The Invisible Eye

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

International Journal of Trend in Scientific Research and Development (IJTSRD)

Volume: 3 | Issue: 3 | Mar-Apr 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470

The Invisible Eye


Ms. R. Selvapriya1 M.Sc., MPhil, Raghul. D2 B.Sc (IT)
1Assistant Professor, Department of Information and Computer Technology,
1,2Sri Krishna Adithya College of Arts and Science, Kovaipudur, Coimbatore, Tamil Nadu, India

How to cite this paper: Ms. R. ABSTRACT


Selvapriya | Raghul. D "The Invisible The main agenda of this work is to design advanced security with affordable and
Eye" Published in International Journal less complex system referred as “Invisible Eye”. In this modern era, property
of Trend in Scientific Research and crimes are more predominant which necessitates developing an advanced
Development security system. In order to overcome predominant & contagious crimes the
(ijtsrd), ISSN: 2456- researchers used the technology in a more efficient way to prevent the theft. This
6470, Volume-3 | method uses sensors, cameras & AI systems to detect, capture & send
Issue-3, April 2019, information respectively to the cops.
pp. 66-67.
http://www.ijtsrd.co
m/papers/ijtsrd216 IJTSRD21627 KEYWORDS: camera, sensors, motor, keypad, motion detector
27.pdf

Copyright © 2019 by author(s) and


International Journal of Trend in
Scientific Research and Development
Journal. This is an Open Access article
distributed under
the terms of the
Creative Commons
Attribution License (CC BY 4.0)
(http://creativecommons.org/licenses/
by/4.0)

I. INTRODUCTION
It is a single camera based security system which is used to senses the motion or vibration it sends that information of
protect the valuables kept in room. This system can be used motion to the Microcontroller. Here we are using stepper
when slew around the room and recorded when it is alerted motor, wireless camera and also a PC.
by the presence of any intrusion. Manager can only view the
footage which was alerted on the presence of intrusion. This III. MODERN SYSTEMS
type of system would lead to less time consuming and this Today's security systems are extremely effective in
will help to keep track of the intruder easily in less time. preventing burglary and thefts as well as helping police
Once the intruder has been detected this information about respond to emergency situations. The mainstay of the home
intrusion will be directed to the cop through the E-mail. Such security system is definitely the high decibel siren. Today the
a system would consist three components – sensors that siren is used to ward off would be intruders not for
detect intrusion; the camera that slews to the point of monitoring purposes. In most cases home security systems
intrusion and takes pictures; and the keypad that is used to are monitored by large companies with multiple monitoring
interface with the system which allows any person to disable centers. These centers house countless trained professionals
the system by entering the right password. who are there in times of need for residences and businesses
across the country. These monitoring centers also can
II. DESIGN METHODOLOGY provide support for other potential disasters such as carbon
Invisible eye an advanced security system is mainly designed monoxide, fire, freezing pipes, and much more. Modern
to use a single camera to perform the security. The reason security systems use alarms, infrared motion sensors, digital
for security is, the user of a system may have valuable surveillance and contemporary monitoring stations.
belongings kept in his home, or a jewellery shop owner need Monitoring is extremely efficient and emergency response
security at night times for his property. The present time for triggered alarms has improved dramatically due to
technologies have many disadvantages like multiple technology.
camera’s, more cost, power consumption, the owner has to
always view the recording of the footage without any IV. HARDWARE PART
assurance of the theft. One can design the model using PIC16F877A belongs to a class of 8-bit microcontrollers of
different sensors like motion sensor, vibration sensor, the RISC Architecture. PIC microcontroller is an amazing
motion sensor detects the motion of a human being in that powerful fully featured processor with Internal RAM,
particular area where a sensor is placed. Once the sensor, EEPROM FLASH memory and peripherals.

@ IJTSRD | Unique Paper ID - IJTSRD21627 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 66


International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
VI. WORKING
Step1: User enters the password, if password entered is
correct the system starts else he is prompted to re-
enter the password.
Step 2: If sensors sense any change, then an intrusion is
detected. Else there is no intrusion.
Step 3: If intrusion is detected, then relay triggered, stepper
motor rotates the camera starts recording and an e-
mail is sent to the user.

VII. CONCLUSION
Invisible Eye security system solves many of the problems
faced by the multiple camera based systems at an easily
affordable cost. The biggest advantage is that we can avoid
having to wade through hours of footage of empty rooms.
One can also avoid having to install multiple cameras to
cover a single room. Cost required for the installation is very
less compared to multiple camera based system. We can
V. PIR MOTION DETECTOR MODULE avoid hours of footage of empty rooms. Good view of the
PIR sensors allow you to sense motion, almost always used video footage can be obtained as camera turns 360°. This
to detect whether a human has moved in or out of the work can be extended to completely eliminate the use of the
sensors range. They are small, inexpensive, low-power, easy microcontroller and instead use parallel port of the PC to
to use and don't wear out. For that reason they are monitor the sensors. Also advanced image processing
commonly found in appliances and gadgets used in homes or techniques can be applied to track the intruder once his
businesses. They are often referred to as PIR, "Passive position has been identified .In future we can provide a
Infrared", "Pyroelectric", or "IR motion" sensors. To increase memory so that one can store the footage which is recorded.
the efficiency of SIP signaling, yet maintain 100% standards
compatibility with external VoIP systems and soft switches, VIII. REFERENCES
xG has created patent pending SIP compression technology [1] The 8051 microcontroller and embedded system by
for the Invisible Eye system that reduces SIP overhead Muhammad Ali Mazidi
bandwidth from 400% to 66% on the over the air links and [2] http://www.scribd.com/mobile/doc/84040168/invisi
backhaul links from the Base Stations to the Invisible Eye ble-eye-advance-security-system-ppt
MSCs. The MSCs do the SIP compression and decompression
to maintain 100% interoperability with third-party VoIP [3] http://www.seminarsonly.com/computerscience/invis
systems. This also has the benefit of making more bandwidth ible-eye-seminar-report-ppt-pdf.php
available for mobile data applications being carried
alongside voice traffic.

@ IJTSRD | Unique Paper ID - IJTSRD21627 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 67

You might also like