Seminar Final Report PDF
Seminar Final Report PDF
Seminar Final Report PDF
A
Seminar Report
On
SUBMITTED BY :-
Under Guidance of
Mr. N.D.Toradmal
2 Literature survey 4
6 References 22
CHAPTER - 1
INTRODUCTIO
N
The advent of new high-speed technology and the growing computer Capacity provided
realistic opportunity for new robot controls and realization of new methods of control theory.
This technical improvement together with the need for high performance robots created
faster, more accurate and more intelligent robots using new robots control devices, new
drivers and advanced control algorithms.
This project describes a new economical solution of robot control systems. In general; the
robots are controlled through wired network. The programming of the robot takes time if
there is any change in the project the reprogramming has to be done. Thus, they are not user
friendly and worked along with the user preferences. To make a robot user-friendly and to get
the multimedia tone in the control of the robot, they are designed to make user commanded
work.
The modern technology has to be implemented to do this. For implementing the modern
technology, it should be known by all the users to make use of it. To reach and to full-fill all
these needs we are using android mobile as a multimedia, user friendly device to control the
robot. This idea is the motivation for this project and the main theme of the project. In this
modern environment everybody uses smart phones which are a part of their day-to-day life.
They use all their daily uses like newspaper reading, daily updates, social networking, and all
the apps like home automation control, vehicle security, human body anatomy, health
maintenance, etc has been designed in the form of applications which can be easily installed
in their hand-held smart phones. This project approached a robotic movement control through
the smart phones.
A wireless camera is mounted on the robot body for spying purpose even in complete
darkness by using infrared lighting. Nowadays, security is measure concern in every
organization. To this satisfy issue the organizations use surveillance cameras. The limitation
in using them is that there must be an operator to watch the stream from the cameras and take
respective decisions.
The use of camera-based surveillance has extended from security to tracking, environment
and threat analysis and many more. By using the power of modern computing and hardware it
is possible to automate the process. The emergence of machine learning, Deep learning, and
computer vision tools have made this process efficient and feasible for general purpose use.
So instead of using human support for monitoring and insight generation, we can let the
processor and machine learning system do the task in a more efficient and errorless way. Here
we have mentioned few approaches which had helped us in solving this problem.
CHAPTER - 2
LITERATURE SURVEY
Traditionally, the surveillance monitoring system is done in the larger room and by a
mount of manpower. But nowadays, monitoring surveillance system can be done
through online network. This type of monitoring is less time consuming and can reduce
the manpower. Moreover, it gives the user flexibility to monitor their properties
wherever they want as long as they have the internet network. Security of lives and
properties is an aspect of life which cannot be toyed with. Governments and individuals
desire to know the conditions of their highly valued properties every second of life
despite the fact that these properties are located in different places across the globe.
Surveillance is the monitoring of the behaviour, activities, or other changing
information, usually of people for the purpose of influencing, managing, directing, or
protecting them. . Alternatively, surveillance can be the observation of individuals or
groups by government organizations but can also relate to disease surveillance, which
monitors the progress of a disease in a community while not directly observing
individuals. This work is concerned with the configuring, interfacing and networking of
IP-based camera for real-time security surveillance systems design. The word
surveillance may be applied to observation from a distance by means of electronic
equipment such as CCTV cameras and IP camera, or interception of electronically
transmitted information such as Internet traffic and/or phone calls.[1]
Internet-enabled cameras pervade daily life, generating a huge amount of data, but most
of the video they generate is transmitted over wires and analysed offline with a human
in the loop. The ubiquity of cameras limits the amount of video that can be sent to the
cloud, especially on wireless networks where capacity is at a premium. In this paper, we
present Vigil, a real-time distributed wireless surveillance system that leverages edge
computing to support real-time tracking and surveillance in enterprise campuses, retail
stores, and across smart cities. Vigil intelligently partitions video processing between
edge computing nodes co-located with cameras and the cloud to save wireless capacity,
which can then be dedicated to Wi-Fi hotspots, offsetting their cost. Novel video frame
prioritization and traffic scheduling algorithms further optimize Vigil’s bandwidth
utilization. We have deployed Vigil across three sites in both whitespace and Wi-Fi
networks. Depending on the level of activity in the scene, experimental results show
that Vigil allows a video surveillance system to support a geographical area of coverage
between five and 200 times greater than an approach that simply streams video over the
wireless network. For a fixed region of coverage and bandwidth, Vigil outperforms the
default equal throughput allocation strategy of Wi-Fi by delivering up to 25% more
objects relevant to a user’s query.[2]
Initially, many Security Systems such as RFID, OTP-based systems, and biometrics
were used to prevent unauthorized access. But sooner, people realized merely
preventing unauthorized access was not enough and there was a need to come up with
systems that would aid in catching the intruder, while also unfolding their motives.
Similar PIR-based systems triggered camera and sensor networks on motion detection,
then uploaded captures to the cloud server and sent alerts using GSM technology. All of
the above solutions were heavily hardware dependent which is subjected to high-risk
failure. Also, these solutions usually require a PC along with Wi-Fi DSP Kit which
should be continuously ON for 24 hours, this leads to higher power consumption and
also involves additional charges for every alert being sent.[3]
Automated video surveillance system is most important in the field of security. The task
of surveillance is to detect and track moving objects in the video sequence. Now-a-
days, video surveillance system is an important security asset for commercial, law
enforcement and military applications. In video surveillance, detection of moving
objects from a video is necessary for object classification, target tracking, activity
recognition as well as behaviour understanding. Automated Video Surveillance (AVS)
technologies provide the capability of automatically detecting security incidents or
potentially threatening events taking place within the view of cameras. Simple systems
detect motion in a camera’s field of view. More advanced systems offer features such
as object identification, tracking and analysis, perimeter intrusion detection, and
abandoned/removed object recognition.[4]
Visual surveillance System is basically used for analysis and explanation of object
behaviours. It consists of static and moving object detection, video tracking to
understand the events that occur in scene. The most important objective of this survey
paper is to determine the various methods in static and moving object detection as well
as tracking of moving objects. Any video scene contains objects that can be determined
by object detection technique. There are various classes of detected object such as tree,
clouds, person and other moving objects. Detection for moving object is a very
challenging for any video surveillance system. Object Tracking is used to find the area
where objects are available and shape of objects in each frame in higher level
application.[5]
Digital image mosaicking has been studied for several decades, starting from the
mosaicking of aerial and satellite pictures, and now expanding into the consumer
market for panoramic picture generation. Its success depends on two key components:
image registration and image blending. The first aims at finding the geometric
relationship between the to-be-mosaiced images, while the latter is concerned with
creating a seamless composition. Many researchers have developed techniques for the
special case of document image mosaicking [2, 5, 6, 8, 9, 10]. The basic idea is to
create a full view of a document page, often too large to capture during a single scan or
in a single frame, by stitching together many small patches. If the small images are
obtained through flatbed scanners [2, 8], image registration is somewhat easier
because the overlapping part of
two images differ only by a 2D Euclidean transformation. However, if the images are
captured by cameras, the overlapping images differ by a projective transformation.
Virtually all reported work that we are aware of on document mosaicking using
cameras impose some restrictions on the camera position to avoid perspective
distortion.[6]
machine learning approach for visual object detection which is capable of processing
images extremely rapidly and achieving high detection rates. This work is distinguished
by three key contributions. The first is the introduction of a new image representation
called the “Integral Image” which allows the features used by our detector to be
computed very quickly. The second is a learning algorithm, based on AdaBoost, which
selects a small number of critical visual features from a larger set and yields extremely
efficient classifiers. The third contribution is a method for combining increasingly more
complex classifiers in a “cascade” which allows background regions of the image to be
quickly discarded while spending more computation on promising object-like regions.
The cascade can be viewed as an object specific focus-of-attention mechanism which
unlike previous approaches provides statistical guarantees that discarded regions are
unlikely to contain the object of interest. In the domain of face detection, the system
yields detection rates comparable to the best previous systems. Used in real-time
applications, the detector runs at 15 frames per second without resorting to image
differencing or skin colour detection.[7]
3.3 Specifications:
1. ESPCAM 32
The ESP32-CAM is a small size, low power consumption camera module based on ESP32. It
comes with an OV2640 camera and provides onboard TF card slot.
The ESP32-CAM can be widely used in intelligent IoT applications such as wireless video
monitoring, WIFI image upload, QR identification, and so on.
Specifications:
Features
Onboard ESP32-S module, supports WiFi + Bluetooth
OV2640 camera with flash
Onboard TF card slot, supports up to 4G TF card for data storage
Supports WiFi video monitoring and WiFi image upload
Supports multi sleep modes, deep sleep current as low as 6mA
Control interface is accessible via pinheader, easy to be integrated and embedded into
user products
2. L298N Dual H Bridge Motor Driver
L298N Dual H Bridge Motor Driver is a motor controller breakout board which is typically
used for controlling speed and direction of motors. It can also be used to control the
brightness of certain lighting projects such as high-powered LED arrays.
An H-bridge is a circuit that can drive a current in either polarity and be controlled by pulse
width modulation.
Pin descriptions of L298N Dual H Bridge Motor Driver:
Features:
L298N is an integrated circuit multi watt 15 package and capable of giving high voltage. It is
a high current dual full-bridge driver that is designed to accept standard TTL logic levels. It
can drive inductive loads e.g relays, solenoids, motors (DC and stepping motor), etc.
Its basic features are:
Maximum supply voltage 46V
Maximum output DC current 4A
Low saturation voltage
Over-temperature protection
Logical “0” Input Voltage up to 1.5 V
3. HC-05 Bluetooth Module
HC-05 Specification:
HC05 follows the “Bluetooth V2.0+EDR” protocol (EDR stands for Enhanced
Data Rate).
Its operating frequency is 2.4 GHz ISM Band.
HC05 uses CSR Blue core 04-External single-chip Bluetooth system with CMOS
technology.
This module follows the IEEE (Institute of Electrical and
Electronics Engineers) 802.15.1 standard protocol.
Dimensions of HC-05 are 12.7mmx27mm.
It sends and receives data by UART, which is also used for setting the baud rate.
This module also uses (FHSS), a technique by which a radio signal is sent at
different frequency levels.
This module can be easily connected with a laptop or mobile phone via Bluetooth.
Microcontroller: ATmega328P
Operating Voltage: 5V
Input Voltage (recommended): 7-12V
Input Voltage (limit): 6-20V
Digital I/O Pins: 14 (of which 6 provide PWM output)
PWM Digital I/O Pins: 6
Analog Input Pins: 6
DC Current per I/O Pin: 20 mA
DC current for 3.3V Pin: 50 mA
Flash Memory: 32 KB (ATmega328P) of which 0.5 KB used by bootloader
SRAM: 2 KB (ATmega328P)
EEPROM: 1 KB (ATmega328P)
Clock Speed: 16 MHz
LED_BUILTIN: 13
Length: 68.6 mm
Width: 58.4 mm
Weight: 25 g
Features:
Microcontroller: ATmega328
Operating Voltage: 5V
Input Voltage (recommended): 7-12V
Input Voltage (limits): 6-20V
Digital I/O Pins: 14 (of which 6 provide PWM output)
Analog Input Pins: 6
DC Current per I/O Pin: 40 mA
DC Current for 3.3V Pin: 50 mA
Flash Memory: 32 KB of which 0.5 KB used by bootloader
SRAM: 2 KB (ATmega328)
EEPROM: 1 KB (ATmega328)
Clock Speed: 16 MHz
3.4 PIN DIAGRAM
SOFTWARE USED
REFERENCES
[2] Tan Zhang, Aakanksha Chowdhery, Paramvir Bahl, Kyle Jamieson, Suman Banerjee
“The Design and Implementation of a Wireless Video Surveillance System” University of
Wisconsin-Madison, Microsoft Research Redmond, University College London
[4] Mrs. Prajakta Jadhav1, Mrs. Shweta Suryawanshi2, Mr. Devendra Jadhav3 “Automated
Video Surveillance e-ISSN: 2395 -0056 | p-ISSN: 2395-0072” International Research Journal
of Engineering and Technology (IRJET) Volume: 04 Issue: 05 | May -2017
[5] Pawan Kumar Mishra “A study on video surveillance system for object detection and
tracking” Nalina.P, Muthukannan . K
[6] Jian Liang “Camera-Based Document Image Mosaicing” 18th International Conference
on Pattern Recognition (ICPR'06)
[8] Paul Viola, Michael Jones “Rapid Object Detection using a Boosted Cascade of Simple
Features” 2001 IEEE
[9] Rahul Chauhan, Kamal Kumar Ghanshala, R.C Joshi “Convolutional Neural Network
(CNN) for Image Detection and Recognition” 2018 IEEE
[10] Le Kang, Jayant Kumar, Peng Ye, Yi Li, David Doermann “Convolutional Neural
Networks for Document Image Classification” 2014 IEEE