Design & Implementation of Raspberry Pi Based Security System.

Subscribe to access this work and thousands more

TABLE OF CONTENTS

DECLARATION................................................................................................................................i

APPROVAL ...................................................................................................................................... ii

ACKNOWLEDGEMENT................................................................................................................ iii

TABLE OF CONTENTS ................................................................................................................. iv

LIST OF ACRONYMS .................................................................................................................. viii

ABSTRACT ..................................................................................................................................... ix

CHAPTER ONE..............................................................................................................................1

1.0 Introduction..................................................................................................................................1

1.1 Problem Statement.......................................................................................................................2

1.2 Objectives of the Study................................................................................................................2

1.2.1 Main Objective:........................................................................................................................2

1.2.2 Specific Objectives: ..................................................................................................................3

2.2.3 Research Questions...................................................................................................................3

2.3 Scope of the project: ....................................................................................................................3

2.4 Significance of the study..............................................................................................................4

CHAPTER TWO..............................................................................................................................5

Literature Review................................................................................................................................5

2.0 Introduction...................................................................................................................................5

2.1 Theoretical Review......................................................................................................................6

2.1.1 Background...............................................................................................................................6

CHAPTER THREE:........................................................................................................................8

METHODOLOGY ..........................................................................................................................8

3.1 Introduction..................................................................................................................................8

3.2 Data Collection. ...........................................................................................................................8

3.3 Major Components Used .............................................................................................................8

3.4 System Design. ............................................................................................................................8

3.4.1 The Raspberry Pi ......................................................................................................................8

v

3.4.2 The Raspberry Pi Models..........................................................................................................9

3.4.3 Programming the Raspberry Pi...............................................................................................10

3.4.4 Raspberry Pi Operating Systems.............................................................................................11

3.5 The Pi Camera Module ..............................................................................................................11

3.5.1 The hardware connection of camera to the PI ........................................................................12

3.6 Power Supply Circuit.................................................................................................................12

3.7 Cooling Fan................................................................................................................................12

3.7.1 Specifications:.........................................................................................................................13

3.8 Software.....................................................................................................................................13

3.9 Hardware System.......................................................................................................................13

3.10 Conceptual Design/Framework. ..............................................................................................13

3.11 Block Diagram for Raspberry Pi Based Security System........................................................14

3.12 Circuit Diagram for Raspberry Pi Based Security System ......................................................14

3.13 system Working Principle........................................................................................................14

3.14 Flow Chart for Raspberry Pi Based Security System ..............................................................15

3.15 System initialization and configuration ...................................................................................16

3.15.1 Read a Channel .....................................................................................................................16

3.15.2 Drive a channel .....................................................................................................................16

3.16 Source code .............................................................................................................................16

3.16.1 Developing the Full Code Listing.........................................................................................17

3.16.2 Full code listing......................................................................................................................17

3.17 OpenCv – Python Video Processing........................................................................................20

CHAPTER FOUR: ........................................................................................................................21

RESULTS AND DISCUSSION....................................................................................................21

4.0 Introduction................................................................................................................................21

4.1 Hardware testing........................................................................................................................21

4.1.1 Continuity Test .......................................................................................................................21

4.1.2 Power on Test .........................................................................................................................21

4.2 Email Notification .....................................................................................................................21

4.3 Enabling the Pi Camera .............................................................................................................22

vi

CHAPTER FIVE ...........................................................................................................................23

RECOMMENDATIONS, CONCLUSION AND FUTURE SCOPE OF WORK....................23

5.0 Conclusions................................................................................................................................23

5.1 Recommendations......................................................................................................................23

CHAPTER SIX ..............................................................................................................................24

REFERENCES ................................................................................................................................24

APPENDICES .................................................................................................................................26

ABSTRACT Raspberry Pi Based Security System For Electricity, Presents the idea of monitoring a particular place in a remote area. This project deals with the design approach of an Embedded Real-Time Investigation System Based Raspberry Pi SBC for intruder detection that reinforces surveillance technology to provide essential security to our life and associated control and alert operations. The proposed security solution hinges on our novel integration of cameras and motion detectors into web application. Raspberry Pi operates and controls motion detectors and video cameras for remote sensing and surveillance, streams live video and records it for future playback. This research is focused on developing a surveillance system that detects strangers and to response speedily by capturing and relaying images to owner based wireless module.

Subscribe to access this work and thousands more
Overall Rating

0

5 Star
(0)
4 Star
(0)
3 Star
(0)
2 Star
(0)
1 Star
(0)
APA

INNOCENT, B (2022). Design & Implementation of Raspberry Pi Based Security System.. Afribary. Retrieved from https://afribary.com/works/design-implementation-of-raspberry-pi-based-security-system

MLA 8th

INNOCENT, BOGERE "Design & Implementation of Raspberry Pi Based Security System." Afribary. Afribary, 20 Aug. 2022, https://afribary.com/works/design-implementation-of-raspberry-pi-based-security-system. Accessed 30 Nov. 2022.

MLA7

INNOCENT, BOGERE . "Design & Implementation of Raspberry Pi Based Security System.". Afribary, Afribary, 20 Aug. 2022. Web. 30 Nov. 2022. < https://afribary.com/works/design-implementation-of-raspberry-pi-based-security-system >.

Chicago

INNOCENT, BOGERE . "Design & Implementation of Raspberry Pi Based Security System." Afribary (2022). Accessed November 30, 2022. https://afribary.com/works/design-implementation-of-raspberry-pi-based-security-system