Académique Documents
Professionnel Documents
Culture Documents
Abstract: The security is a scenario in which objects, animals or people are provided with unique identifiers and the
ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. The
webcam has evolved from the convergence of wireless technologies and the Internet. The security system is the
communication of anything with any other thing, the communication mainly transferring of useable data, for example,
a sensor in a room to monitor and control the temperature. To describe a security alarm system using low processing
power chips using Internet of things which helps to monitor and get alarms when motion is detected and sends photos
and videos to a cloud server. Moreover, Internet of things based application can be used remotely to view the activity and
get notifications when motion is detected. The photos and videos are sent directly to a cloud server when the cloud is not
available then the data is stored locally on the Raspberry Pi and sent when the connection resumes. Therefore,
advantages like these make this application ideal for monitoring homes in absence.
I. INTRODUCTION
This system is consist of both hardware and software requirements. The hardware requirement is raspberry pi model b,
webcam, pir sensor, power cable, keyboard, mouse, sd card. The software requirements Raspbian OS (jessie), Python
programming language. Open CV, Win 32 Disk imager, SD Formatter.Raspberry Pi is connected to the USB camera with
the help of USB port. In the PC, the Raspbian operating system is installed. Raspberry-pi works only on the Raspbian
operating system, Linux, Raspbian is a free operating system based on Debian optimized for the Raspberry Pi hardware. An
operating system is the set of basic programs and utilities that make your Raspberry Pi run. However, Raspbian provides
more than a pure OS: it comes with over 35,000 packages; pre-compiled software bundled in a nice format for easy
installation on your Raspberry Pi. Putty configuration and VNC viewer are needed to install Raspbian OS. Putty
configuration is SSH and Telnet client. It is open source software that is available with source code.
II. BLOCK DIAGRAM
Fig1:Raspberry pi
___________________________________________________________________________________________________
IJIRAE: Impact Factor Value SJIF: Innospace, Morocco (2016): 3.916 | PIF: 2.469 | Jour Info: 4.085 |
ISRAJIF (2016): 3.715 | Indexcopernicus: (ICV 2015): 47.91
IJIRAE 2014- 17, All Rights Reserved Page -11
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Issue 04, Volume 4 (April 2017) www.ijirae.com
Plug the preloaded SD Card into the Pi. Plug the USB keyboard and mouse into the Pi, perhaps via a USB the video cable
into the screen (TV) and into the Pi. Plug your extras into the Pi (USB Wi-Fi, Ethernet cable, hard drive etc.). This is where
you may really need a USB Hub. Ensure that your USB Hub (if any) and screen are working. Plug the power source into
the main socket. With your screen on, plug the other end of the power source into the Pi. The Pi should boot up and display
messages on the screen Hub. Connect the Hub to power, if necessary. Plug
III. PIR SENSOR
A passive infrared sensor (PIR sensor) is an electronic sensor that measures infrared (IR) light radiating from objects in its
field of view. They are most often used in PIR-based motion detectors. All objects with a temperature above absolute zero
emit heat energy in the form of radiation. Usually, this radiation is invisible to the human eye because it radiates at infrared
wavelengths, but it can be detected by electronic devices designed for such a purpose. The term passive in this instance
refers to the fact that PIR devices do not generate or radiate any energy for detection purposes. They work entirely by
detecting the energy given off by other objects. PIR sensors don't detect or measure "heat"; instead, they detect the infrared
radiation emitted or reflected from an object.
IV. WEBCAM
A webcam is a video camera which feeds its images in real time to a computer or computer network, often via USB,
Ethernet or Wi-Fi. Their most popular use is the establishment of video links, permitting computers to act as videophones
or videoconference stations. This common use as a video camera for the World Wide Web gave the webcam its name.
Other popular uses include security surveillance and computer vision. The Webcams are known for their low
manufacturing cost and flexibility, making them the lowest cost form of video telephony. They have also become a source
of security and privacy issues, as some built-in webcams can be remotely activated via spyware.
V.GSM
1. DEFINITION
Global system for mobile communication (GSM) is a globally accepted standard for digital cellular communication. GSM
is the name of a standardization group established in 1982 to create a common European mobile telephone standard that
would formulate specifications for a pan-European mobile cellular radio system operating at 900 MHz
2. THE GSM NETWORK
GSM provides recommendations, not requirements. The GSM specifications define the functions and interface
requirements in detail but do not address the hardware. The reason for this is to limit the designers as little as possible but
still to make it possible for the operators to buy equipment from different suppliers. The GSM network is divided into three
major systems: the switching system (SS), the base station system (BSS), and the operation and support system (OSS). The
basic GSM network elements are shown in below figure
___________________________________________________________________________________________________
IJIRAE: Impact Factor Value SJIF: Innospace, Morocco (2016): 3.916 | PIF: 2.469 | Jour Info: 4.085 |
ISRAJIF (2016): 3.715 | Indexcopernicus: (ICV 2015): 47.91
IJIRAE 2014- 17, All Rights Reserved Page -12
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Issue 04, Volume 4 (April 2017) www.ijirae.com
As mentioned in earlier sections of this SMS tutorial, computers use AT commands to control modems. Both GSM
modems and dial-up modems support a common set of standard AT commands. You can use a GSM modem just like a
dial-up modem.
Fig 4:RASBERRY PI
Phase detection shows unauthorized person after detecting it sends an email id to the authorized. Person The image is sent
from the storage to the cloud. Server with the help of internet from where an email. Is send to the authorized person. Ansms
is also send to the authorized person via gsm sim. Sms sent to the authorized person is an un authorized person entry.
___________________________________________________________________________________________________
IJIRAE: Impact Factor Value SJIF: Innospace, Morocco (2016): 3.916 | PIF: 2.469 | Jour Info: 4.085 |
ISRAJIF (2016): 3.715 | Indexcopernicus: (ICV 2015): 47.91
IJIRAE 2014- 17, All Rights Reserved Page -14
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Issue 04, Volume 4 (April 2017) www.ijirae.com
___________________________________________________________________________________________________
IJIRAE: Impact Factor Value SJIF: Innospace, Morocco (2016): 3.916 | PIF: 2.469 | Jour Info: 4.085 |
ISRAJIF (2016): 3.715 | Indexcopernicus: (ICV 2015): 47.91
IJIRAE 2014- 17, All Rights Reserved Page -15