DESIGN AND CONTRUCTION OF A PERIMETER MONITORING SYSTEM USING WIRED SENSORS
USER'S INSTRUCTIONS: The project work you are about to view is on "design and contruction of a perimeter monitoring system using wired sensors". Please, sit back and study the below research material carefully. This project topic (design and contruction of a perimeter monitoring system using wired sensors) have complete 5(five) Chapters. The complete Project Material/writeup include: Abstract + Introduction + etc + Literature Review + methodology + etc + Conclusion + Recommendation + References/Bibliography.Our aim of providing this "design and contruction of a perimeter monitoring system using wired sensors" project research material is to reduce the stress of moving from one school library to another all in the name of searching for "design and contruction of a perimeter monitoring system using wired sensors" research materials. We are not encouraging any form of plagiarism. This service is legal because, all institutions permit their students to read previous projects, books, articles or papers while developing their own works.
TITLE PAGE
BY
---
--/H2013/01430
DEPARTMENT OF ----
SCHOOL OF ---
INSTITUTE OF ---
DECEMBER,2018
APPROVAL PAGE
This is to certify that the research work, "design and contruction of a perimeter monitoring system using wired sensors" by ---, Reg. No. --/H2007/01430 submitted in partial fulfillment of the requirement award of a Higher National Diploma on --- has been approved.
By
--- . ---
Supervisor Head of Department.
Signature………………. Signature……………….
……………………………….
---
External Invigilator
DEDICATION
This project is dedicated to Almighty God for his protection, kindness, strength over my life throughout the period and also to my --- for his financial support and moral care towards me.Also to my mentor --- for her academic advice she often gives to me. May Almighty God shield them from the peril of this world and bless their entire endeavour Amen.
ACKNOWLEDGEMENT
The successful completion of this project work could not have been a reality without the encouragement of my --- and other people. My immensely appreciation goes to my humble and able supervisor mr. --- for his kindness in supervising this project.
My warmest gratitude goes to my parents for their moral, spiritual and financial support throughout my study in this institution.
My appreciation goes to some of my lecturers among whom are Mr. ---, and Dr. ---. I also recognize the support of some of the staff of --- among whom are: The General Manager, Deputy General manager, the internal Auditor Mr. --- and the ---. Finally, my appreciation goes to my elder sister ---, my lovely friends mercy ---, ---, --- and many others who were quite helpful.
PROJECT DESCRIPTION: This work "design and contruction of a perimeter monitoring system using wired sensors" research material is a complete and well researched project material strictly for academic purposes, which has been approved by different Lecturers from different higher institutions. We made Preliminary pages, Abstract and Chapter one of "design and contruction of a perimeter monitoring system using wired sensors" visible for everyone, then the complete material on "design and contruction of a perimeter monitoring system using wired sensors" is to be ordered for. Happy viewing!!!
The system signals if intruders are present by releasing an out via an email whenever an area is violated. This may, for instance, also be triggered by objects or items regardless of whether they are mobile or not. The system is about remotely managed and monitors environment by alerting through receive captured image of intruder as Email alert. Perimeter monitoring system has become indispensable in daily life. The design is on development of an environmental security system, based on human motion detection and remotely monitoring technology, to monitor and detect an intruder through email alerting system is presented in this paper. A PIR motion sensor and Camera module are used to detect motion and capture images respectively are dedicatedly make the security system alive as per the request.
The proposed system uses controller interface system with Atmega 32 which is low cost and consume smaller amount of power. When an intruder motion is detected at positioned environment, Camera module interfaced to Atmega 32 capture images, save it on system and send it as Email alert via TCP/IP. The concerned authority can control the system and view video stream of camera module through Smart mobile Phone.
Table of contents
Cover page
Title page
Approval page
Dedication
Acknowledgement
Abstract
Chapter one
Introduction
- Background of study
- Problem statement
- Aim and objectives of the project
- Significance of the project
- Definition of terms
Chapter two
Literature review
- Introduction
- Concept of the wireless sensor network
- Concept of smart environments
- Concept of perimeter intrusion
- Fundamentals of iot based perimeter intrusion systems
- Concept of WSN and its communication architectural frameworks
- Concept of camera motion
- Types of camera motion
- Review of related studies
Chapter three
Methodology
- Introduction
- Design requirements
- Basic image processing algorithm
- System block
- System description
- System hardware
- System implementation
- Software implementation for rcu
Chapter four
- Results
Chapter five
- Conclusion
- References
Chapter One
1.0 Introduction
1.1 Background to the Study
Motion can be distinguished in an arrangement of ways, and pointers are basically used for recognizing moving things (particularly people) and assembling data on position, speed increment, and speed. The movement of distinguishing genuine advancement in a given district is fundamental moving area; this ought to be conceivable by assessing the change of speed or vector of an article. The availability of a tremendous number of strong and complex computations displays the meaning of movement acknowledgment in the arrangement of a robotized perception structure. Motion capture is a development that licenses sensors to record human movement and cautiously map it to PC delivered creatures [5]. This advancement provides extraordinarily definite position and guidance information about unambiguous points of view, which can be picked by the experimenter. Improvement bearings, present data, speed profiles, and other execution records can be for the most part accumulated using motion following. Motion following a camera has been thought about in as a field known as PC vision for a long while. The progression of PC vision structures was as of late made sure to be the sole area of expert sign taking care of and man-made intellectual ability investigators and engineers. Regardless, various areas of making development have actually advanced toward new strategies for association [4]. Myron Krneger was a pioneer in the arrangement field, encouraging a piece of the fundamental body affiliation based cameras. He used a PC and a camera to make a continuous association between the advancements of the individuals and the environment [3]. The target of motion disclosure is to recognize the course of action of pixels that are through and through one of a kind between the last image of the gathering and the previous pictures given a lot of photos of a comparative scene taken at a couple of unmistakable times. Far off reconnaissance cameras are ending up being more commonly sent than standard wired cameras to screen and report interrupting or other unapproved development as a result of their flexibility and extraordinarily chipped away at foundation. As demonstrated by Market Research Future's most recent survey, which was coordinated in 2020, the overall far off video noticing and perception market will create at a high yearly advancement speed of 16.85 percent from 2017 to 2023. Some distant reconnaissance cameras are made recognizable as an obstruction measure, yet that detectable quality could mean they are more feeble against mischief or thievery, criminals could end up being more enthusiastic about breaking in since they acknowledge the camera signals that there are resources inside the property, it is more direct to do whatever it takes not to be recorded, e.g., an adversary could find the weak sides (i.e., districts not inside the camera's periphery vision) and impact them to make an effort not to be recorded. Along these lines, people could present far off cameras unnoticeably. In like manner, they are ordinarily captivating concentrations for adversaries hoping to avoid distinguishing proof. The speedy spread of distant cameras raises assurance issues related with unfortunate video recording, especially given the progressively more unobtrusive size of spy cameras. These cameras may be expeditiously camouflaged, so their targets don't know anything about their presence. Incalculable far off cameras, including raving success models, have fundamental motion sensors. Arlo Pro 2 and Amazon Blink XT2 Because of the volume of data obtained by distant cameras, they stay for possible later use mode until improvement is distinguished, when the camera proceeds and starts recording, moving got video to the cloud backend server and telling the land proprietor. In like manner, the association experiences a flood in remote busy time gridlock. The camera will then, keep on recording until the movement stops. It then, at that point, returns to reinforcement mode. Since far off reconnaissance cameras put in various regions have changing consideration districts. As a general rule, non-camera contraptions like PCs, mobile phones, and tablets make a combination of remote traffic streams. In like manner, perceiving which data streams have a spot with far off cameras is inconvenient, especially given that far off area (WLANs) use encryption frameworks like WEP, WPA, and WPA2 to avoid information put down some a reasonable compromise from loose snoopping. For all intents and purposes generally contemporary product network contraptions use 802.11 far off shows, which have a characteristic imperfection in that they uncover interface layer Media Access Control (MAC) addresses. Each MAC address, which is an incredibly strong all around novel distinctive verification, uncovers information about the contraption producer through the underlying three most critical MAC bytes, i.e., the Organizationally Unique Identifier (OUI). This upholds the usage of the OUI MAC areas to distinguish the presence of far off camera traffic.
1.2 Statement of the Problem
The security systems of a construction could intermittently forget to protect homes and workplaces. As demonstrated by a survey done by the FBI, all interference concerns occur while the owners are missing. Interlopers have entered properties at customary stretches reliably. Only 10% of these result in catches, while the remainder of to be overcomers of interferences. There are various solutions for this issue, similar to home motorization structures, alert acknowledgment systems, and so forth, however these structures might potentially deliver counterfeit cautions. This is in light of the fact that, generally speaking, there is an interest for security and prosperity in created conditions like homes and various premises. The use of technology in recent times have been deployed to monitor, detect and even notify in cases of intrusion. One of such prominent technologies is the use of wireless sensor networks. Hence the use of the wireless system network is very efficient in all aspects.
1.3 Aim and objectives
This study is aimed at design and development of a smart perimeter monitoring system.
Objectives
1. Design a wireless sensor network system that can efficiently monitor the perimeter of a built area or premises.
2. Design a wireless sensor network system that can detect, monitor and notify any form of intrusion within a premise.
1.4 Significance of the study
This study will be of significance in the following ways, the use of wireless sensor networks will ensure the security and safety of built area, and premises, the use of wireless sensor networks can also automate the monitoring of a built environment or a perimeter, the use of wireless sensor network will also enhance the applications of the use of sensor in other security aspects. This Study will also be of benefit by increasing the knowledge at which the wireless sensor networks operate.
1.5 Definition of terms
WSN
Remote Sensor Networks (WSNs) are self-designed, framework free remote organizations that distinguish physical or natural factors like temperature, sound, vibration, tension, portability, or contamination and cooperatively communicate their information by means of the organization to a focal area or sink.
Intrusion detection
Human interference and motion acknowledgment structure can recognize the presence of an individual using sensors.
Perimeter
This can be described as the length of such a boundary.
CHAPTER TWO: The chapter one of this work has been displayed above. The complete chapter two of "design and contruction of a perimeter monitoring system using wired sensors" is also available. Order full work to download. Chapter two of "design and contruction of a perimeter monitoring system using wired sensors" consists of the literature review. In this chapter all the related works on ""design and contruction of a perimeter monitoring system using wired sensors were reviewed.
CHAPTER THREE: The complete chapter three of "design and contruction of a perimeter monitoring system using wired sensors" is available. Order full work to download. Chapter three of "design and contruction of a perimeter monitoring system using wired sensors" consists of the methodology. In this chapter all the method used in carrying out this work was discussed.
CHAPTER FOUR: The complete chapter four of "design and contruction of a perimeter monitoring system using wired sensors" is available. Order full work to download. Chapter four of "design and contruction of a perimeter monitoring system using wired sensors" consists of all the test conducted during the work and the result gotten after the whole work
CHAPTER FIVE: The complete chapter five of "design and contruction of a perimeter monitoring system using wired sensors" is available. Order full work to download. Chapter five of "design and contruction of a perimeter monitoring system using wired sensors" consist of conclusion, recommendation and references.
To "DOWNLOAD" the complete material on this particular topic above click "HERE"
Do you want our Bank Accounts? please click HERE
To view other related topics click HERE
To "SUMMIT" new topic(s), develop a new topic OR you did not see your topic on our site but want to confirm the availiability of your topic click HERE
Do you want us to research your new topic? if yes, click "HERE"
Do you have any question concerning our post/services? click HERE for answers to your questions
For more information contact us through any of the following means:
Mobile No :+2348146561114 or +2347015391124 [Mr. Innocent]
Email address :engr4project@gmail.com
COUNTRIES THAT FOUND OUR SERVICES USEFUL
Australia, Botswana, Canada, Europe, Ghana, Ireland, India, Kenya, Liberia, Malaysia, Namibia, New Zealand, Nigeria, Pakistan, Philippines, Singapore, Sierra Leone, South Africa, Uganda, United States, United Kindom, Zambia, Zimbabwe, etc
Support: +234 8146561114 or +2347015391124
Watsapp No :+2348146561114
Email Address :engr4project@gmail.com
FOLLOW / VISIT US VIA: