DESIGN & IMPLEMENTATION OF RASPBERRY PI BASED SECURITY SYSTEM.

  • Type: Project
  • Department: Computer Engineering
  • Project ID: CPE0058
  • Access Fee: ₦5,000 ($14)
  • Pages: 38 Pages
  • Format: Microsoft Word
  • Views: 437
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

TABLE OF CONTENTS

DECLARATION................................................................................................................................i

APPROVAL ...................................................................................................................................... ii

ACKNOWLEDGEMENT................................................................................................................ iii

TABLE OF CONTENTS ................................................................................................................. iv

LIST OF ACRONYMS .................................................................................................................. viii

ABSTRACT ..................................................................................................................................... ix

CHAPTER ONE..............................................................................................................................1

1.0 Introduction..................................................................................................................................1

1.1 Problem Statement.......................................................................................................................2

1.2 Objectives of the Study................................................................................................................2

1.2.1 Main Objective:........................................................................................................................2

1.2.2 Specific Objectives: ..................................................................................................................3

2.2.3 Research Questions...................................................................................................................3

2.3 Scope of the project: ....................................................................................................................3

2.4 Significance of the study..............................................................................................................4

CHAPTER TWO..............................................................................................................................5

Literature Review................................................................................................................................5

2.0 Introduction...................................................................................................................................5

2.1 Theoretical Review......................................................................................................................6

2.1.1 Background...............................................................................................................................6

CHAPTER THREE:........................................................................................................................8

METHODOLOGY ..........................................................................................................................8

3.1 Introduction..................................................................................................................................8

3.2 Data Collection. ...........................................................................................................................8

3.3 Major Components Used .............................................................................................................8

3.4 System Design. ............................................................................................................................8

3.4.1 The Raspberry Pi ......................................................................................................................8

v

3.4.2 The Raspberry Pi Models..........................................................................................................9

3.4.3 Programming the Raspberry Pi...............................................................................................10

3.4.4 Raspberry Pi Operating Systems.............................................................................................11

3.5 The Pi Camera Module ..............................................................................................................11

3.5.1 The hardware connection of camera to the PI ........................................................................12

3.6 Power Supply Circuit.................................................................................................................12

3.7 Cooling Fan................................................................................................................................12

3.7.1 Specifications:.........................................................................................................................13

3.8 Software.....................................................................................................................................13

3.9 Hardware System.......................................................................................................................13

3.10 Conceptual Design/Framework. ..............................................................................................13

3.11 Block Diagram for Raspberry Pi Based Security System........................................................14

3.12 Circuit Diagram for Raspberry Pi Based Security System ......................................................14

3.13 system Working Principle........................................................................................................14

3.14 Flow Chart for Raspberry Pi Based Security System ..............................................................15

3.15 System initialization and configuration ...................................................................................16

3.15.1 Read a Channel .....................................................................................................................16

3.15.2 Drive a channel .....................................................................................................................16

3.16 Source code .............................................................................................................................16

3.16.1 Developing the Full Code Listing.........................................................................................17

3.16.2 Full code listing......................................................................................................................17

3.17 OpenCv – Python Video Processing........................................................................................20

CHAPTER FOUR: ........................................................................................................................21

RESULTS AND DISCUSSION....................................................................................................21

4.0 Introduction................................................................................................................................21

4.1 Hardware testing........................................................................................................................21

4.1.1 Continuity Test .......................................................................................................................21

4.1.2 Power on Test .........................................................................................................................21

4.2 Email Notification .....................................................................................................................21

4.3 Enabling the Pi Camera .............................................................................................................22

vi

CHAPTER FIVE ...........................................................................................................................23

RECOMMENDATIONS, CONCLUSION AND FUTURE SCOPE OF WORK....................23

5.0 Conclusions................................................................................................................................23

5.1 Recommendations......................................................................................................................23

CHAPTER SIX ..............................................................................................................................24

REFERENCES ................................................................................................................................24

APPENDICES .................................................................................................................................26

ABSTRACT Raspberry Pi Based Security System For Electricity, Presents the idea of monitoring a particular place in a remote area. This project deals with the design approach of an Embedded Real-Time Investigation System Based Raspberry Pi SBC for intruder detection that reinforces surveillance technology to provide essential security to our life and associated control and alert operations. The proposed security solution hinges on our novel integration of cameras and motion detectors into web application. Raspberry Pi operates and controls motion detectors and video cameras for remote sensing and surveillance, streams live video and records it for future playback. This research is focused on developing a surveillance system that detects strangers and to response speedily by capturing and relaying images to owner based wireless module.

DESIGN & IMPLEMENTATION OF RASPBERRY PI BASED SECURITY SYSTEM.
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Engineering
  • Project ID: CPE0058
  • Access Fee: ₦5,000 ($14)
  • Pages: 38 Pages
  • Format: Microsoft Word
  • Views: 437
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Engineering
    Project ID CPE0058
    Fee ₦5,000 ($14)
    No of Pages 38 Pages
    Format Microsoft Word

    Related Works

    TABLE OF CONTENTS DECLARATION................................................................................................................................i APPROVAL ...................................................................................................................................... ii... Continue Reading
    TABLE OF CONTENT DECLARATION.................................................................................................................................. i APPROVAL........................................................................................................................................ ii DEDICATION... Continue Reading
    ABSTRACT In this current situation, the degree of security is feeble. So there is a lot of robbery, theft going on in and around the world. So, people fear to keep any of their valuables in their homes. Henceforth, many people prefer to keep it in banks. However, in this insecure world even banks are not too safe enough to satisfy people needs. A... Continue Reading
    ABSTRACT The fundamental aim of this project is to emphasize how a system of information network aids the government and police administration in decision taking through a range of statistical data as collected and analyzed in an existing information system. It also airs the... Continue Reading
    ABSTRACT The fundamental aim of this project “Design and Implementation of Network Based Security Information System” is to emphasize how a system of information network aids the government and police administration in decision taking through a range of statistical data as collected and analyzed in an existing information system. It... Continue Reading
    ABSTRACT Information is an important aspect of life. Vital information is the life wire or backbone of any organization. From sports statistics to the latest stock market price such facts keep people abreast of time. Computing, printing, photography and some recording are... Continue Reading
    DESIGN AND IMPLEMENTATION OF A NETWORK BASED SECURITY INFORMATION SYSTEM  CHAPTER TWO LITERATURE REVIEW 1.0            SECURITY CONCEPT Security is defined in many ways due to the many contexts of its existence.  In other words, security generally has to do with protection.  It might be protection from undue access.  Some attributes... Continue Reading
    ABSTRACT Information is an important aspect of life. Vital information is the life wire or backbone of any organization. From sports statistics to the latest stock market price such facts keep people abreast of time. Computing, printing, photography and some recording are all forms of automatic information processing. In all of these processed ,... Continue Reading
    ABSTRACT The fundamental aim of this project “Design and Implementation of Network Based Security Information System†is to emphasize how a system of information network aids the government and police administration in decision taking through a range of statistical data as collected and analyzed in an existing information system. It also... Continue Reading
    ABSTRACT The fundamental aim of this project is to emphasize how a system of information network aids the government and police administration in decision taking through a range of statistical data as collected and analyzed in an existing information system. It also airs the different machines used in information processing system to reduce the... Continue Reading
    Call Us
    whatsappWhatsApp Us