Design And Construction Of A Perimeter Monitoring System Using Wired Sensors

ABSTRACT

The system signals if intruders are present by releasing an out via an email whenever an area is violated. This may, for instance, also be triggered by objects or items regardless of whether they are mobile or not. The system is about remotely managed and monitors environment by alerting through receive captured image of intruder as Email alert. Perimeter monitoring system has become indispensable in daily life. The design is on development of an environmental security system, based on human motion detection and remotely monitoring technology, to monitor and detect an intruder through email alerting system is presented in this paper. A PIR motion sensor and Camera module are used to detect motion and capture images respectively are dedicatedly make the security system alive as per the request.

The proposed system uses controller interface system with Atmega 32 which is low cost and consume smaller amount of power. When an intruder motion is detected at positioned environment, Camera module interfaced to Atmega 32 capture images, save it on system and send it as Email alert via TCP/IP. The concerned authority can control the system and view video stream of camera module through Smart mobile Phone.

Table of contents

Cover page

Title page

Approval page

Dedication

Acknowledgement

Abstract

Chapter one

Introduction

  • Background of study
  • Problem statement
  • Aim and objectives of the project
  • Significance of the project
  • Definition of terms

Chapter two

Literature review

  • Introduction
  • Concept of the wireless sensor network
  • Concept of smart environments
  • Concept of perimeter intrusion
  • Fundamentals of iot based perimeter intrusion systems
  • Concept of WSN and its communication architectural frameworks
  • Concept of camera motion
  • Types of camera motion
  • Review of related studies

Chapter three

Methodology

  • Introduction
  • Design requirements
  • Basic image processing algorithm
  • System block
  • System description
  • System hardware
  • System implementation
  • Software implementation for rcu

Chapter four

  • Results

Chapter five

  • Conclusion
  • References

Chapter One

1.0                                                            Introduction

1.1      Background to the Study

Motion can be distinguished in an arrangement of ways, and pointers are basically used for recognizing moving things (particularly people) and assembling data on position, speed increment, and speed. The movement of distinguishing genuine advancement in a given district is fundamental moving area; this ought to be conceivable by assessing the change of speed or vector of an article. The availability of a tremendous number of strong and complex computations displays the meaning of movement acknowledgment in the arrangement of a robotized perception structure. Motion capture is a development that licenses sensors to record human movement and cautiously map it to PC delivered creatures [5]. This advancement provides extraordinarily definite position and guidance information about unambiguous points of view, which can be picked by the experimenter. Improvement bearings, present data, speed profiles, and other execution records can be for the most part accumulated using motion following. Motion following a camera has been thought about in as a field known as PC vision for a long while. The progression of PC vision structures was as of late made sure to be the sole area of expert sign taking care of and man-made intellectual ability investigators and engineers. Regardless, various areas of making development have actually advanced toward new strategies for association [4]. Myron Krneger was a pioneer in the arrangement field, encouraging a piece of the fundamental body affiliation based cameras. He used a PC and a camera to make a continuous association between the advancements of the individuals and the environment [3]. The target of motion disclosure is to recognize the course of action of pixels that are through and through one of a kind between the last image of the gathering and the previous pictures given a lot of photos of a comparative scene taken at a couple of unmistakable times. Far off reconnaissance cameras are ending up being more commonly sent than standard wired cameras to screen and report interrupting or other unapproved development as a result of their flexibility and extraordinarily chipped away at foundation. As demonstrated by Market Research Future’s most recent survey, which was coordinated in 2020, the overall far off video noticing and perception market will create at a high yearly advancement speed of 16.85 percent from 2017 to 2023. Some distant reconnaissance cameras are made recognizable as an obstruction measure, yet that detectable quality could mean they are more feeble against mischief or thievery, criminals could end up being more enthusiastic about breaking in since they acknowledge the camera signals that there are resources inside the property, it is more direct to do whatever it takes not to be recorded, e.g., an adversary could find the weak sides (i.e., districts not inside the camera’s periphery vision) and impact them to make an effort not to be recorded. Along these lines, people could present far off cameras unnoticeably. In like manner, they are ordinarily captivating concentrations for adversaries hoping to avoid distinguishing proof. The speedy spread of distant cameras raises assurance issues related with unfortunate video recording, especially given the progressively more unobtrusive size of spy cameras. These cameras may be expeditiously camouflaged, so their targets don’t know anything about their presence. Incalculable far off cameras, including raving success models, have fundamental motion sensors. Arlo Pro 2 and Amazon Blink XT2 Because of the volume of data obtained by distant cameras, they stay for possible later use mode until improvement is distinguished, when the camera proceeds and starts recording, moving got video to the cloud backend server and telling the land proprietor. In like manner, the association experiences a flood in remote busy time gridlock. The camera will then, keep on recording until the movement stops. It then, at that point, returns to reinforcement mode. Since far off reconnaissance cameras put in various regions have changing consideration districts.  As a general rule, non-camera contraptions like PCs, mobile phones, and tablets make a combination of remote traffic streams. In like manner, perceiving which data streams have a spot with far off cameras is inconvenient, especially given that far off area (WLANs) use encryption frameworks like WEP, WPA, and WPA2 to avoid information put down some a reasonable compromise from loose snoopping. For all intents and purposes generally contemporary product network contraptions use 802.11 far off shows, which have a characteristic imperfection in that they uncover interface layer Media Access Control (MAC) addresses. Each MAC address, which is an incredibly strong all around novel distinctive verification, uncovers information about the contraption producer through the underlying three most critical MAC bytes, i.e., the Organizationally Unique Identifier (OUI). This upholds the usage of the OUI MAC areas to distinguish the presence of far off camera traffic.

1.2      Statement of the Problem

The security systems of a construction could intermittently forget to protect homes and workplaces. As demonstrated by a survey done by the FBI, all interference concerns occur while the owners are missing. Interlopers have entered properties at customary stretches reliably. Only 10% of these result in catches, while the remainder of to be overcomers of interferences. There are various solutions for this issue, similar to home motorization structures, alert acknowledgment systems, and so forth, however these structures might potentially deliver counterfeit cautions. This is in light of the fact that, generally speaking, there is an interest for security and prosperity in created conditions like homes and various premises.  The use of technology in recent times have been deployed to monitor, detect and even notify in cases of intrusion. One of such prominent technologies is the use of wireless sensor networks.  Hence the use of the wireless system network is very efficient in all aspects.

1.3      Aim and objectives

This study is aimed at design and development of a smart perimeter monitoring system.

Objectives

  1. Design a wireless sensor network system that can efficiently monitor the perimeter of a built area or premises.
  2. Design a wireless sensor network system that can detect, monitor and notify any form of intrusion within a premise.

1.4      Significance of the study

This study will be of significance in the following ways, the use of wireless sensor networks will ensure the security and safety of built area, and premises, the use of wireless sensor networks can also automate the monitoring of a built environment or a perimeter, the use of wireless sensor network will also enhance the applications of the use of sensor in other security aspects.  This Study will also be of benefit by increasing the knowledge at which the wireless sensor networks operate.

1.5      Definition of terms

WSN

Remote Sensor Networks (WSNs) are self-designed, framework free remote organizations that distinguish physical or natural factors like temperature, sound, vibration, tension, portability, or contamination and cooperatively communicate their information by means of the organization to a focal area or sink.

Intrusion detection

Human interference and motion acknowledgment structure can recognize the presence of an individual using sensors.

Perimeter

This can be described as the length of such a boundary.

2.0 INTRODUCTION:

This chapter provides the background and context of the research problems, reviews the existing literature on the Design And Construction Of A Perimeter Monitoring System Using Wired Sensors, and acknowledges the contributions of scholars who have previously conducted similar research [REV4459] …

Document Information

  • Format: DOC/PDF
  • Title: Design And Construction Of A Perimeter Monitoring System Using Wired Sensors:

YOU MAY LOVE THESE (Recommended)

Posted under:
INTRODUCTIONAttacks on computer by outside intruder are more publicized but the onesperpetrated by insiders are very common and often more damaging. Insidersrepresent the greatest threat to computer security because they understand theirorganization’s business and how their computer systems work. They have boththe confidentiality and access to perform these attacks. An inside attack willhave a higher probability of successfully breakin […]

54 Pages 1 - 5 Chapters 1,549 Words DOC/PDF Format Instant Download UPN1314

Posted under:

To start a project on Design And Implementation Of Computerized Economic Growth Monitoring System, follow these guidelines: Federal Ministry of Finance has always monitoring how economic growth is moving in this Nation. After the granting of internal autonomy to regions in 1946, there have been subsequent fiscal commission, military decrees Actes of Parliaments that reviewed both dreamed earning structure for Governme…

45 Pages 1 - 7 Chapters 5,075 Words DOC/PDF Format Instant Download UPN1527

Posted under:

To develop a project on Design And Implementation Of A Online Birth Rate Monitoring Information System, follow these approaches: This project is specially put together with the aim of monitoring infant and matality rate through the use of information system, it is believed that at the end of this work, its users would be able to know the importance involved in monitoring birth rate on every born child that is being born in…

37 Pages 1 - 7 Chapters 4,597 Words DOC/PDF Format Instant Download UPN1459

Posted under:

To undertake a project on Design And Implementation Of A Computer Case Filling System Of Drug Monitoring Agent, follow these effective ways: The manual approach used in the regulation of the investigation been carried out by the National Drug investigations is very devious and dress full. This research work investigated into the problems encountered due to the debilitation of hard dugs admitted into the country as well as in the socie…

60 Pages 1 - 7 Chapters 5,374 Words DOC/PDF Format Instant Download UPN1397

Posted under:

To write a project on Design And Implementation Of A Computer Based Quality Assurance Monitoring System, follow these structure: This study is based on the computerization of a quality assurance monitoring system of a manufacturing industry. It entails sourcing from all parts of the company on how they operate especially in the quality assurance department. This project is narrowed to the expected module. It is not the in…

46 Pages 1 - 7 Chapters 4,429 Words DOC/PDF Format Instant Download UPN1389

Posted under:

To carry out a project on Design And Implementation Of A Case Filling System For A Drug Monitoring Agency, follow these effective methods: The world over, it is indisputable that the introduction of computer technology in different facets of life, has virtually transformed and entranced information processing, which is very vital in any organization or parastatals of government. Not only as a means of information processing, has the…

133 Pages 1 - 5 Chapters 15,232 Words DOC/PDF Format Instant Download UPN1380

Posted under:

To start a project on Design And Development Of Home Intrusion And Burglary Detective Monitoring System, follow these guidelines: The main objective of this project was to ensure a proper security to building against theft or intruder. An intrusion detection systems are an integral part of most physical security systems. This device is widely used to isolate and protect public and private places such as airports, military b…

61 Pages 1 - 5 Chapters 8,427 Words DOC/PDF Format Instant Download UPN4521

Posted under:

To develop a project on Design And Construction Rechargeable Lamp Using LED With Charging Monitoring And Controlling System, follow these approaches: Nowadays, because of low energy or power consumption, low heat emission, low cost, the portability, wider application, LED bulbs are highly used than florescent lamp when building lantern. This work is on LED lantern with dual power supply which uses an AC source to power the lamp when there is …

51 Pages 1 - 5 Chapters 7,367 Words DOC/PDF Format Instant Download UPN4053

To undertake a project on Design And Construction Of Wireless Security Surveillance Camera, follow these effective ways: The implementation and use of video surveillance (Closed Circuit Television technology) in societies across the globe has stimulated major debate on a handful of topics. This report aims to highlight the importance of surveillance camera in electrical laboratory. The report will provide the reade…

49 Pages 1 - 5 Chapters 6,776 Words DOC/PDF Format Instant Download UPN2929

To write a project on Design And Construction Of A Weather Monitoring System Based On Arduino, follow these structure: Weather monitoring plays a very important role in human life hence study of weather system is necessary. Weather Forecast stations are used for the prediction of future weather conditions. These systems require intensive human efforts and are sometimes inaccurate in its prediction. Wireless weath…

64 Pages 1 - 5 Chapters 5,737 Words DOC/PDF Format Instant Download UPN3326

Live Chat