Design And Construction Of A Spy-Camera Controlled Smart Door Security System With Audio Status Alerts

Overview

CHAPTER ONE

1.0                                                                INTRODUCTION

1.1                                                  BACKGROUND OF THE STUDY

The first security motion detector system was invented in the early 1950s by Samuel Bango, and which was a burglar alarm. He applied the fundamentals of a radar to ultrasonic waves – a frequency to detect fire or thief and that which human beings cannot hear. Samuel motion detector is based on the principle of Doppler Effect (Patel et al., 2016). Nowadays, most of the motion detectors work on the principle of Samuel Bango’s detector. IR sensors and microwave sensors can detect motion by the alterations in the frequencies they emit.

A security motion detector systemis used as security systems in banks, offices and shopping malls, and also as intruder alarm in home. The prevailing motion detectors can stop serious accidents by sensing the persons who are in close proximity to the detector. We can observe motion detectors in shopping malls or stores with automatic doors. The main element in the motion detector circuit is the dual infrared reflective sensor or any other detecting sensor (Papatsimpa et al., 2018).

A security motion detector systemcontains an optical, microwave, or acoustic sensor, and in many cases a transmitter for illumination. However, a passive sensor only senses a signal emitted by the moving object itself. Changes in the optical, microwave, or acoustic field in the device’s proximity are interpreted by the electronics based on one of the technologies listed below. Most inexpensive motion detectors can detect up to distances of at least 15 feet (5 meters). Specialized systems are more expensive but have much longer ranges. Tomographic motion detection systems can cover much larger areas because the radio waves are at frequencies which penetrate most walls and obstructions, and are detected in multiple locations, not just at the location of the transmitter (Papatsimpa et al., 2018).

Security is the degree of protection against danger, loss and criminals. Throughout history,human have sought to protect their life, property and professions .The busy lifestyle of peopleis leading to the necessity of controlling the devices at home remotely and increasing thenecessity of keeping surveillance over their home. Now when everything is available to us wecan now design something that provides us complete security. The very basic of this beganwiththesimplealarmsystemwhichincludenotifyingsuspiciousactivitiesataverylowcost (Penning et al., 2016) .The needfor security system have rapidly grown from being specialized for high – riskareas such as banks ,companies ,governmental institutions),to be available and demandedrapidly by the average public. Some of the common characteristics of motion detection alarmand security system as follow 24 hours monitoring, difficult to hack, Ability to control doorsand motion sensor. The motion sensor used in this work is the pyroelectric device that detectsmotion by measuringchanges in the infrared levels emitted by surrounding objects.

This study is on building a spy-camera controlled smart door security system with audio status alerts. The system works in this way: when a visitor approaches the door, a spy camera captures the image and sends it to the homeowner’s preregistered GSM number. An audio alert message welcomes the guest and asks him/her to wait for access permission. The homeowner decides whether to grant the access or not, from the app installed on his android enabled GSM phone to monitor and control the door. There will be two sensors; One to check for the presence of human, another to check the distance of the person from the door. Once the visitor reaches a certain predefined distance from the door, the sensor sends signal to the microcontroller which activates the spy-camera and it captures the visitor’s image and sends it to the registered email address.

1.2                                                         PROBLEM STATEMENT

Many and different security devices have existed in the past but they are limited on buzzing an alarm, and sending SMS using GSM module when an object is detected. In most recently, CCTV’s usually seen at many places such as banks for continuously recordthe situation (Upasana et al., 2015), which is stored by an external storage device – digital video recorder (DVR). However, the proposed study alerts the user whenever any Intruder trying to break in our house by capturing and sending his photo to user’s telegram. The device was built around PIR motion detector and ESP32- CAM. Humanmotiondetectionistodevelopasystemtomonitorthearea while the ESP-32  Cam has an inbuilt webcamera and memory. ESP-32 cam captures the visitor and send it the captured image to the user’s GSM line, at the same time save it and an audio message will welcome the visitor, directing him to wait for access permission.Meanwhile, the registered phone number will be notified via SMS about the presence of the person and to enable the homeowner check his/her email for the image. Thereafter, he/she decides whether to grant access or otherwise.

1.3                                           AIM AND OBJECTIVES OF THE STUDY

The main aim of this work is to build an intelligent intruder motion alert and security that can sense thepresence of intruder and notifies theowners immediately by capturing and sending intruder’s photo to user’s GSM line.

The objectives of the study are:

  1. To monitor doors using spy camera- (to detect when visitors approach the door)
  2. To detect motion – (for visitors alert)
  • To activate an audio message welcoming device that will welcome the guest and asks him to wait for access permission.
  1. To use spy camera to captures the image of the visitor and sends it to the homeowner’s preregistered GSM number.
  2. To provide a very cost effective security system that can be placed anywhere in the house withlessmaintenancecost.

1.4                                            SCOPE / LIMITATION OF THE STUDY

The scope of this study covers the design Real time security system usingHumanmotiondetection and spy cameratodevelopasystemtomonitortheany movement close to the door. There will be two sensors; One to check for the presence of human, another to check the distance of the person from the door. Once the visitor reaches a certain predefined distance from the door, the sensor sends signal to the microcontroller which activates the spy-camera and it captures the visitor’s image and sends it to the registered email address.

1.5                                                   SIGNIFICANCE OF THE STUDY

This study shall serve as a means of promoting security in our environment without human intervention. To the student involved, this study will help him to become familiar with the ESP32-CAM Development board and PIR sensor.

Chapter Two: Literature Review

2.0 INTRODUCTION:

This chapter provides the background and context of the research problems, reviews the existing literature on the Design And Construction Of A Spy-Camera Controlled Smart Door Security System With Audio Status Alerts, and acknowledges the contributions of scholars who have previously conducted similar research [REV27252] …

Document Information

    • Format: DOC/PDF
    • Type: Project Material
    • Title: Design And Construction Of A Spy-Camera Controlled Smart Door Security System With Audio Status Alerts:

YOU MAY LOVE THESE (Recommended)

  • Role Of School Administrator In Managing Insecurity Challenges In Nigeria School System

    To write about the Role Of School Administrator In Managing Insecurity Challenges In Nigeria School System research project, follow this helpful guideline: This study was carried out to examine the role of school administrator in managing insecurity challenges in Nigeria school system using selected secondary Emuoha Local Government Area, Rivers State as a case study. The study was carried out to determine the prevalence of insecurity challenges in …

    59 Pages 1 - 5 Chapters 13,874 Words DOC/PDF Format Instant Download UPN41250

  • Design And Implementation Of Radio Controlled Car Lock With 5min Ignition Deactivation

    To write about the Design And Implementation Of Radio Controlled Car Lock With 5min Ignition Deactivation research project, follow this helpful guideline: The rate of car theft nowadays according to daily crime analysis is on the increase. Manual key locks have proven to be inefficient. This thesis aims at designing a radio-controlled car door locking system. The two main objectives are to unlock a set of vehicle doors when the owner approaches his…

    74 Pages 1 - 5 Chapters 14,507 Words DOC/PDF Format Instant Download UPN24887

  • Design And Implementation Of Face Recognition – Based Door Access Control System

    To write about the Design And Implementation Of Face Recognition – Based Door Access Control System research project, follow this helpful guideline: With recent dramatic development in the field of artificial intelligence (AI), smart access control has become crucial part of our modern everyday lives. This paper presents a door security system designed to prevent trespassing in a highly secure areas like home environment. The implemented syst…

    46 Pages 1 - 5 Chapters 8,666 Words DOC/PDF Format Instant Download UPN50828

  • Design And Implementation Of A Smart Door Lock System Using Finger Print

    To write about the Design And Implementation Of A Smart Door Lock System Using Finger Print research project, follow this helpful guideline: Authentication plays a very critical role in security-related applications like e-commerce. There are a number of methods and techniques for accomplishing this key process. In this regard, biometrics is gaining increasing attention these days. Security systems, having realized the value of biomet…

    42 Pages 1 - 5 Chapters 5,726 Words DOC/PDF Format Instant Download UPN25621

  • 1.0 INTRODUCTION 1.1 BACKGROUND OF THE STUDY The need for having home protection has always been there. But in the recent times, considering a dramatic rise in petty crimes like robbery and theft, the need has been more strongly felt to have a fool proof protection of the belongings and the family members. Home security has come a long way in the last few decades. It was in the hands of a guard who manually provided surveillance during […]

    64 Pages 1 - 5 Chapters 10,002 Words DOC/PDF Format Instant Download UPN26955

  • Reduction Of Oil Spillage Using Wood Plastic Composite From Saw Dust, White Sand And Low Density Polyethylene Waste

    To write about the Reduction Of Oil Spillage Using Wood Plastic Composite From Saw Dust, White Sand And Low Density Polyethylene Waste research project, follow this helpful guideline: Wood plastic composite (WPC) is a combination of wood and plastic with the plastic as the matrix and the wood as the reinforcement. WPC can be made from virgin materials as well as recycled ones. This work presents a study of WPC made from recycled plastic waste, sawdust, white sand and low densi…

  • Utilization Of Plantain Stem Fibre For Making Wrapping Materials

    To write about the Utilization Of Plantain Stem Fibre For Making Wrapping Materials research project, follow this helpful guideline: Wood has historically been a primary raw material for pulp, paper, and fiber-based products. However, the escalating demand for wood in construction, furniture, fuel, charcoal, and other industries, coupled with concerns about deforestation and wood scarcity in many regions, has spurred interest …

    39 Pages 1 - 5 Chapters 9,247 Words DOC/PDF Format Instant Download UPN47998

  • Design And Implementation Of A Bill Of Materials Processing System

    To write about the Design And Implementation Of A Bill Of Materials Processing System research project, follow this helpful guideline: With the trend of technology growth in the world of today, virtually every facet of human work has been affected; even the remotest of it all, and the production circle cannot be left out. This study was carried out to verify all the manual processes involved in bill-of-material processing system…

    66 Pages 1 - 7 Chapters 7,577 Words DOC/PDF Format Instant Download UPN24027

  • Design Of A Computer Assisted Multiple Choice Examination System

    To write about the Design Of A Computer Assisted Multiple Choice Examination System research project, follow this helpful guideline: With the thoughtful application of emerging technologies and in a bid to improve on the effort towards the conduction of the multiple choice assessments, this project is designed to automate all multiple choice assessments and examinations in the department of computer science, Federal Polytechni…

    71 Pages 1 - 6 Chapters 8,466 Words DOC/PDF Format Instant Download UPN24220

  • Design And Implementation Of An Online Driving School Management System

    To write about the Design And Implementation Of An Online Driving School Management System research project, follow this helpful guideline: With the rapid development in technology, there is a need to develop a management system for drive-training enterprise. Driving-training school’s efficiency will be managed and the will be a reduced waste of human power and information resources. The Management System will grow for the most part …

    44 Pages 1 - 5 Chapters 8,483 Words DOC/PDF Format Instant Download UPN27639

Live Chat