram bot. Addi-onally, the proposed system offers home security by using
a camera that can send photos via a Telegram bot message when no one is home.
Satapathy, Bas-a, and Mohanty [9] To serve as a connec-vity module to show the systems
CHAPTER 2. LITERATURE SURVEY 1923ITP001
effec-veness and viability. It enables the user to remotely manage a variety of appliances, including lights, fans, and
televisions, as well as make decisions based on sensor feedback on various environmental factors.
Rao, Vinod, Priyanka, et al. [10] The study is primarily focused on IOT-based home automa-on u-lising a
wireless raspberry PI system. IOT enables us to control basic home appliances automa-cally via the internet from
anywhere in the world using PCs or mobile devices.
Hema and Yadav [11] These days, everything moves at supersonic speeds, and digital media allows for data
to be exchanged at the speed of light. Therefore, u-lising Internet protocols, informa-on must come in at the same
rate.
Desai and Pawar [12] The IoT is at its height in the modern world. As the world becomes smarter, home
automa-on is star-ng to take off. One of the newest technologies in home automa-on is smart door control. This
study seeks to expand the door automa-on method u-lising a Raspberry Pi and an Android device.
kh Shakthi and Abishiek et. al [13] A smart home is a networked associa-on of automa-on and management for
extraordinary living. Home security is crucial in this regard, becoming a crucial aspect of our lives.
Reeta [14] The facial recogni-on technology works by first taking a picture with a camera. The snippet of
code recognises an individuals characteris-cs. Using a Raspberry Pi, the captured image is compared to the database
of photos aSer being detected. The faces are then compared to see if they match or not. ASer that, if an intruder tries
to enter the premises, the SIM300 GSM module transmits a security alert to the designated person.
Pallavi et al. [15] Our project aims to create devices that are simple to operate, including home applica-ons
and other devices. Using an applica-on on a cell phone with an Android, iOS, or Windows opera-ng system installed,
we may operate fans, air condi-oners, lights, and other appliances.
Amri and Se-awan [16] Email was the basis on which the smart home was formed. This research examined
a home security system that iden-fies facial pajerns to allow access. Cameras and a BeagleBone are used in this
system. Email was used by the system to interact with users.
Anvekar and Banakar [17] The database contains pictures of people who have been granted approval. The camera
records the face of the person who rings the doorbell when they approach the door and compares it to previously
recorded photographs in the database. The door unlocks if the image is a match with the one being captured at the
moment. If it fails, the user receives the captured face.
Kumar and Mijal [18] The system includes a backup in case there is a power outage issue. The power backup
devices are switched in place of the main supply, and they con-nue to power the security system.
Demir, S¸ ims¸ek, Gur,¨ et al. [19] The goal of their future study is to create an anonymous secure framework
(ASF) for smart homes. The ASF model focuses on session key progression and rou-ne key renewal to get rid of any
faults brought on by a compromised key. Although this model offers unlinkability and anonymity,it is missing the
property of anonymous iden-fica-on.
Taiwo and Ezugwu [20] The smart home is now an established area of interest and research that contributes
to comfort in modern homes. With the Internet being an essen-al part of broad communica-on in modern life, IoT
has allowed homes to go beyond building to interac-ve abodes. In many spheres of human life, the IoT has grown
exponen-ally, including monitoring ecological factors, controlling the home and its appliances.
Raspberry pi , Voltages ,
M.Raj
Telegram Bot
“A Novel Design And Impl This security system has gene ric
ementa-on Of Smart Hom concept and implementa-on with
Security, sensors, Internet of effec-ve GSM to no-fy user with
[18] eSecurity System: Future 2017 Things (IOT), and GSM (Global message with raising alarm.
Perspec-ve”R .Kumarand System Mobile Communica-on)
P .Mijal
2.2.1 Open CV
OpenCV is a Python library that allows you to perform image processing and computer vision tasks. It provides a
wide range of features, including object detec-on, face recogni-on, and tracking.
OpenCV is an open-source soSware library for computer vision and machine learning. The OpenCV full form
is Open Source Computer Vision Library. It was created to provide a shared infrastructure for applica-ons for
computer vision and to speed up the use of machine percep-on in consumer products. OpenCV, as a BSD-licensed
soSware, makes it simple for companies to use and change the code. There are some predefined packages and
libraries that make our life simple and OpenCV is one of them
The picture intensity at the par-cular loca-on is represented by the numbers. In the above image, we have shown
the pixel values for a grayscale image consist of only one value, the intensity of the black color at that loca-on.
There are two common ways to iden-fy the images:
1. Grayscale Grayscale images are those images which contain only two colors black and white. The contrast
measurement of intensity is black treated as the weakest intensity, and white as the strongest intensity. When
we use the grayscale image, the computer assigns each pixel value based on its level of darkness.
2. RGB An RGB is a combina-on of the red, green, blue color which together makes a new color. The computer
retrieves that value from each pixel and puts the results in an array to be interpreted.
2. Since the OpenCV library is wrijen in C/C++, so it is quit fast. Now it can be used with Python.
4. Computer Vision is portable as OpenCV and can run on any device that can run on C.
affect the accuracy of the computer to recognize the face more effec-vely. First, it is necessary to understand the
difference between face detec-on and face recogni-on.
Face Detec9on: The face detec-on is generally considered as finding the faces (loca-on and size) in an image and
probably extract them to be used by the face detec-on algorithm.
Face Recogni9on: The face recogni-on algorithm is used in finding features that are uniquely described in the
image. The facial image is already extracted, cropped, resized, and usually converted in the grayscale.
There are various algorithms of face detec-on and face recogni-on. face detec-on using the HAAR cascade
algorithm.
16
1. 0-level DFD
2. 1-level DFD
3. 2-level DFD
0-level DFD:
It represents the methodology used in system analysis to iden-fy, clarify and organize system requirements.
1-level DFD
In 1-level DFD, a context diagram is decomposed into mul-ple bubbles/processes. In this level, we highlight the main
objec-ves of the system and breakdown the high-level process of 0-level DFD into subprocesses.
At Level 1 of a DFD, the diagram provides an overview of the en-re system or process, including all major
inputs and outputs. It shows the main func-ons or processes that are involved, as well as the data that flows between
them. The Level 1 DFD provides a good star-ng point for understanding the system or process, and can be used to
iden-fy areas for improvement or op-miza-on.
The Level 1 DFD is oSen used as a basis for developing more detailed diagrams, such as Level 2 or Level 3
DFDs, which break down the system or process into more detailed components and interac-ons. Overall, the DFD is
Secure Home Automa-on using Raspberry Pi by Telegram app 17
CHAPTER 3. SYSTEM DESIGN AND ANALYSIS 1923ITP001
a useful tool for analyzing and understanding complex systems, and can be used in a variety of contexts, including
soSware development, business process analysis, and systems engineering.
2-level DFD
2-level DFD goes one process deeper into parts of 1-level DFD. It can be used to project or record the
specific/necessary detail about the system’s func-oning.
In DFD modeling terms we talk of the context diagram as the “parent” and the level 1 diagram as the “child”.
This same process can be applied to each process appearing within a level 1 DFD. A DFD that represents a decomposed
level 1 DFD process is called a level 2 DFD.
A Data Flow Diagram (DFD) Level 2 is a type of diagram that provides a more detailed view of a specific
process or subsystem within a system or process that was depicted in the Level 1 DFD. Level 2 DFDs break down the
high-level processes or func-ons iden-fied in the Level 1 diagram into more specific and detailed components,
showing how data moves through the system at a more granular level.
At Level 2, the DFD focuses on a single process or subsystem and shows the inputs, outputs, and processing
steps involved in that specific area. The Level 2 DFD will show more detail than the Level 1 DFD, including any sub-
processes or tasks that are involved in the system. The data flows shown in the Level 2 diagram should align with the
data flows iden-fied in the Level 1 DFD.
The Level 2 DFD can be used to iden-fy any poten-al bojlenecks or inefficiencies in the system, as well as to
help iden-fy areas where changes or improvements could be made. It is oSen used as a basis for developing even
more detailed diagrams, such as Level 3 DFDs or flowcharts, which provide an even more detailed view of the specific
process or subsystem.
Secure Home Automa-on using Raspberry Pi by Telegram app 18
CHAPTER 3. SYSTEM DESIGN AND ANALYSIS 1923ITP001
3.3.3 ER Diagram
ER model stands for an En-ty-Rela-onship model. It is a high-level data model. This model is used to define the data
elements and rela-onship for a specified system.
• It develops a conceptual design for the database. It also develops a very simple and easy to design view of data.
• En-ty
• Ajribute
• Rela-onship
1. Node
2. Edge
3. Decision Node
4. Junc-on node