Book Image

Internet of Things Programming Projects

By : Colin Dow
Book Image

Internet of Things Programming Projects

By: Colin Dow

Overview of this book

The Internet of Things (IOT) has managed to attract the attention of researchers and tech enthusiasts, since it powerfully combines classical networks with instruments and devices. In Internet of Things Programming Projects, we unleash the power of Raspberry Pi and Python to create engaging projects. In the first part of the book, you’ll be introduced to the Raspberry Pi, learn how to set it up, and then jump right into Python programming. Then, you’ll dive into real-world computing by creating a“Hello World” app using flash LEDs. As you make your way through the chapters, you’ll go back to an age when analog needle meters ruled the world of data display. You’ll learn to retrieve weather data from a web service and display it on an analog needle meter, and build a home security system using the Raspberry Pi. The next project has a modern twist, where we employ the Raspberry Pi to send a signal to a web service that will send you a text when someone is at the door. In the final project, you take what you've learned from the previous two projects and create an IoT robot car that you can use to monitor what your pets are up to when you are away. By the end of this book, you will be well versed in almost every possible way to make your IoT projects stand out.
Table of Contents (21 chapters)

Questions

  1. True or false? The DHT11 sensor is an expensive and highly accurate sensor for temperature and humidity.
  2. True or false? The DHT11 sensor can detect UV rays from the sun.
  3. True or false? Code needed to run the DHT11 comes pre-installed with Raspbian.
  4. How do you set the resolution of the Pi camera module?
  5. How do you set up CherryPy so that it can access local static files?
  6. How do you set up an automatic refresh for a web page?
  7. True or false? Through the use of CSS, we are able to simulate a flashing LED.
  8. What is the purpose of the SecurityData class?
  9. Who or what did we find as our intruder?
  10. If we wanted to be sticklers, how would we change our SecurityData class?