Vous êtes sur la page 1sur 5

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163

Issue 04, Volume 4 (April 2017) www.ijirae.com

Smart Surveillance Monitoring System using Raspberry


pi and pir sensor
N.Sugumaran1, G.V.Vijay2, E.Annadevi3
1,2
Student, Department of ECE, Sathyabama University,
3
Assistant Professor, Department of ECE, Sathyabama University,
Manuscript History
Number: IJIRAE/RS/Vol.04/Issue04/APAE10082
Received: 29, March 2017
Final Correction: 08, April 2017
Final Accepted: 08, April 2017
Published: April 2017

Abstract: The security is a scenario in which objects, animals or people are provided with unique identifiers and the
ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. The
webcam has evolved from the convergence of wireless technologies and the Internet. The security system is the
communication of anything with any other thing, the communication mainly transferring of useable data, for example,
a sensor in a room to monitor and control the temperature. To describe a security alarm system using low processing
power chips using Internet of things which helps to monitor and get alarms when motion is detected and sends photos
and videos to a cloud server. Moreover, Internet of things based application can be used remotely to view the activity and
get notifications when motion is detected. The photos and videos are sent directly to a cloud server when the cloud is not
available then the data is stored locally on the Raspberry Pi and sent when the connection resumes. Therefore,
advantages like these make this application ideal for monitoring homes in absence.

I. INTRODUCTION
This system is consist of both hardware and software requirements. The hardware requirement is raspberry pi model b,
webcam, pir sensor, power cable, keyboard, mouse, sd card. The software requirements Raspbian OS (jessie), Python
programming language. Open CV, Win 32 Disk imager, SD Formatter.Raspberry Pi is connected to the USB camera with
the help of USB port. In the PC, the Raspbian operating system is installed. Raspberry-pi works only on the Raspbian
operating system, Linux, Raspbian is a free operating system based on Debian optimized for the Raspberry Pi hardware. An
operating system is the set of basic programs and utilities that make your Raspberry Pi run. However, Raspbian provides
more than a pure OS: it comes with over 35,000 packages; pre-compiled software bundled in a nice format for easy
installation on your Raspberry Pi. Putty configuration and VNC viewer are needed to install Raspbian OS. Putty
configuration is SSH and Telnet client. It is open source software that is available with source code.
II. BLOCK DIAGRAM

Fig1:Raspberry pi
___________________________________________________________________________________________________
IJIRAE: Impact Factor Value SJIF: Innospace, Morocco (2016): 3.916 | PIF: 2.469 | Jour Info: 4.085 |
ISRAJIF (2016): 3.715 | Indexcopernicus: (ICV 2015): 47.91
IJIRAE 2014- 17, All Rights Reserved Page -11
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Issue 04, Volume 4 (April 2017) www.ijirae.com

Plug the preloaded SD Card into the Pi. Plug the USB keyboard and mouse into the Pi, perhaps via a USB the video cable
into the screen (TV) and into the Pi. Plug your extras into the Pi (USB Wi-Fi, Ethernet cable, hard drive etc.). This is where
you may really need a USB Hub. Ensure that your USB Hub (if any) and screen are working. Plug the power source into
the main socket. With your screen on, plug the other end of the power source into the Pi. The Pi should boot up and display
messages on the screen Hub. Connect the Hub to power, if necessary. Plug
III. PIR SENSOR
A passive infrared sensor (PIR sensor) is an electronic sensor that measures infrared (IR) light radiating from objects in its
field of view. They are most often used in PIR-based motion detectors. All objects with a temperature above absolute zero
emit heat energy in the form of radiation. Usually, this radiation is invisible to the human eye because it radiates at infrared
wavelengths, but it can be detected by electronic devices designed for such a purpose. The term passive in this instance
refers to the fact that PIR devices do not generate or radiate any energy for detection purposes. They work entirely by
detecting the energy given off by other objects. PIR sensors don't detect or measure "heat"; instead, they detect the infrared
radiation emitted or reflected from an object.
IV. WEBCAM
A webcam is a video camera which feeds its images in real time to a computer or computer network, often via USB,
Ethernet or Wi-Fi. Their most popular use is the establishment of video links, permitting computers to act as videophones
or videoconference stations. This common use as a video camera for the World Wide Web gave the webcam its name.
Other popular uses include security surveillance and computer vision. The Webcams are known for their low
manufacturing cost and flexibility, making them the lowest cost form of video telephony. They have also become a source
of security and privacy issues, as some built-in webcams can be remotely activated via spyware.
V.GSM
1. DEFINITION
Global system for mobile communication (GSM) is a globally accepted standard for digital cellular communication. GSM
is the name of a standardization group established in 1982 to create a common European mobile telephone standard that
would formulate specifications for a pan-European mobile cellular radio system operating at 900 MHz
2. THE GSM NETWORK
GSM provides recommendations, not requirements. The GSM specifications define the functions and interface
requirements in detail but do not address the hardware. The reason for this is to limit the designers as little as possible but
still to make it possible for the operators to buy equipment from different suppliers. The GSM network is divided into three
major systems: the switching system (SS), the base station system (BSS), and the operation and support system (OSS). The
basic GSM network elements are shown in below figure

FIG2: GSM NETWORK ELEMENT


3. GSM MODEM
A GSM modem is a wireless modem that works with a GSM wireless network. A wireless modem behaves like a dial-up
modem. The main difference between them is that a dial-up modem sends and receives data through a fixed telephone line
while a wireless modem sends and receives data through radio waves. A GSM modem can be an external device or a PC
Card / PCMCIA Card. Typically, an external GSM modem is connected to a computer through a serial cable or a USB
cable. A GSM modem in the form of a PC Card / PCMCIA Card is designed for use with a laptop computer. It should be
inserted into one of the PC Card / PCMCIA Card slots of a laptop computer. Like a GSM mobile phone, a GSM modem
requires a SIM card from a wireless carrier in order to operate.

___________________________________________________________________________________________________
IJIRAE: Impact Factor Value SJIF: Innospace, Morocco (2016): 3.916 | PIF: 2.469 | Jour Info: 4.085 |
ISRAJIF (2016): 3.715 | Indexcopernicus: (ICV 2015): 47.91
IJIRAE 2014- 17, All Rights Reserved Page -12
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Issue 04, Volume 4 (April 2017) www.ijirae.com

As mentioned in earlier sections of this SMS tutorial, computers use AT commands to control modems. Both GSM
modems and dial-up modems support a common set of standard AT commands. You can use a GSM modem just like a
dial-up modem.

FIG 3:GSM OPERATION


In addition to the standard AT commands, GSM modems support an extended set of AT commands. These extended AT
commands are defined in the GSM standards. With the extended AT commands, you can do things like Reading, writing
and deleting SMS messages. Sending SMS messages monitoring the signal strength. Monitoring the charging status and
charge level of the battery. Reading, writing and searching phone book entries. The number of SMS messages that can be
processed by a GSM modem per minute is very low -- only about six to ten SMS messages per minute.

Fig 4:RASBERRY PI

Fig5: PIR SENSOR


___________________________________________________________________________________________________
IJIRAE: Impact Factor Value SJIF: Innospace, Morocco (2016): 3.916 | PIF: 2.469 | Jour Info: 4.085 |
ISRAJIF (2016): 3.715 | Indexcopernicus: (ICV 2015): 47.91
IJIRAE 2014- 17, All Rights Reserved Page -13
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Issue 04, Volume 4 (April 2017) www.ijirae.com

VI. EXISTING SYSTEM


A smart surveillance system capable of recording/capturing video/image and transmitting to any system has been designed.
Existing is sensor less capturing system based on raspberry pi based controllers. It cant monitor exact motion without PIR
sensor. It is advantageous as it offers reliability and privacy on both sides. It is authenticated and encrypted on the receiver
side; hence it offers only the person concerned to view the details. Necessary action can be taken in short span of time in
case of emergency conditions such as monitoring elder person, military areas, smart homes, offices, industries etc., Future
work is to locate number of persons located exactly in that area and their position so that accurate information can be
obtained on receiver side
VII. PROPOSED SYSTEM
This paper deals with the design and implementation of Smart surveillance monitoring system using Raspberry pi and PIR
sensor for mobile devices. It increases the usage of mobile technology to provide essential security to our homes and for
other control applications. The proposed home security system captures information and transmits it to the respective mail
using the internet. Raspberry pi operates and controls motion detectors and video cameras for remote sensing and
surveillance, streams live video and records it for future playback. It can also find the number of persons located with the
help of the Infrared sensor. For example, when motion is detected, the cameras automatically initiate recording and the
Raspberry pi device alerts the owner of the possible intrusion having a smart phone. Raspberry- Pi has two main
components interacting with each other. we can able send it to the email automatically. We can able to alert the people
using IOT technology.

Fig 6 Block diagram of proposed work

VIII. IMPLEMENTATION RESULT

Phase detection shows unauthorized person after detecting it sends an email id to the authorized. Person The image is sent
from the storage to the cloud. Server with the help of internet from where an email. Is send to the authorized person. Ansms
is also send to the authorized person via gsm sim. Sms sent to the authorized person is an un authorized person entry.

Fig7:Face detected as unknown

___________________________________________________________________________________________________
IJIRAE: Impact Factor Value SJIF: Innospace, Morocco (2016): 3.916 | PIF: 2.469 | Jour Info: 4.085 |
ISRAJIF (2016): 3.715 | Indexcopernicus: (ICV 2015): 47.91
IJIRAE 2014- 17, All Rights Reserved Page -14
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Issue 04, Volume 4 (April 2017) www.ijirae.com

Fig8: msg sent to the authorized person

Fig9: Email sent to authourized person


IX. CONCLUSION
Henceforth, by enhancing the capabilities of these technologies and integrating them, we hope to introduce the 'Motion
Detection' system and to contribute to the current security system. This system would be an alternative for expensive
security systems being used in the present day. This system does not require any special modifications to the infrastructure
where installation is required and can be implemented without any hassle. I have tested these system for180 days and have
found 99.9% accurate notifications and results
REFERNCES
[1]. Sharma, Rupam Kumar, et al. "Android interface based GSM homesecurity system." Issues and Challenges in
Intelligent ComputingTechniques (ICICT), 2014NInternational Conference on. IEEE,2014.
[2]. De Luca, Gabriele, et al. "The use of NFC and Networks (SoftCOM), 2013 21st InternationalConference on. IEEE,
2013.
[3]. Gu, Yi, et al. "Design and Implementation of UPnP-BasedSurveillance Camera System for Home Security."
InformationScience and Applications (ICISA), 2013 International Conference on.IEEE, 2013.
[4]. Van ThanhTrung, Bui, and Nguyen Van Cuong. "Monitoring andcontrolling devices system by GPRS on FPGA
platform."AdvancedTechnologies for Communications (ATC), 2013 InternationalConference on. IEEE, 2013.
[5]. Android technologiesto enable a KNX-based smart home." Software, Telecommunications and Computer
D.O.Olguinet al., Sensible organizations: Technology and methodology for automatically measuring organizational
behavior, IEEETrans.Syst., Man, Cybern. B, Cybern. Feb. 2009.
[6]. J. Baek and B.-J.Yun, Posture monitoring system for context awareness in mobile computing,IEEE Trans. Instrum.
Meas. Jun. 2010.
[7]. G. Hache, E. D. Lemaire, and N. Baddour, Wearable mobility monitoring using a multimedia smartphone platform,
IEEE Trans. Instrum.Meas., Sep. 2011.
[8]. M. Elhoushi, J. Georgy, A. Noureldin, and M. J. Korenberg, Motion mode recognition for indoor pedestrian
navigation using portable devices,IEEE Trans. Instrum.Meas.,Jan. 2016.
[9]. F. Wahl, M. Milenkovic, and O. Amft, A distributed PIR-based approach for estimating people count in office
environments, inProc.IEEE 15th Int. Conf. Computer. Sci. Eng. (CSE), Nicosia, Cyprus, Dec. 2012,
[10]. F. Erden, A. Z. Alkar, and A. E. Cetin, A robust system for counting people using an infrared sensor and a camera,
Infrared Phys. Techno, Sep. 2015.

___________________________________________________________________________________________________
IJIRAE: Impact Factor Value SJIF: Innospace, Morocco (2016): 3.916 | PIF: 2.469 | Jour Info: 4.085 |
ISRAJIF (2016): 3.715 | Indexcopernicus: (ICV 2015): 47.91
IJIRAE 2014- 17, All Rights Reserved Page -15

Vous aimerez peut-être aussi