The Role of Recurrent Convolutional Neural Network in IoT for Building a Security Artificial Intelligence and Home Assistance System

The Role of Recurrent Convolutional Neural Network in IoT for Building a Security Artificial Intelligence and Home Assistance System

Syahril Efendi* Fauzan Nurahmadi Pauzi Ibrahim Nainggolan

Faculty of Computer Science & Information Technology, Universitas Sumatera Utara, Medan 20155, Indonesia

Corresponding Author Email: 
syahril1@usu.ac.id
Page: 
403-408
|
DOI: 
https://doi.org/10.18280/ijsse.130303
Received: 
9 March 2023
|
Revised: 
19 May 2023
|
Accepted: 
25 May 2023
|
Available online: 
30 July 2023
| Citation

© 2023 IIETA. This article is published by IIETA and is licensed under the CC BY 4.0 license (http://creativecommons.org/licenses/by/4.0/).

OPEN ACCESS

Abstract: 

Recurrent Convolutional Neural Network (RCNN) is the result of the development of the CNN architecture based on a recursive neural network on a neural network. The process with the development of RCNN is able to study data in moving images and images more optimally and accurately. With optimal accuracy, RCNN is of course not only limited to research, RCNN is able to play a role in models that are contained in hardware such as IoT technology so that it is used in everyday life. One of the benefits of this is to make the Smart Home System (SHS) concept and Energy Management System based on the concept of artificial intelligence. The development of IoT technology is caused by the large number of jobs or activities that cannot be carried out by humans on a regular basis so that it is combined with cloud technology which makes it easy to access from anywhere with connectivity. Cloud-based solar panel and IoT technology has proven to be able to provide convenience in the use of security in the smart home concept. Solar panels can replace electrical energy for smart home security devices for 24 hours. The Home Assistant system successfully detects and captures every object and distinguishes any movement in the area it sees so that the Cloud-based Home Assistant security system provides convenience and comfort for the smart home concept. Where the accuracy that results from RCCN as outlined in IoT devices on objects 0.5 meter to 1 meter is 100%, 1 meter to 2 meter is 95%.

Keywords: 

RCNN, IoT, smart home systems, solar panels, home assistants

1. Introduction

Recurrent Convolutional Neural Network (RCNN) is an algorithm that can be tested with a moving object recognition dataset [1]. A process that requires only a few parameters, RCNN achieves better results than state-of-the-art CNN on these data sets, which validates the advantages of RCNN over CNN [2]. Various RCNN studies such as those carried out by conducting research [3] with RCNN where the basic process of labeling the scene is to be able to detect objects by considering the feedforward distance which is calculated based on the distance from the label in the presence of a control system by ANN. Besides that [4] performing moving object detection with RCNN shows that RCNN is able to improve CNN performance by including more facts in this dataset.

From various studies that arise, of course, it is able to do good detection on RCNN [5]. The benefits of the results and the neural network method are not only limited to the accuracy produced, but also the results of the method are embodied in hardware both in computer networks and energy [6]. At present, hundreds of millions of devices such as those that have developed on IoT (Internet of Things) are deployed in various application fields, realizing the "data => information => knowledge" process through big data analysis [7]. The Internet of Things (IoT) is a new paradigm that enables communication between electronic devices and sensors via the Internet, making our lives more convenient [8]. IoT uses smart devices and the Internet to provide innovative solutions to various challenges and issues related to various public/private businesses, governments, and industries around the world [9].

With the increasing amalgamation of IoT devices and technologies, we are seeing major changes in our daily lives [10]. One of these IoT developments is the concept of smart home systems (SHS) and devices, which consist of internet-based devices, home automation systems, and reliable energy management systems [11]. Apart from that, another important achievement of IoT is the Smart Health Sensing System (SHSS) [12]. SHSS combines small smart appliances and devices to support human health [13].

IoT technology continues to be developed and integrated like human performance [14]. This activity is called Artificial Intelligence [9]. Artificial Intelligence or artificial intelligence is intelligence that is added to a system that can be regulated in a scientific context [15]. AI was introduced after the creation of the idea of a digital computing machine that aims to determine whether a machine can think or can perform human tasks [16].

There are several large sectors that have supported the development of AI [17]. This means providing data from e-commerce, business, and government to help improve machine learning solutions and algorithms, especially those related to system security. [18]. Moreover, China and Russia recognize the importance of AI for system security and overall competitiveness. As such, the Chinese government has recognized the importance of AI in relation to home security and seeks to become an authority in this area [19].

Each security offered has its own advantages. The thing that really needs to be considered is the existence of an internet connection and a power source at home or at the office [20]. Over time, this has received attention and development whereby if there is no electricity you can still use solar energy (solar panels) instead as well as a source of internet connection with the 5G network for access anywhere and anytime [21]. AI systems with sensors in IoT make homes think and make them live like humans [22].

From this explanation, this paper will build a security system with artificial intelligence on a Home Assistance system using a serverless where the surveillance center is located in the cloud where the device has been embedded with an RCNN algorithm to help quickly detect it. The process of running this application is that the devices stored at home are only IoT sensors and network devices so that they consume little electric power and minimal connections. The security that was built uses a surveillance camera (CCTV) that is integrated with AI which can always pay attention and capture existing movements and can see and recognize the objects it captures.

2. Material and Method

2.1 The role of RCNN in IoT

Modules in RCNN certainly involve the recurrent convolutional layer (RCL). The RCL process evolves over time. Where the process located at (i, j) enters the RCL feature with the input process $z_{i j k}(\mathrm{t})$ where the process at time t is given in the following:

$z_{i j k}=\left(w_k^f\right)^T u^{i, j}(t)+\left(w_k^r\right)^T x^{(i, j)}(t-1)+b_k$            (1)

In Eq. (1) denotes the feedforward and input iterative respectively, which are vector patches centered on (i, j) of the feature maps in the previous and current layers, $w_k^f$ and $w_k^r$ denote the vectorized feed-forward weights respectively and repeated weights, and bk is the bias. The first term in Eq. (1) is used in standard CNN and the second term is induced by repeated connections.

The RCNN algorithm is implemented on IoT devices that require electricity intelligently. Calculation of the electric power load is needed in selecting solar panels so that the connected devices can live and function properly. System analysis focuses on hardware specifications that can be used by Home Assistance software. This research uses the Orange Pi as a place to install Home Assistance to carry out the IoT function, communication with the Cloud Service will use the L2TP-VPN feature from the proxy so that it is safer in data transfer.

In this research, several tools or devices are needed as supporting factors in building a network that are connected to each other which can later be accessed via the internet or intranet. The research tools are shown in Table 1.

From Table 2, there are 2 system design models in this study. The first model is the design of the arrangement of the solar panel system. This aims to prevent solar panels from experiencing system errors and unstable electric charging. The purpose of designing this solar panel is so that the power sent from the solar cell to the controller can be optimally received by the battery and from the controller distributing current to the inverter can be received stably without reducing the electric current. The following is the system design of solar panels in Figure 1.

Table 1. List of tool requirements and their functions

No

Device Name

Function

1

Solar Panels

Replacement Power supply

2

Solar Charge Controllers

Resource Manager to Battery

3

AKI battery

Used as power storage

4

Inverters

Used as a Current converter from Solar Panels to Home Electricity

5

GSM Internet Modem

Internet source

6

Mikrotik RB750GR3

Internet Bandwidth Management and connecting to the Cloud

7

CCTV & NVR

As a security system

8

Cable

To connect all devices

Figure 1. Solar panel system design

Figure 1 is the design of a solar panel system to help with the electricity process. The next design model is designing Home Assistance Software with the IoT process so that it can be accessed in a Cloud System. This design needs to be considered so that the system can run smoothly. The following is a Cloud System-based Home Assistance Software design model shown in Figure 2.

Figure 2. Design of an IoT cloud system-based home assistance system

Figure 2 shows the SHA design model embedded in a cloud system that aims to obtain and build Security Artificial Intelligence and Home Assistance Systems.

2.2 General architecture

The research flow in this paper uses diagrams on the general architecture. The research flow aims to explain the system and the steps for the system design program created. The general architecture in this study can be seen in Figure 3.

Figure 3. General architecture

In Figure 3 it is explained that:

  1. Data collection is in the form of initial data detecting moving objects in the form of humans.
  2. Enter into the data extraction that is filtering the data.
  3. Enter the training step depth using the RCNN algorithm.
  4. Enter the testing step using the RCNN algorithm.
  5. After steps 4 and 5 are successful, the algorithm is embedded in an IoT device and then implemented to build a Security Artificial Intelligence and Home Assistance System.
3. Results and Discussion

3.1 RCNN process in IoT

RCNN in its application in this paper is used to detect moving objects such as humans in an environment that is supported in the image. Basically, the RCNN model consists of three main components: a convolution layer, a proposal layer, and a classification layer. The convolution layer will extract the features from the image, then the proposal layer will select several regions from the image that are likely to contain objects. Furthermore, the classification layer will determine the labels and bounding boxes of each selected area.

To detect moving objects, RCNN can be trained using image datasets containing human images that have been labeled. Once trained, the model will be able to recognize features commonly associated with humans, such as the shape of the body, head and feet. The results of the training and testing calculations obtained are based on Table 2 below:

Table 2. Training process

Approach

Loss RPN

Loss RPN Regression

Loss Detector Classifier

Loss Detector Regression

1.

0.138

0.204

0.556

0.309

2.

0.226

0.214

0.251

0.213

3.

0.137

0.171

0.256

0.245

4.

0.103

0.102

0.526

0.206

5.

0.207

0.228

0.558

0.307

6.

0.176

0.185

0.107

0.295

7.

0.187

0.194

0.294

0.205

8.

0,258

0.352

0.302

0.306

9.

0.211

0.216

0.213

0.257

10.

0.292

0.322

0.323

0.348

From Table 2, the results of carrying out the data set in the training and testing process of a model which consists of 3 stages, namely the Convolutional layer, Pooling layer, and fully connected layer. The results of the data set using RCNN form a model and data record that is ready for further detection. After successfully detecting accuracy in reading moving objects, then determine the accuracy of the dataset that has been tested. Testing is carried out on the system by preparing the data set first. The dataset that has recorded 100 moving objects taking distances of 0.5 meters, 1 meter, 1.5 meters and 2 meters and the measurement results are shown in Table 3 as follows.

Table 3. Moving object detection accuracy test

Testing Distance

Accuracy

Giving Signals

0.5 Meter

100 %

detect

1 Meter

100%

detect

1.5 Meter

95%

detect

2 Meter

90%

detect

However, as with other object detection, the success of moving object detection with RCNN will depend on many factors, such as the amount of training data, image quality, and the ability of the model to extract relevant features. In addition, human detection in complex or unexpected situations, such as darkness or partial closure of human objects, can be a challenge for the RCNN. The detection process has been carried out on various platforms. However, this paper focuses on the application of security. Where the algorithm process on RCNN is poured into hardware such as IoT. The RCNN algorithm carries out a training and testing process involving adaptive datasets to strengthen the method in IoT devices.

The success and running of the IoT system at this stage affects the performance of solar panels in a day and analyzes the needs and consumption that solar panels receive from batteries during charging. Weather factors can affect battery charging performance through solar panels. Furthermore, the performance of the Home Assistant application in securing whether it can capture objects that are visible on surveillance cameras and can be accessed via smartphone applications as carrying out IoT functions. Installation of solar panels in accordance with the circuit that we have previously designed. It is intended that the electric power sent and received to each device can be seen in Figure 4.

Figure 4 explaining the Solar Panels used are of the 100WP type as many as 2 pieces. Testing of solar panels on batteries and home assistant devices was carried out all day with sunny weather. The following is a table of power consumption and battery charging results from solar panels. This activity is seen from the MPPT Solar Charger Controller device based on the indicators that appear on the display.

Figure 4. The arrangement of the solar panel circuit

As in Figure 4, explaining the Solar Panels used are of the 100WP type as many as 2 pieces. Testing of solar panels on batteries and home assistant devices was carried out all day with sunny weather. The following is a table of power consumption and battery charging results from solar panels. This activity is seen from the MPPT Solar Charger Controller device based on the indicators that appear on the display shown in Table 4.

Table 4. Battery and solar panel activity

Time

Power Volts

Watt

Temperature Weather

08.00

15.7

61.9

26℃

09.00

16.1

87.4

27℃

10.00

15

100

28℃

11.00

14.3

157

29℃

12.00

14.6

144

31℃

13.00

13.9

45

31℃

14.00

18.8

88.1

31℃

15.00

18.8

75.5

30℃

16.00

13.6

32.6

30℃

After the solar panel system is installed, then run the Home Assistant device and configure it so that it can be accessed through the system cloud. The device arrangement is shown in Figure 5.

Figure 5. Arrangement of cloud-based home assistant devices

Figure 5 shows that the IoT device has been successfully installed and ready to use. To access or open the Home Assistant application via a web browser and android application. Home Assistant runs on internet port 8123 so it's written as http://ipaddress:8123. The process is shown in Figure 6.

Figure 6. Home Assistant display after logging in

Figure 6 is the initial setting process of the SHA and then giving a signal to the client which can be operated on a mobile device in order to retrieve the data that has been stored. The display on mobile devices is as follows:

Figure 7. Home assistant mobile

Figure 7 is the result of setting the mobile Home Assistant in the RCNN implementation.

3.2 Device testing

This stage tests the Home Assistant application to capture objects that pass through the camera and record them. This is so that every object that is determined is visible and then stored in storage, so that home security can run. Objects detected can also record the detection time of the object. The application package for Home Assistant is MQTT and frigate.

Figure 8. Security home assistance system

In Figure 8, the Frigate package on the Home Assistant can detect moving objects. In addition, the Frigate feature in classifying objects other than humans can also be detected. In this case, the classification uses 4 objects, namely person, bicycle, paint, and car. So that each object that is detected is given a score value which is useful for accuracy in assessing objects.

Figure 9. Daylight testing

In Figure 9, it can be seen that the test was carried out during the day where the light was clear and the RCNN algorithm was able to capture and detect moving objects on the camera in real time. Then it was tested at night as shown in Figure 10.

Figure 10. Night testing

From Figure 10 it can be seen that the process is going well where there are no problems with the application during the day and at night because the RCNN system and algorithm can be implemented on various cameras. RCNN has been successfully integrated into IoT devices by utilizing cloud computing technology. One way to implement RCNN on IoT devices is to use an edge-cloud architecture, where computing processes are performed at the edge of the network (edge) and in the cloud. IoT devices can be used to collect image and video data from the surrounding environment. This data is then sent to a cloud server that integrates RCNN. RCNN is then used to detect the desired object in image or video data, such as the moving object in this paper, namely monitoring in home security.

Once a human object is detected, the detection results will be sent back to the IoT device to trigger certain actions, such as activating the security system, giving a warning or displaying information on the screen. An example of implementing RCNN on IoT devices is in an automatic door security system that can open doors automatically when human detection is carried out by RCNN. In this paper, RCNN can be used to provide intelligent services to IoT devices and enable IoT devices to make more accurate and intelligent decisions based on data collected from their surroundings. This can increase the security and convenience of IoT device users.

4. Conclusion

In summary, based on the description and results of the research that has been done, several conclusions have been obtained, namely the RCNN algorithm besides being able to detect moving objects with a time series process can be applied to a Cloud-based Security Home Assistant System at a predetermined distance based on a distance of 0.5 meters to 1 meter accuracy is 100% while at a distance of 1 meter to 2 meters the accuracy is 95%. Whereas for electrical energy using Solar Panels which are able to reduce the obstacles encountered and are able to meet the needs of an electric current source so that the device can live for 24 hours. Objects detected by the camera will be stored in the program and can be downloaded at any time.

Acknowledgment

Thank you very much to the Research Institute of the Universitas Sumatera Utara in carrying out the TALENTA research for the 2022 fiscal year on contract number: 11119.1/UN5.1.R/PPM/2022.

  References

[1] Turan, M., Almalioglu, Y., Araujo, H., Konukoglu, E., Sitti, M. (2018). Deep endovo: A recurrent convolutional neural network (rcnn) based visual odometry approach for endoscopic capsule robots. Neurocomputing, 275: 1861-1870. https://doi.org/10.1016/j.neucom.2017.10.014

[2] Spoerer, C.J., McClure, P., Kriegeskorte, N. (2017). Recurrent convolutional neural networks: A better model of biological object recognition. Frontiers in Psychology, 8: 1551. https://doi.org/10.3389/fpsyg.2017.01551

[3] Pinheiro, P., Collobert, R. (2014). Recurrent convolutional neural networks for scene labeling. Proceedings of the 31st International Conference on Machine Learning, PMLR, 32(1): 82-90.

[4] Liang, M., Hu, X. (2015). Recurrent convolutional neural network for object recognition. 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Boston, MA, pp. 3367-3375. https://doi.org/10.1109/CVPR.2015.7298958

[5] Al-Khowarizmi, Hutagalung, F.S., Maulana, H. (2023). The accuracy of mape model on CNN to classification of moving object. Journal of Theoretical and Applied Information Technology, 101(3): 1314-1321. http://www.jatit.org/volumes/Vol101No3/24Vol101No3.pdf. 

[6] Massa, R., Marchisio, A., Martina, M., Shafique, M. (2020). An efficient spiking neural network for recognizing gestures with a DVS camera on the loihi neuromorphic processor. In 2020 International Joint Conference on Neural Networks (IJCNN), Glasgow, UK, pp. 1-9. https://doi.org/10.1109/IJCNN48605.2020.9207109

[7] Razaque, A., Shaldanbayeva, N., Alotaibi, B., Alotaibi, M., Murat, A., Alotaibi, A. (2022). Big data handling approach for unauthorized cloud computing access. Electronics, 11(1): 137. https://doi.org/10.3390/electronics11010137

[8] Dash, D., Farooq, R., Panda, J.S., Sandhyavani, K.V. (2019). Internet of Things (IoT): The new paradigm of hrm and skill development in the Fourth Industrial Revolution (Industry 4.0). IUP Journal of Information Technology, 15(4).

[9] Kumar, S., Tiwari, P., Zymbler, M. (2019). Internet of Things is a revolutionary approach for future technology enhancement: A review. Journal of Big data, 6(1): 1-21. https://doi.org/10.1186/s40537-019-0268-2

[10] Zikria, Y.B., Afzal, M.K., Kim, S.W., Marin, A., Guizani, M. (2020). Deep learning for intelligent IoT: Opportunities, challenges and solutions. Computer Communications, 164: 50-53. https://doi.org/10.1016/j.comcom.2020.08.017

[11] Zhou, J., Cao, Z., Dong, X., Vasilakos, A.V. (2017). Security and privacy for cloud-based IoT: Challenges. IEEE Communications Magazine, 55(1): 26-33. https://doi.org/10.1109/MCOM.2017.1600363CM

[12] Algarni, A. (2019). A survey and classification of security and privacy research in smart healthcare systems. IEEE Access, 7: 101879-101894. https://doi.org/10.1109/ACCESS.2019.2930962

[13] Yang, J., Sun, L. (2022). A comprehensive survey of security issues of smart home system: “Spear” and “Shields”, theory and practice. IEEE Access, 10: 124167-124192. https://doi.org/10.1109/ACCESS.2022.3224806

[14] Jia, M., Komeily, A., Wang, Y., Srinivasan, R.S. (2019). Adopting Internet of Things for the development of smart buildings: A review of enabling technologies and applications. Automation in Construction, 101: 111-126. https://doi.org/10.1016/j.autcon.2019.01.023

[15] Gruson, D., Helleputte, T., Rousseau, P., Gruson, D. (2019). Data science, artificial intelligence, and machine learning: Opportunities for laboratory medicine and the value of positive regulation. Clinical Biochemistry, 69: 1-7. https://doi.org/10.1016/j.clinbiochem.2019.04.013

[16] Shah, N., Engineer, S., Bhagat, N., Chauhan, H., Shah, M. (2020). Research trends on the usage of machine learning and artificial intelligence in advertising. Augmented Human Research, 5: 1-15. https://doi.org/10.1007/s41133-020-00038-8

[17] Mitchell, M. (2021). Why AI is harder than we think. arXiv preprint arXiv:2104.12871. https://doi.org/10.48550/arXiv.2104.12871

[18] Mosteanu, N.R., Faccia, A. (2020). Digital systems and new challenges of financial management–FinTech, XBRL, blockchain and cryptocurrencies. Quality-Access to Success Journal, 21(174): 159-166. 

[19] Correia, M.J., Matos, F. (2021). The impact of artificial intelligence on innovation management: A literature review. In Proceedings of the 16th European Conference on Innovation and Entrepreneurship ECIE 2021, 1: 222-230. http://dx.doi.org/10.34190/EIE.21.225

[20] Zeadally, S., Shaikh, F.K., Talpur, A., Sheng, Q.Z. (2020). Design architectures for energy harvesting in the Internet of Things. Renewable and Sustainable Energy Reviews, 128: 109901. https://doi.org/10.1016/j.rser.2020.109901

[21] Hasan, M.K., Ghazal, T.M., Saeed, R.A., Pandey, B., Gohel, H., Eshmawi, A.A., Abdel-Khalek, S., Alkhassawneh, H.M. (2022). A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things. IET Communications, 16(5): 421-432. https://doi.org/10.1049/cmu2.12301

[22] Sepasgozar, S., Karimi, R., Farahzadi, L., Moezzi, F., Shirowzhan, S., Ebrahimzadeh, S.M., Hui, F., Aye, L. (2020). A systematic content review of artificial intelligence and the Internet of Things applications in smart home. Applied Sciences, 10(9): 3074. https://doi.org/10.3390/app10093074