Computer Science ›› 2020, Vol. 47 ›› Issue (11A): 620-623.doi: 10.11896/jsjkx.200300149

• Interdiscipline & Application • Previous Articles     Next Articles

Study on Key Technologies of Interconnection Based on Smart Home Operating System UHomeOS

CHEN Guo-huo, YIN De-shuai, XU Jing, QIAN Xue-wen, WANG Miao   

  1. Qingdao Haier Technology Co.,Ltd.,Qingdao,Shandong 266101,China
  • Online:2020-11-15 Published:2020-11-17
  • About author:CHEN Guo-huo,born in 1978,master.His main research interests include communication information,computer system embedded system,Internet of things and cloud computing.
  • Supported by:
    This work was supported by the Core Electronic Devices,High-end Generic Chips and Basic Software(2017ZX01038101).

Abstract: The rapid development of the smart home industry requires an operating system that can achieve cross-brand smart terminal interconnection.At present,many well-known manufacturers have launched their own smart home operating systems,with the intention of establishing a good application ecology.Haier UHomeOS is the first secure IoT operating system for smart appliances in the world,which covers a complete set of smart home solutions.Based on Haier UHomeOS,this paper explores three key technologies for achieving interoperability,further researches each key technology,and provides solutions.Among them,three key technologies include:equipment distribution network technology,equipment modeling technology and intelligent control technology.In this paper,“multicast MAC technology+softap technology” is used to build a unified device model.In the device model,constraints are set for the operations involving logical relations,and the overall interconnection is realized.This paper also implements intelligent control of home appliances through scenario examples,thereby verifying the reliability of UHomeOS based on intelligent scenario interconnection.

Key words: IoT, Smart home, Operating system, Intelligent scene, Interconnection

CLC Number: 

  • TP316.9
[1] XXU H,KÖNIG L,GÁLIZ D,et al.A generic user interface for energy management in smart homes[J].Energy Informatics,2018,1(1).
[2] PALANCA J,VAL E D,GARCIA-FORNES A,et al.Designing a goal-oriented smart-home environment[J].Information Systems Frontiers,2016,20:125-142.
[3] JO H,YOON Y I.Intelligent smart home energy efficiency model using artificial TensorFlow engine[J].Human-centric Computing and Information Sciences,2018,8(1):9.
[4] Control4 Delivers the Smart Home OS [EB/OL].https://www.businesswire.com/news/home/20190523005101/en/,2019.
[5] MENG Y,LI S F,ZHANG Y C,et al.Security of information physical fusion system for Smart Home Platform[J].Journal of Computer Research and Development,2019,56(11).
[6] XU Y Z,LIN L K,LI D Q.The trend of artificial intelligence in computer research and development of community business[J].Commercial Times,2018(12):8-12.
[7] CHEN C,CHEN Y J.Internet platform model and traditionalenterprise reengineering [J].Science & Technology Progress and Policy,2016(6):84-88.
[8] RAVI P S,BHANU P S,MAHESH K S,et al.Designing OfSmart Home Automation System Based On Raspberry Pi[C]//Advancement in Science & Technology:International Conference on Communication Systems.AIP Publishing LLC,2016.
[9] PLOSZ S,MOLDOVAN I,TRINH T A,et al.Design and Implementation of a Practical Smart Home System Based on DECT Technology[J].Energy-Efficient Computing and Networking,2010,54:104-113.
[10] XU Y,REN J,WANG G J,et al.A Blockchain-based Nonrepudiation Network Computing Service Scheme for Industrial IoT[J].IEEE Transactions on Industrial Informatics,2019:1-1.
[11] WILSON C,HARGREAVES T,HAUXWELL-BALDWIN R.Smart homes and their users:a systematic analysis and key challenges[J].Personal & Ubiquitous Computing,2015,19(2):463-476.
[12] AID L,ZAOUI L,MOSTEFAOUI S A M.Using DEVS formodeling and simulation of ambient objects in intelligent buil-dings[J].Journal of Ambient Intelligence and Humanized Computing,2016,7(4):579-592.
[13] CHEN M,YANG J,ZHU X,et al.Smart Home 2.0:Innovative Smart Home System Powered by Botanical IoT and Emotion Detection[J].Mobile Networks and Applications,2017,22(6):1-11.
[14] PARK E,KIM S,KIM Y S,et al.Smart home services as the next mainstream of the ICT industry:determinants of the adoption of smart home services[J].Universal Access in the Information Society,2018,17:175-190.
[15] ZAIDAN A A,ZAIDAN B B.A review on intelligent process for smart home applications based on IoT:coherent taxonomy,motivation,open challenges,and recommendations[J].Artificial Intelligence Review,2020,53:141-165.
[1] MA Jun-yan, LI Yi, LI Shang-rong, ZHANG Te, ZHANG Ying. HATBED:A Distributed Hardware Assisted Tracing Testbed for IoT [J]. Computer Science, 2020, 47(9): 258-264.
[2] FENG Kai, LI Jing. Study on Subnetwork Reliability of k-ary n-cubes [J]. Computer Science, 2020, 47(7): 31-36.
[3] YANG Wei-chao, GUO Yuan-bo, LI Tao, ZHU Ben-quan. Method Based on Traffic Fingerprint for IoT Device Identification and IoT Security Model [J]. Computer Science, 2020, 47(7): 299-306.
[4] SHI Teng and SHI Hai-zhong. Model of Cartesian Product of Modulo p Residual Class Addition Group for Interconnection Networks [J]. Computer Science, 2020, 47(6A): 299-304.
[5] ZHOU Kai, REN Yi, WANG Zhe, GUAN Jian-bo, ZHANG Fang, ZHAO Yan-kang. Classification and Analysis of Ubuntu Bug Reports Based on Topic Model [J]. Computer Science, 2020, 47(12): 35-41.
[6] BAI Ruo-chen, PANG Chen-xin, JIA Jia, QIU Shu-guang, SHAO Jia, LU Xiao-jiao. Design of Cloud Platform for Energy Internet of Things Based on LPWAN Multi-protocol [J]. Computer Science, 2019, 46(6A): 589-592.
[7] LIU Meng-jun, SHA Tao, LI Dan, LIU Shu-bo. Reliable Security Lock Key Updating Scheme over Narrow Band Internet of Things [J]. Computer Science, 2019, 46(4): 137-143.
[8] QU Jia-bo, QIN Bo. Real-time Detection and Recognition Algorithm of Traffic Signs Based on ST-CNN [J]. Computer Science, 2019, 46(11A): 309-314.
[9] YANG Xia, YANG Shan, GUO Wen-sheng, SUN Hai-yong, ZHAO Xiao-yan and ZHANG Yang. Research and Implementation of Light-weight Mandatory Access Control Technology for RTOS [J]. Computer Science, 2018, 45(3): 138-143.
[10] LI Dong-yue, YANG Gang, QIAN Bo. Research on Architecture of Internet of Things [J]. Computer Science, 2018, 45(11A): 27-31.
[11] SHU Hong-mei, TAN Liang. Research and Development of Library Operating System [J]. Computer Science, 2018, 45(11): 37-44.
[12] JIA Ning. Research and Implementation of Campus Education Interconnection System for Intelligent Terminal [J]. Computer Science, 2017, 44(Z11): 573-576.
[13] LIN Cheng-kuan, ZHAO Yuan, FAN Jian-xi and CHENG Bao-lei. Research on Completely Independent Spanning Trees Based on Degree of Vertices [J]. Computer Science, 2017, 44(6): 94-96.
[14] YANG Yu-xing and QIU Ya-na. Sub-network Preclusion in (n,k)-bubble-sort Networks [J]. Computer Science, 2017, 44(11): 264-267.
[15] YU Ze-sheng, CUI Wen-hua and SHI Tian-wei. Application and Research on Gesture Recognition by Kinect Sensors [J]. Computer Science, 2016, 43(Z11): 568-571.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[2] WU Shu, ZHOU An-min and ZUO Zheng. PDiOS:Private API Call Detection in iOS Applications[J]. Computer Science, 2018, 45(4): 163 -168 .
[3] ZHAN Yun-jiao, WEI Ou and HU Jun. Formal Description of Requirement of Slats and Flaps Control System for DO-178C Case[J]. Computer Science, 2018, 45(4): 196 -202 .
[4] GUO Jun-xia, GUO Ren-fei, XU Nan-shan and ZHAO Rui-lian. Study on Construction of EFSM Model for Web Application Based on Session[J]. Computer Science, 2018, 45(4): 203 -207 .
[5] JIA Wei, HUA Qing-yi, ZHANG Min-jun, CHEN Rui, JI Xiang and WANG Bo. Mobile Interface Pattern Clustering Algorithm Based on Improved Particle Swarm Optimization[J]. Computer Science, 2018, 45(4): 220 -226 .
[6] DING Shu-yang, LI Bing and SHI Hong-bo. Study on Flexible Job-shop Scheduling Problem Based on Improved Discrete Particle Swarm Optimization Algorithm[J]. Computer Science, 2018, 45(4): 233 -239 .
[7] WEI Qin-shuang, WU You-xi, LIU Jing-yu and ZHU Huai-zhong. Distinguishing Sequence Patterns Mining Based on Density and Gap Constraints[J]. Computer Science, 2018, 45(4): 252 -256 .
[8] QIN Ke-yun and LIN Hong. Relationships among Several Attribute Reduction Methods of Decision Formal Context[J]. Computer Science, 2018, 45(4): 257 -259 .
[9] XU Zhou-bo, ZHANG Kun, NING Li-hua and GU Tian-long. Summary of Graph Edit Distance[J]. Computer Science, 2018, 45(4): 11 -18 .
[10] LI Hui, ZHOU Lin and XIN Wen-bo. Optimization of Networked Air-defense Operational Formation Structure Based on Bilevel Programming[J]. Computer Science, 2018, 45(4): 266 -272 .