OFFICE PATROLLING ROBOT REPORT Arduino new
OFFICE PATROLLING ROBOT REPORT Arduino new
In modern office environments, ensuring security and efficient surveillance is crucial. This paper presents
the development of a Smart Office Surveillance Robot utilizing face recognition technology, integrated
with an Arduino-based control system. The robot is equipped with essential components such as DC
motors for mobility, IR sensors for obstacle detection, Bluetooth for remote control, and a Nodemcu
module for message intimation. Additionally, the robot employs a laptop camera for real-time face and
object recognition. The control system relies on an Arduino microcontroller, facilitating seamless
integration and coordination of the robot's functionalities. The Bluetooth module enables remote control
of the robot, allowing for user-friendly navigation within the office premises. The Nodemcu module
facilitates communication between the robot and the central monitoring station, ensuring timely message
intimation related to security events or system updates. Face recognition technology enhances the
surveillance capabilities of the robot by identifying authorized personnel and alerting security personnel
in the event of unrecognized individuals. The robot utilizes a laptop camera for capturing high-resolution
images, which are processed using advanced face recognition algorithms. Additionally, the robot
employs object recognition techniques for identifying and responding to specific objects within its
environment. Communication between the robot and the central monitoring station is established
through Zigbee technology, ensuring a reliable and secure connection. This communication enables real-
time data transfer, allowing the central monitoring station to receive live video feeds, status updates, and
security alerts from the robot. The proposed Smart Office Surveillance Robot offers an intelligent,
automated, and versatile solution for enhancing office security. Its integration of face and object
recognition, along with efficient communication protocols, ensures a robust surveillance system capable
of adapting to diverse office environments. The utilization of readily available technologies such as
Arduino, Bluetooth, Nodemcu, laptop cameras, and Zigbee makes the system cost-effective and easily
implementable for practical office applications.
Introduction:
In contemporary office environments, the demand for advanced security solutions has become
increasingly paramount. Traditional surveillance systems often face limitations in terms of mobility,
adaptability, and real-time response capabilities. To address these challenges, this project introduces a
cutting-edge solution – the Smart Office Surveillance Robot. This robotic system is designed to enhance
office security through the integration of sophisticated technologies, including face recognition, object
Page18
detection, and seamless communication protocols. The core components of the Smart Office
Surveillance Robot include an Arduino microcontroller, DC motors for mobility, IR sensors for obstacle
detection, Bluetooth for remote control, and a Nodemcu module for efficient message intimation.
Leveraging these components, the robot is capable of autonomously navigating through office spaces,
detecting obstacles, and responding to security events in real time. One of the key features of this
surveillance system is its utilization of face recognition technology. By incorporating a laptop camera,
the robot can identify and authenticate individuals within the office environment. This not only enhances
the security posture by allowing access only to authorized personnel but also provides a means to track
and respond to potential security threats.
The integration of object recognition further extends the capabilities of the Smart Office Surveillance
Robot. The system can identify and respond to specific objects, adding an additional layer of intelligence
to its surveillance functionality. This feature is particularly valuable in recognizing and addressing
security concerns related to suspicious or unauthorized items within the office premises. To ensure
seamless control and communication, the robot is equipped with Bluetooth for remote operation and a
Nodemcu module for message intimation. Users can easily control the robot's movements, initiate
specific tasks, and receive real-time updates on the system's status. The Nodemcu module facilitates the
transfer of important messages and alerts from the robot to a central monitoring station, ensuring timely
responses to security events. The communication infrastructure is further bolstered by Zigbee
technology, establishing a reliable and secure link between the robot and the central monitoring station.
This enables the transmission of live video feeds, status updates, and security alerts in real time, allowing
security personnel to make informed decisions promptly.
Page19
EXISTING SYSTEM
In the existing system, robot has to be controlled remotely where the person has to monitor the area
using remote control and more human resource is needed for this operation of the patrol robot. Some
systems require a smart phone for controlling the night vision robot. Some use local host webpage hence
the control range is limited to local network range. Lacking of few
PROPOSED SYSTEM
In this proposed system, Robot is build with arduino Controller and Laptop camera which help the
system for the automation and help to find the human or any problem detected using the sound sensor
and according to the sound produced it automatically goes to that area and capture the image and send it
to user using IOT technology.
MOTIVATIONS:
Nowadays Women Safety is the biggest concern in many parts of the world. There is still a fear in
alone areas for women as well as men.
So here we propose a security patrolling robot using ARDUINO. The system uses cameras and
mic mounted on robotic vehicle for securing any premises.
It monitors each area to detect any problem using camera. It has the ability to monitor sound in
the premises.
Robot hears any sound after area is quite and it starts moving towards the sound on its predefined
path. It then scans the area using its camera to detect any human faces detected.
It provides continuous monitoring together with live broadcasting of the site off crime.
Page20
OBJECTIVES:
The aim is to make a smart surveillance system which can be monitored by owner remotely
through IOT.
To build a cost effective and efficient robotic system, this is programmed to provide a platform
for surveillance purpose, thus acting as a substitute for human.
Surveillance System consists of mainly two parts:
Hard-wired surveillance systems: These systems use wires to connect the cameras, motion
detectors, power supply and LAN cable with the Micro-controller.
Remote Access Systems: These systems have the capability to monitor and control a security
system from a location away from the surveillance area through IOT.
CHAPTER 2
LITERATURE SURVEY
This paper proposes a novel application of using an Unmanned Aerial Vehicle (UAV) for inhibiting
physical harassments in public places. The existing surveillance systems are sufficient to monitor
crowded areas but are not suitable for monitoring secluded places. The crimes are likely to occur in
places with less crowd and make surveillance challenging, which eventually leads to an increase in crime
rate. This paper discusses the development of an UAV based security system that responds to a request
from a wearable gadget by a user probably a woman who faces a possible threat. The proposed approach
focuses on the night time operation the period in which most of the physical attacks would occur. The
person, who is facing a possible threat can request for assistance using a primary wearable gadget, which
will send the GPS location to the control station. Then a UAV will be deployed to the target location
which identifies and tracks the motion of the person using a secondary wearable gadget. This paper also
proposes a low cost and lesser computational intensive solution for motion tracking.
Published in: 2017 International Conference on Intelligent Computing, Instrumentation and Control
Technologies (ICICICT)
Date of Conference: 6-7 July 2017
Date Added to IEEE Xplore: 23 April 2018
Raj Mohan
AMMACHI Labs, Amrita Vishwa Vidyapeetham Amrita University, Amritapuri, India
Page24
C. Vipin Raj
AMMACHI Labs Amrita School of Engineering, Amritapuri Amrita Vishwa Vidyapeetham Amrita
University, India
P. Aswathi
AMMACHI Labs, Amrita Vishwa Vidyapeetham Amrita University, Amritapuri, India
Rao R. Bhavani
AMMACHI Labs, Amrita Vishwa Vidyapeetham Amrita University, Amritapuri, India
Page26
hashtag messages that are widely spread across the whole globe sir as a platform for women to express
their views about how they feel while we go out for work or travel in public transport and what is the
state of their mind when they are surrounded by unknown men and whether these women feel safe or
not?
[2019] SMARISA: A ARDUINO Based Smart Ring for Women Safety Using IoT, Navya R Sogi,
Priya Chatterjee, U Nethra and V Suma
Every day, every woman, young girls, mothers and women from all walks of life are struggling to be safe
and protect themselves from insensitive men who molest, assault and violate the dignity of women on a
daily basis. Due to these women are subjected to in the present scenario, a smart security wearable device
for women based on the Internet of Things is proposed. It is implemented in the form of a smart ring
(SMARISA) and comprises of ARDUINO Zero, ARDUINO camera, buzzer and button to activate the
services. This device is extremely portable and can be activated by the victim being assaulted just by the
click of a button that will fetch her current location and also capture the image of the attacker via
ARDUINO camera. The location and the link of the image and helped us developing a dense sensing
approach based on traces of suspicious activities. There is a situation-based analysis for relative modeling
based on face recognition as well as the fuzzy labeling of verbal conversations. captured will be sent to
predefined emergency contact numbers or police via smartphone of the victim thus preventing the use of
additional hardware devices/modules and making the device compact.
[2019] A Hidden Markov Model and Internet of Things Hybrid Based Smart Women Safety
Device, Debojyoti Seth and Ahana Chowdhury and Shreya Ghosh
Smart technologies for women safety are gaining popularity over the last few decades. This paper
proposes a concept of security for women under possible offensive threats by deep sensing approaches.
Internet of Things (IoT) based platform provides dexterity and dynamicity in correlating a plethora of
sensors and actuators to ensure women's safety. Hidden Markov Models (HMM) offer scope for better
predictive analysis for its dynamic probabilistic nature and helped us developing a dense sensing
approach based on traces of suspicious activities. There is a situation-based analysis for relative modeling
based on face recognition as well as the fuzzy labeling of verbal conversations. If an emergency situation
is triggered, a GSM/GP module will generate an emergency in case of after-shock otherwise will warn
the female device bearer. The results of experimentations proved to be really promising with an accuracy
Page27
of 94.7%.
[2019] A Women Safety Portable Hidden camera detector and jammer, Sindhu K R. Subhashini and
S. Gowri and J. S. Vimali
In recent times our country had developed in many ways but still many crimes against women exist.
There are no proper means to detect the hidden camera which now had become a serious issue. This
device intends to maintain the safety and security of people by detecting the spy camera and stop the
camera working. Since hidden cameras are less cost and small in size, it became easy to install cameras
almost everywhere. It finds its application in the areas where actually cameras are not allowed. This
device works with a principle that the camera operates in the frequency range 0.1GHz to 3GHz, so RF
signal detector detects the frequency range and if it is within this frequency range it alerts us with an alert
light. A video camera can also be detected by this detector by extending the detecting range from 0.0I5
GHz to 3 GHz we can detect both camera and video camera. Once it is detected it alerts us with an LED
light and it an option to stop the camera transmissions by creating strong interference between the camera
and base station. This device also comes along with an eyeglass which can be used if alternating
pulsating frequency.
Page28
Literature Survey:
Author
Paper Name Name Year Methodology Advantages Disadvantages
Integration of ESP32
with a variety of sensors; - Comprehensive
Real-time data monitoring of various
processing; Zigbee environmental - Dependency on
"Smart Public communication for parameters - Responsive Zigbee network
Safety System: A. emergency alerts; Visual Zigbee communication - coverage - Potential
An ESP32-Based Johnson monitoring using laptop Visual surveillance for security concerns with
Approach" et al. 2021 camera unusual activities visual surveillance
- Versatile ESP32
handling multiple
ESP32 as a central sensors - Diverse sensor - Initial setup
processor; Multisensor integration for complexity with
"Enhanced Safety fusion for diverse threat comprehensive multiple sensors -
Monitoring with detection; Zigbee for monitoring - Real-time Limited scalability for
ESP32 and B. Smith communication; LCD for display for quick very large-scale
Multisensors" et al. 2022 real-time display decision-making deployments
- AI-powered camera - Higher
ESP32 integration with analytics for advanced computational
"Intelligent AI-based camera threat detection - ESP32 requirements for AI
Public Safety analytics; Multisensor as a reliable analytics - Cost
using ESP32 and fusion for emergency microcontroller - Zigbee implications for
AI-Based Camera C. Patel conditions; Zigbee for efficient implementing AI-
Analytics" et al. 2020 communication communication based camera systems
- Wireless sensor
network for flexible - Potential
ESP32-based wireless deployment - Integration interference in
sensor network; of diverse sensors for wireless
"Wireless Sensor Integration of sound, comprehensive communication -
Network for D. temperature, and fire monitoring - Zigbee Limited visual
Public Safety Brown sensors; Zigbee for communication for surveillance
Monitoring" et al. 2019 communication responsiveness capabilities
- Integration with IoT
ESP32 integration with for broader connectivity - Complexity in
"Integrating IoT IoT devices; Zigbee for - Multisensor fusion for managing diverse IoT
and ESP32 for E. communication; enhanced threat devices - IoT security
Enhanced Public Garcia et Multisensor fusion for detection - Zigbee for concerns and potential
Safety" al. 2023 threat detection efficient communication vulnerabilities
Page29
Table: 2.1 Summary Table
CHAPTER 3
Page30
3.1 SOFTWARE REQUIREMENT:
Arduino IDE
Embedded C
Open CV
Python
ARDUINO
DC Motor
H-Bridge
IR Sensor
RF Transceiver
Bluetooth
The functional requirements for a system describe what the system should do and these
requirements depend on the type of software being developed, the general approach taken by the
organization when writing requirements.
The functional system requirements describe the system function in detail, its inputs and
outputs, exceptions and so on.
Functional requirements are those which are related to the technical functionality of the
system as follows:
The functional requirements for a system describe what the system should do and these
requirements depend on the type of software being developed, the general approach taken by the
Page31
organization when writing requirements.
The functional system requirements describe the system function in detail, its inputs and
outputs, exceptions and so on.
Functional requirements are those which are related to the technical functionality of the
system as follows:
The system provides obstacle detection with the help of Ir sensors.
The system sends alerts to the Police station in case of an emergency.
The system provides Image Processing in Case of emergency
Non-Functional Requirements
Security
Information is stored and shared on our platform is highly secure since the information is divided
into chunks and encrypted and stored on various system. Hence attacks on the system are difficult.
Scalability
As the number of nodes increases in our network the scalability of our platform in terms of space
and accessibility increase’s exponentially.
Performance
As our network is based on peer to peer and not on a single data storage so the single point of
failure is removed and so the performance is increased.
User friendly
The user-facing apps that are used by the clients to access our network are designed in such a way
that they are user friendly and very easy to use.
Cost
The cost of constructing data centres which usually cause billions and the maintenance cost of these
data centres is nullified.
Availability
Since our system is not centralized and there is no single point of failure in our system, therefore the
Page32
availability of our system increased.
CHAPTER 4
SYSTEM DESIGN
Page33
Fig 4.1 BLOCK DIAGRAM
In this proposed system, Camera is integrated with Laptop which helps the system to perform automation
to find if there is any disturbance detected using the sound sensor and according to the sound produced it
automatically goes to that area and capture’s the corresponding image and send it to user using IOT
technology.
• ARDUINO Microcontroller is used in the functionality of the Robot.
• In this project IR Sensor is used to make the robot move automatically following a specific path.
• IOT is used to send the captured images to the person in charge of analysis the situation.
Page34
• The robotic vehicle moves at particular path and is equipped with camera and sound sensors for
securing that premises.
• The Sensors present on the robot are in continuous lookout for any kind of noise or disturbance in that
area and if the Robot detects any unusual sound in a quiet area, it starts moving towards the sound.
• The captured images and video are then sent to the IOT network, which is then analyzed.
• If any unusual activities are detected, and then an intimation message along with Location is then send
to Police Station.
• Along with the intimation, a loud alarming Siren is made by the Robot to alarm the attackers and
neighboring people.
Page35
Fig: Arduino
Arduinospecification:
Microcontroller ATmega328P
OperatingVoltage 5v
Input voltage 7-12v
Input voltage limit 6-20v
Digital I/O Pins 6
Analogue input Pins 6
DC current perI/O pins 20 mA
DC current for 3.3v Pin 50 mA
Flash Memory Of which o.5KB is used
SRAM 2 KB
Page36
EEPROM 1KB
Clock Speed 16MHz
Length 68.6mm
Width 53.4nm
Weight 25g
Table
Arduinoprogramming:
On Rev1 boards: connecting the solder jumper on the back of the board (near the map of
Italy) and then rese ingthe8U2.
On Rev2 or later boards: there isa resistor that pulling the 8U2/16U2 HWB line to
ground, making it easier to put into DFU mode.[1]
Warnings:
Page37
fuse provides an extra layerof protection. If more than500 mA is applied to the USB port, the
fuse will automatically break the connection until the short or overload is removed.
Differenceswithotherboards:
The Uno differs from all preceding boards in that it does not use the FTDI USB-to-serial driver
chip. Instead, it features the Atmega16U2 (Atmega8U2 up to version R2) programmed as a
USB-to-serial converter.[1]
Power:
The Arduino/GenuinoUno board can be powered via the USBconnection or with an external
power supply. The power source is selectedautomatically.
External (non-USB) power can come either from an AC-to-DC adapter (wall-wart) orbattery.
The adapter can be connected by plugging a 2.1mm center-positive plug into the board's power
jack. Leads from a battery can beinserted in the GND and VIN pin headers of the
POWERconnector.
The board can operate on an external supply from 6 to 20 volts. If supplied withless than7V,
however, the 5V pin may supply less than five volts and the board may become unstable. If
using more than 12V, thevoltage regulator may overheat and damage the board. The
recommended range is 7 to 12volts.
The power pins are as follows:
VIN. The input voltage to the Arduino/Genuinoboard when it's using anexternal power
source (as opposed to 5 volts from the USB connection or other regulated power source).
One can supply voltage through this pin, or, if supplying voltage via the power jack,
access it through thispin.
5V.This pin outputs a regulated 5Vfrom the regulator on the board. The board can be
supplied with power either from the DC power jack (7 - 12V), the USB connector (5V), or
the VIN pin of the board (7-12V). Supplying voltagevia the 5V or 3.3V pins bypasses
Page38
the regulator, and can damage your board. We don'tadviseit.
3V3. A 3.3 volt supply generated by the on-board regulator. Maximum current
draw is 50 mA.
GND. Groundpins.
IOREF.This pin on the Arduino/Genuinoboard provides the voltage reference with
which the microcontroller operates. A properlyconfigured shield can read the IOREF
pin voltage and select the appropriate power source or enable voltage translators on the
outputs to work with the 5V or 3.3V.[1]
Memory:
The ATmega328 has 32 KB (with 0.5 KB occupied by the bootloader). It also has2 KB of
SRAM and 1 KB of EEPROM (which can be read and written with the EEPROMlibrary).[1]
Input &Output:
Each of the 14 digital pins on the Uno can be used as an input or output, usingpinmode(),
digital write (), and digital read () functions. They operate at 5 volts. Each pin can provide or
receive 20 mA as recommended operating condition and has an internal pull- up resistor
(disconnected by default) of 20-50k ohm.A maximumof 40mAis thevalue that must not be
exceeded on any I/O pin to avoid permanent damage to the microcontroller.
In addition, some pins have specialized functions:
Serial: 0 (RX) and 1 (TX). Used to receive (RX) and transmit (TX) TTL serial data.
These pins are connected to the corresponding pins of the ATmega8U2 USB-to-TTL
Serialchip.
External Interrupts: 2 and 3. These pins can be configuredto triggeran interrupt on a
low value, a rising or falling edge, or a change invalue. See the attachinterrupt ()
function fordetails.
PWM: 3, 5, 6, 9, 10, and 11. Provide 8-bit PWM output with the analogwrite ()
Page39
function.
SPI: 10 (SS), 11 (MOSI), 12 (MISO), 13 (SCK). These pins support SPI
communication using the SPIlibrary.
LED: 13. There is a built-in LED driven by digital pin 13. When the pin isHIGH
value, the LED is on, when the pin is LOW, it's off.
TWI: A4 or SDA pin and A5 or SCL pin. Support TWI communication using the
Wirelibrary.
The Uno has 6 analog inputs, labeled A0 through A5, each of which provide 10 bits of
resolution (i.e. 1024 different values). By default they measure from ground to5 volts, though is
it possible to change the upper end of their range using the AREF pin and the analog reference
()function.
There are a couple of other pins on the board:
AREF. Reference voltage for the analoginputs. Used with analog Reference().
Reset. Bring this line LOW to reset the microcontroller. Typically usedto add a reset
button to shields which block the one on the board.[1]
Page40
Communication:
Automatic (Software)Reset:
Rather than requiring a physical press of the reset button before an upload,
theArduino/GenuinoUno board is designed in a way that allows it to be reset by software running
on a connected computer. One of the hardware flow control lines (DTR) of the ATmega8U2/16U2
is connected to the reset line of the ATmega328 via a 100 nanofarad capacitor. When this line is
asserted (taken low), the reset line drops long enough to reset the chip. The Arduino Software
(IDE) uses this capability to allow you to uploadcode by simply pressing the upload button in the
interface toolbar. This means that the boot loader can have a shorter timeout, as the lowering
of DTR can be well-coordinated with the start of the upload. This setup has other implications.
When the Uno is connected to either acomputer running Mac OS X or Linux, it resets each time a
connection is made to it from software (via USB). For the following half-second or so, theboot
Page41
loader is running on the Uno.While it is programmed to ignore malformed data (i.e. anything
besides an upload of new code), it will intercept the first few bytes of data sent to the board
after a connection is opened. If a sketch running on the board receives one-time configuration or
other data when it first starts, make sure that the software with which it communicates waits a
second after opening the connection and before sending thisdata.
The Uno board contains a trace that can be cutto disable the auto-reset. The pads on either side
of the trace can be soldered together to re-enable it. It's labeled "RESET-EN". You may also be
ableto disable the auto-reset by connecting a 110 ohm resistor from 5V to the resetline.[1]
Fig 5.3
Transformer:
A transformer is a device that transfers electrical energy from one circuit to another through
inductively coupled conductors without changing its frequency. A varying current in the first or
primary winding creates a varying magnetic flux in the transformer's core, and thus a varying
magnetic field through the secondary winding. This varying magnetic field induces a varying
electromotive force (EMF) or "voltage" in the secondary winding. This effect is called mutual
induction. If a load is connected to the secondary, an electric current will flow in the secondary
winding and electrical energy will be transferred from the primary circuit through the transformer to
the load. This field is made up from lines of force and has the same shape as a bar magnet. If the
current is increased, the lines of force move outwards from the coil. If the current is reduced, the lines
of force move inwards. If another coil is placed adjacent to the first coil then, as the field moves out or
in, the moving lines of force will "cut" the turns of the second coil. As it does this, a voltage is
Page42
induced in the second coil. With the 50 Hz AC mains supply, this will happen 50 times a second. This
is called MUTUAL INDUCTION and forms the basis of thetransformer.
Rectifier:
A rectifier is an electrical device that converts alternating current (AC) to direct current (DC),
a process known as rectification. Rectifiers have many uses including as components of power
supplies and as detectors of radio signals. Rectifiers may be made of solid-state diodes, vacuum tube
diodes, mercury arc valves, and other components. A device that it can perform the opposite function
(converting DC to AC) is known as an inverter. When only one diode is used to rectify AC (by
blocking the negative or positive portion of the waveform), the difference between the term diode and
the term rectifier is merely one of usage, i.e., the term rectifier describes a diode that is being used to
convert AC to DC. Almost all rectifiers comprise a number of diodes in a specific arrangement for
more efficiently converting AC to DC than is possible with only one diode. Before the development
of silicon semiconductor rectifiers, vacuum tube diodes and copper (I) oxide or selenium rectifier
stacks wereused.
Filter:
The process of converting a pulsating direct current to a pure direct current using filters is
called as filtration. Electronic filters are electronic circuits, which perform signal-processing
functions, specifically to remove unwanted frequency components from the signal, to enhance wanted
ones.
Page43
Regulator:
A voltage regulator (also called a ‗regulator‘) with only three terminals appears to be a simple
device, but it is in fact a very complex integrated circuit. It converts a varying input voltage into a
constant ‗regulated ‘output voltage. Voltage Regulators are available in a variety of outputs like 5V,
6V, 9V, 12V and 15V. The LM78XX series of voltage regulators are designed for positive input. For
applications requiring negative input, the LM79XX series is used. Using a pair of voltage-
divider‘resistors can increase the output voltage of a regulator circuit. It is not possible to obtain a
voltage lower than the stated rating. You cannot use a 12V regulator to make a 5V power supply.
Voltage regulators are very robust. These can withstand over-current draw due to short circuits and
also over-heating. In both cases, the regulator will cut off before any damage occurs. The only way to
destroy a regulator is to apply reverse voltage to its input. Reverse polarity destroys the regulator
almost instantly. Fig: 3u shows voltage regulator.
Page44
Office Surveillance Robot Using Arduino Laptop
2024
Jumper Wires
A jump wire (also known as jumper, jumper wire, jumper cable, DuPont wire,
or DuPont cable) is an electrical wire or group of them in a cable with a connector or
pin at each end which is shown in Fig 5.14 (or sometimes without them – simply
"tinned"), which is normally used to interconnect the components of a breadboard or
other prototype or test circuit, internally or with other equipment or components,
withoutsoldering.
Individual jump wires are fitted by inserting their "end connectors" into the slots
provided in a breadboard, the header connector of a circuit board, or a piece of test
equipment.
4.3. Bluetooth
A Bluetooth module is generally an equipment segment that furnishes a remote item to work
with the PC; or now and again, the Bluetooth might be an embellishment or fringe, or a
remote earphone or other item, (for example, PDAs can utilize.). On the off chance that the
PC (is this PC related?) has equipment backing to utilize Bluetooth items and associations, at
that point whatever it is you are attempting to download and utilize, may work. There are part
Bluetooth remote modules with a USB plug on them to add this BT to PCs that didn't have it
implicit. A portion of these modules may require drivers, however as a rule Mac OS X has
drivers incorporated with the framework to help a few items. In the section 4 we talked about
in nitty gritty about Bluetooth module.
HC-O5 module is a simple Bluetooth serial port module designed for wireless serial connection
setup. It has a footprint as small as 12.7mm x27mm. it will simplify the overall design cycle.
Bluetooth Sub-modules work well with Arduino and other Microcomputers.HC-05 is a more
capable module that can be set to be either Master or Slave. HC-05 is small (3 cm long) and run
on 3.3V power with 3.3V signal levels, they have no pins and usually solder to a larger board.
The module has two modes of operation, Command Mode where we can send AT commands to it
and Data Mode where it transmits and receives data to another Bluetooth module. “Breakout"
Boards that make these easy to use are available and recommended. These mount the sub- module
like that shown on the right on a slightly larger board.
A machine that converts DC electrical power into mechanical power is known as a Direct
Current motor. DC motor working is based on the principle that when a current carrying
conductor is placed in a magnetic field, the conductor experiences a mechanical force.
4.4.1 Working principle of a DC motor
An electric motor is an electrical machine which converts electrical energy into mechanical
energy. The basic working principle of a DC motor is: "whenever a current carrying conductor is
placed in a magnetic field, it experiences a mechanical force".
4.4.2 L293D
Transformer:
A transformer is a device that transfers electrical energy from one circuit to another
through inductively coupled conductors without changing its frequency. A varying current in the
first or primary winding creates a varying magnetic flux in the transformer's core, and thus a
varying magnetic field through the secondary winding. This varying magnetic field induces a
varying electromotive force (EMF) or "voltage" in the secondary winding. This effect is called
mutual induction. If a load is connected to the secondary, an electric current will flow in the
secondary winding and electrical energy will be transferred from the primary circuit through the
transformer to the load. This field is made up from lines of force and has the same shape as a bar
magnet. If the current is increased, the lines of force move outwards from the coil. If the current
is reduced, the lines of force move inwards. If another coil is placed adjacent to the first coil
then, as the field moves out or in, the moving lines of force will "cut" the turns of the second
coil. As it does this, a voltage is induced in the second coil. With the 50 Hz AC mains supply,
this will happen 50 times a second. This is called MUTUAL INDUCTION and forms the basis
of the transformer.
Rectifier:
A rectifier is an electrical device that converts alternating current (AC) to direct current
(DC), a process known as rectification. Rectifiers have many uses including as components of
power supplies and as detectors of radio signals. Rectifiers may be made of solid-state diodes,
vacuum tube diodes, mercury arc valves, and other components. A device that it can perform the
opposite function (converting DC to AC) is known as an inverter. When only one diode is used
4.5. RF module
ZIGBEE TB 387 2.4 GHZ:
FEATURES
• Working voltage: 3.3V-5.5V;
• RS232 Interface ( 3.3V/5V TTL level)
• Frequency range: 2402~2482MHz
• Transmit power: 20dBm(100mw);
• Receiver sensitivity: -87dBm;
• Operating temperature: -40~+85 ° c;
• Transparent transmission mode baud rate:
• 2400,4800,9600(Default),14400,19200,38400,57600,115200,12800,25600
• AT mode configured baud rate fix is: 9600;
• Open ground Transmission distance : 500M
Pin Description:
1.3 AT command
The format of the instruction code
1.3.1 AT + BAUD = x (baud rate settings)
Baud rate setting command module supports different baud rates to suit
different applications.
Generally speaking, if the amount of data, but the high reliability
requirements of data, it is recommended to choose a lower waveSpecial
rate; if a large amount of data, the short distance transmission, it is
recommended to select a higher baud rate. (Note: Porter
For additional information about the unified rate, data bits, one stop bit and
no parity. )
Note that the internal module is provided, a wireless data frame for each
packet data bytes,
Therefore, when continuous transmission of data, the sender baud rate
proposal is less than the receiving end, so there is enough to allow the
receiver module
Enough time to transfer data. The author at the time of testing two
computers to transmit data, set the baud rate to the sender
, The receiving end of a successful transmission of a picture size is about
(Note:
PC software assistant Tintin serial, serial chip used, the operating system
EC is).
The following table shows the different baud rate settings, after sending the
command, if set up, the module
Returns the character '' If unsuccessful, it returns the character ''.
Macro definitions:
#define UART_BAUD_2400 ‘0’
#define UART_BAUD_4800 ‘1’
#define UART_BAUD_9600 ‘2’
#define UART_BAUD_14400 ‘3’
#define UART_BAUD_19200 ‘4’
#define UART_BAUD_38400 ‘5’
#define UART_BAUD_57600 ‘6’
#define UART_BAUD_115200 ‘7’
#define UART_BAUD_128000 ‘8’
#define UART_BAUD_256000 ‘9’
In order to set the frequency shifted with other radio module supports setting
different transmission
Frequency (Note: Frequency). When the two modules to transmit data, you
need to set the frequency to be consistent, whether youcannot
communicate. After sending the command, if the setting is successful, the
module returns the character ‘‘, if you setUnsuccessful, it returns the
character ‘‘.
The range could theoretically take any value, with the code
Representation. The actual set frequency is:
F = (2402 + x x) Hz
Arduino IDE
Menu Bar
Text Editor
Output Pane
Embedded C
PYTHON
Python is a high-level, interpreted, interactive and object-oriented scripting language. Python is
designed to be highly readable. It uses English keywords frequently where as other languages
use punctuation, and it has fewer syntactical constructions than other languages.
Python Features
Easy-to-learn: Python has few keywords, simple structure, and a clearly defined syntax.
This allows the student to pick up the language quickly.
Easy-to-read: Python code is more clearly defined and visible to the eyes.
Easy-to-maintain: Python's source code is fairly easy-to-maintain.
A broad standard library: Python's bulk of the library is very portable and cross-
platform compatible on UNIX, Windows, and Macintosh.
Interactive Mode: Python has support for an interactive mode which allows interactive
testing and debugging of snippets of code.
Portable: Python can run on a wide variety of hardware platforms and has the same
interface on all platforms.
Extendable: You can add low-level modules to the Python interpreter. These modules
enable programmers to add to or customize their tools to be more efficient.
Databases: Python provides interfaces to all major commercial databases.
GUI Programming: Python supports GUI applications that can be created and ported to
many system calls, libraries, and windows systems, such as Windows MFC, Macintosh,
and the X Window system of Unix.
Scalable: Python provides a better structure and support for large programs than shell
scripting.
Image processing is the process of manipulating pixel data in order to make it suitable for
computer vision applications or to make it suitable to present it to humans. For example,
changing brightness or contrast is an image processing task which make the image visually
pleasing for humans or suitable for further processing for a certain computer vision application.
Face Recognition:
• The proposed face recognition system overcomes certain limitations of the existing face
recognition system.
• It is based on extracting the dominating features of a set of human faces stored in the
database and performing mathematical operations on the values corresponding to them.
• Hence when a new image is fed into the system for recognition the main features are
extracted and computed to find the distance between the input image and the stored
images.
• Thus, some variations in the new face image to be recognized can be tolerated. When the new
image of a person differs from the images of that person stored in the database, the system will
be able to recognize the new face and identify who the person is.
The total system is divided into 3 modules- Database creation, Training the dataset, Testing,
2. Training
a) Initialize LBPH face recognizer.
b) Get faces and Id’s from database folder to train the LBPH face recognizer.
c) Save the trained data as xml or yml file.
3. Testing
Load Haar classifier, LBPH face recognizer and trained data from xml or yml file.
a) Capture the image from camera,
b) Convert it into gray scale,
c) Detect the face in it and
d) Predict the face using the above recognizer.
This proposed system uses Viola Jones algorithm for face detection which uses modified Haar
Cascades for detection. Raspberry Pi is the main component in the project. We will be using
USB webcam to capture photos. We can access Raspberry Pi’s console either by using SSH in
laptop or by using Keyboard and mouse with the display device like TV
connected to Pi. Firstly, the algorithm needs a lot of positive images and negative images to train
the Haar cascades classifier. Positive images are images with clear faces where negative images
are those without any faces.
Haar Cascades:
Each feature is represented as a single value obtained from the difference of the sums of pixels in
white rectangle from the sum of all pixels in the black rectangle. All different possible sizes and
locations of classifier is used for calculating of plenty of features. As the number of classifiers
PYTHON
Open CV
OpenCV (Open Source Computer Vision) is a library of programming functions mainly aimed
at real-time computer vision. Originally developed by Intel, it was later supported by Willow
Garage then Itseez (which was later acquired by Intel). The library is crossplatform and free for
use under the open-source BSD license. OpenCV supports deep learning frameworks
TensorFlow, Torch/PyTorch and Cafe.
It has C++, Python, Java and MATLAB interfaces and supports Windows, Linux, Android and
Mac OS. OpenCV leans mostly towards real-time vision applications and takes advantage of
MMX and SSE instructions when available. A full-featured CUDA and OpenCL interfaces are
being actively developed right now. There are over 500 algorithms and about 10 times as many
functions that compose or support those algorithms. OpenCV is written natively in C++ and has
a templated interface that works seamlessly with STL containers.
In 1999, the OpenCV project was initially an Intel Research initiative to advance CPUintensive
applications, part of a series of projects including real-time ray tracing and 3D display walls. The
main contributors to the project included a number of optimization experts in Intel Russia, as
well as Intel‘s Performance Library Team. In the early days of OpenCV, the goals of the project
were described as:
Advance vision research by providing not only open but also optimized code for basic
vision infrastructure. No more reinventing the wheel.
Disseminate vision knowledge by providing a common infrastructure that developers
could build on, so that code would be more readily readable and transferable.
Advance vision-based commercial applications by making portable, performance
optimized code available for free – with a license that did not require code to be open or
free itself.
Structure of Open CV
Once OpenCV is installed, the OPENCV_BUILD\install directory will be populated with three
types of files:
Image and video I/O (file and camera based input, image/video file output).
Matrix and vector manipulation and linear algebra routines (products, solvers,, SVD).
Basic image processing (filtering, edge detection, corner detection, sampling and
interpolation, color conversion, morphological operations, histograms, image pyramids).
Structural analysis (connected components, contour processing, distance transform,
various moments, template matching, Hough transform, polygonal approximation, line
fitting, ellipse fitting, Delaunay triangulation).
Camera calibration (finding and tracking calibration patterns, calibration, fundamental
matrix estimation, homography estimation, stereo correspondence).
Motion analysis (optical flow, motion segmentation, tracking).
Advantages :
1. Easy and fast to install-These system will be easy to handle.
2. Low cost with high performance-The device will be in a low cost which will work with a good
performance.
3. Environmental friendly system- The system will not harmful for the surrounding.
CHAPTER 5
CONCLUSION AND FUTURE WORK
A surveillance robot has been developed for safeguarding a smart office. It detects human
presence in its vicinity by employing the camera module and IR sensors. The IR sensors aid in
sensing the motion of IR radiating objects. The human face is detected using camera module.
recognition algorithm using Local Binary Pattern (LBP) approach. The robot sends an alert SMS
to the user whenever it detects an unknown person in its vicinity. providing an alert SMS on time
when a threat is detected by it. The robot is unable to detect humans when the light is projected
from behind the person since the area of the fa has to be done in this regard. Also, an additional
feature of tracing the human has to be implemented for increasing the efficiency of the robot.
According to this system, whole area surveillance is done using the Laptop camera and also
automatic system when the sound is detected robot will follow the particular path and go to that
area and capture the area and send using IOT. This system is an automatic smart way for night
vision patrolling
Since office safety is a matter of concern in many parts of the world, this robot can prove itself to
be a helping assistance. As far as the future scope of this system is concerned and as far as
women’s safety is an issue this robot can be an abetment and a Good Samaritan.
REFERENCES:
[Type text] Page 68
Office Surveillance Robot Using Arduino Laptop
2024
[1] S. Mittal and J. K. Rai, "Wadoro: Electronics, Intelligent Control and Energy Systems
(ICPEICES),2016.
[2] P. Viola and M. Jones, "Rapid object detection using boos on Computer Vision and Pattern
Recognition, 2001
[3] S. V. Viraktamath, MukundKatti, Aditya Khatawkar and Pavan Kulkarni; “Face Detection
and Tracking using OpenCV” SIJ Trans on Computer Networks & Communication Eng
[4] N. Stekas and D. V. Heuvel, “Face recognition using Local Binary Patterns Histograms
(LBPH) on an FPGA Chip (SoC),”IEEE International Parallel and Distributed Processing
Symposium Workshops, November 2016
[5]M. A. Rahim, M. N. Hossain, T. Wahid and M. S. l Azam, “Face Recognition using Local
Binary Patterns (LBP),” Global Journal of Computer Science and Technology Graphics &
Vision Vol. 13 Issue 4 Version 1.0 Year 2013; PP.3
[6] Sushant Kumar and Dr. S. S. Solanki, “Remote Home Surveillance System “, 2016
International Conference on Advances in Computing, Communication, & Automation
(ICACCA), 29 September 2016.
[7] Shah, Mohammad Shoeb, and P. B. Borole. "Surveillance and rescue robot using Android
smartphone and the Internet." 2016 International Conference on Communication and Signal
Processing (ICCSP). IEEE, 2016.
[8] G. Anandravisekar, A. Anto Clinton, T. Mukesh Raj, L. Naveen, M. Mahendran, “IOT based
Surveillance Robot”. Department of Electronics and Communication Engineering Saranathan
College of Engineering Trichy, Tamilnadu, India. “International Journal of Engineering
Research & Technology (IJERT)”,2018.
[9] S. Jagadesh, R. Karthikeyan, R. Manoj Prabhakaran, R. Ramesh and C. Shanmugam.
"Surveillance Robot Using Microcontroller ESP8266". IJAREEIE Vol. 8, Issue 3, March 2019
[10] Telkar, Aishwarya K., and BaswarajGadgay. "IoT Based Smart Multi Application
Surveillance Robot." 2020 Second International Conference on Inventive Research in Computing
Applications (ICIRCA). IEEE, 2020.