0% found this document useful (0 votes)
51 views

Group 13 2

This document provides an introduction and overview of a home security and alert system project that uses sensors and artificial intelligence. The system tracks visitors to a home and sends alerts to the homeowner's mobile phone and in-home speaker with the name of known and unknown visitors. It discusses the problem the system aims to address, provides an overview of the project development process, and outlines the hardware and software specifications and requirements. The system uses a PIR sensor and Arduino microcontroller for movement detection, and computer vision and machine learning models for object and face recognition. Alerts are sent via WhatsApp messaging and text-to-speech. A literature review analyzes existing home security systems and the feasibility of the proposed improved user experience system

Uploaded by

Abinash Das
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views

Group 13 2

This document provides an introduction and overview of a home security and alert system project that uses sensors and artificial intelligence. The system tracks visitors to a home and sends alerts to the homeowner's mobile phone and in-home speaker with the name of known and unknown visitors. It discusses the problem the system aims to address, provides an overview of the project development process, and outlines the hardware and software specifications and requirements. The system uses a PIR sensor and Arduino microcontroller for movement detection, and computer vision and machine learning models for object and face recognition. Alerts are sent via WhatsApp messaging and text-to-speech. A literature review analyzes existing home security systems and the feasibility of the proposed improved user experience system

Uploaded by

Abinash Das
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 68

CHAPTER 1

INTRODUCTION

1.1PROJECT INTRODUCTION

Nowadays with advancements in technology and new ways of usage of


technology everyone it is very essential to track and securely keep our
family members and our homes. We need new ways to track and know
about human intervention or visitors nearby or to our home. We have built
a home security and alert system which tracks people visiting the owner's
home and with improved usage and implementation of artificial
intelligence we can improve the user experience of our home security and
alert system by giving the name of known and unknown visitors via alert
via an alerting system on mobile phone and voice-speaker installed at
home.

1.2PROBLEM DEFINITION

In earlier days the houses have not adopted technologies, which the
burglars took as an advantage. In the absence of the owner of the house,
they stole away the things and destroy the house which leads to severe
loss for the owner. In some cases due to sudden break In, some people
have to lose their lives also. In the greater stages, it leads to the loss of the
country.
As we are now living in a technology-heavy world, we can use IoT and
machine learning to control these criminal activities. In this, we use
Arduino as a microcontroller and which detects the movement using a
PIR sensor after that, we can use machine learning to detect items and face
recognition and provide alerts to the home's owner so they can work

Page 1 of 68
together with the authorities to stop these types of criminal activity.
1.3PROJECT OVERVIEW

We started our work by taking references from all research papers. We


have started our work by collecting the PIR sensor and Arduino UNO kit
available in our institute and connecting them with the help of jumper
wires. Then we installed the Arduino IDE from the official website of
Arduino, which is an IDE based on the C programming language. After
that, we tested the PIR sensor for movement detection, and the result of it
was shown by a glowing led which is connected to the Arduino board.
From this test, we also got to know, the PIR sensor that we used for this
project had a range of 2 meters with an angle of 180 degrees in front of its
lens. After the successful test of the PIR sensor, we installed the VS Code
as a code editor and installed Python for our OS i.e. for Windows, and set
the path variable for the Python IDE. Then we installed the Python
packages from VS Code extensions such as Code Runner v0.12.0, isort
v2022.8.0, Pylance v2023.2.20, and Python v2023.2.0. Then we write the
code for Python to connect the Arduino board with VS Code and in this
process, we use the Pyserial module of Python for the serial
communication from Arduino to Python. After that, we write the code to
catch the analog signal from the Arduino board and if the analog signal
shows any deflection then the camera module opens and it further it goes
for the object detection process. For the object detection process, we use
DLIB and OPEN CV modules of machine learning. If any object other
than a human is found in this process then the camera module closes and it
sends nothing to the owner. If a human is found then the work further
proceeds for face recognition. For this, we have installed the face
recognition module of Python due to which the known and unknown
persons are classified. Then we installed the Py-What kit module of
Python which will send the image as well as the name of a known person
to the owner`s Whatsapp application. And it also sends the message to the
owner`s voice speaker that is installed inside the owner`s house by using

Page 2 of 68
the Google text-to-speech module for the voice and Numpy for the
mathematical calculations of the number of humans at the door. If an
unknown person is found at the door then the Whatsapp massage and the
voice speaker alert that some unknown person is at the door.

1.4HARDWARE SPECIFICATION

 Laptop with a minimum requirement of 8 G.B RAM


 Arduino UNO
 PIR sensor
 Jumper Wires
 LED
 Arduino to laptop connector

1.5SOFTWARE SPECIFICATION

 Arduino IDE: It is an IDE used for the implementation of Arduino codes


 Python IDE: It is an IDE used for the implementation of Python codes
 Pyserial: It is a module of Python used for the serial
communication of Arduino board from Python codes.
 Open CV: It is an object detection machine learning module.
 DLIB: It is a machine learning module used for object detection and
face recognition.
 Face Recognition: It is a module of Python used for face
recognition for humans.
 Google Text to Speech: It is used to convert the text in the Python
code to be used in the voice speaker.
 Numpy: It is a module of Python used for mathematical calculations.
 Py-Whatkit: It is a module of Python used to send a Whatsapp
message to a given mobile number.

Page 3 of 68
CHAPTER 2

LITERATURE REVIEW

2.1 EXISTING SYSTEM

Priorly, we have the traditional approach of home security, and almost


90 percent of the homes in the late 1900s had no security, due to which
the crime rate got untouchable, and almost every day we got the news of
robbery. But in the early 2000s, some of the homes took this type of
robbery as a serious issue and adopted some of the home security
systems based on the Raspberry-pi microcontroller which controls and
sends the notification and the image through some paid applications and
programming bots, which helped them to decrease the robbery rate by
helping the people and the cops in case of identification of the person at
the doorsteps. When someone was at the door, these systems were also
utilized to notify the home's owner via alert messages.

2.2 PROPOSED SYSTEM

Nowadays we have passed almost 22 years since the year 2000 and the
technology from the previous one has already improved. So we want to
develop this system to work more efficiently and we have changed its
microcontroller from Raspberry-pi to Arduino to reduce the complexity
as Arduino has an easier time interfacing where as raspberry-pi has a
more complicated path to get the sensor data. We are also using
Whatsapp as an image and message-sending application which is vastly
available for all age groups of people and easy to handle.

Page 4 of 68
2.3 LITERATURE REVIEW

TABLE 2.1 LITERATURE SURVEY

From the literature survey, we got a brief idea of the tools to be used
and how to proceed by following the steps written in research papers.
We got some knowledge about the software and hardware that will be
used in our project.

Page 5 of 68
Page 6 of 68
Page 7 of 68
Page 8 of 68
Page 9 of 68
Page 10 of 68
Page 11 of 68
TABLE 2.1 LITERATURE SURVEY

From the literature survey, we got a brief idea of the tools to be used and
how to proceed by following the steps written in research papers. We got
some knowledge about the software and hardware that will be used in
our project.

Page 12 of 68
2.4 FEASIBILITY STUDY

Proper research was been conducted to analyze the existing solution


space of the home security systems that exist at the moment for this all
the latest research papers were been studied. During the study, it was
been found that existing solutions used face recognition and alert system
using various ways such as SHH shell and telegram, etc. which were
inaccessible and were not user-friendly with the existing user base of the
target user's homeowners or people living in the home which include
users from all the age groups including children and old aged elderly
users their fore it was necessary to include an alert system which is user
friendly and which is accessible by all age d use groups, therefore, we
included Whatsapp which is used by all aged user groups. Apart from
these existing applications of the home security and alert system were not
user-friendly giving information in the right way to improve the
experience of the end users, therefore, we have planned to use Artificial
Intelligence to deliver information that improves the experience of the
end user.

Page 13 of 68
CHAPTER 3

SYSTEM ANALYSIS AND DESIGN

3.1 REQUIREMENT SPECIFICATION

Our project is mainly based on the Internet of Things (IoT) and machine
learning. So sensors as well as coding software and its modules are used
in this project. To run this software and its modules we require a laptop
with a minimum requirement of 8 GB RAM. In this project, we use
Arduino UNO as the microcontroller and which is connected to the PIR
sensor which senses the movement of any object or human which comes
into its focal areas. To connect the Arduino with the PIR sensor we use
male-to-female jumper wires. The LED is connected to the Arduino PIN
digital 13. For the connection of Arduino UNO with the laptop we use
USB2.0 A-B cables.
As it is a project based on machine learning, we use certain softwares and
its modules. First of all, we need an Arduino IDE where we can
implement the Arduino code for the PIR sensor. We also use python IDE
to implement python codes for this project. we use the Pyserial module
of python for the serial communication from Arduino UNO to python.
We also use Open CV for object and face detection and then we have
DLIB for the object and face recognition processes and also we have face
recognition to train the artificial intelligence to remember the known
person. Then we have Numpy for mathematical calculations like the
number of humans at the door. And lastly, we use Py- Whatkit to send
the image and messages to the owner of the home via Whatsapp and also
use Google Text-to-Speech to convert the text messages to alert the
people inside the home via voice speaker.

Page 14 of 68
3.2 FLOW CHART

Figure 3.1 Flow Chart of Hame Security and Alert System

From the above flow chart diagram we came to know about the whole
procedure of the system and the working principle. In this, if an intruder
is detected by the motion sensor i.e. THE PIR sensor, then the camera
module gets activated and it then proceeds to face and object detection.
After that, the classification process is going on. If there is an object
other than a human is found then the system simply exits, but if any
human is found then the intruder details are sent to the alert modules and

Page 15 of 68
then the notification will be sent to the mobile of the owner along with
the images, and also the information is sent alerted to the homes by the
voice speaker.

3.3 E~R DIAGRAM

Figure 3.2 E~R DIAGRAM

Here the visitor or the end user is the main entity with three attributes
that is name, image, and movement that is the name of the user, the
image of the user which is captured by the camera module, and
movement is also an attribute of the user as it is detected when someone
including the user visits the house via the door.

Page 16 of 68
On detection of the movement attribute by the PIR sensor that is if the
movement detector’s decision box detects any movement that is if the
answer is “YES” value is returned then the camera module captures the
image and on not detecting any movement it simply exits program
execution by returning “NO” value path as there is no movement so one
is at the door.
After the image is captured by the camera module image attribute is
passed to the object detection module where the object detection
module’s decision tree detects an object “YES” value is detected and it
means that a cat or a dog or a pet animals movement was been detected
this will prevent us from getting any false alarm. We can here also train
an Object detection module to recognize wild animals for houses near
forests to identify wild animals or any kind of weapons in the image to
enhance the security of the homeowners. If no suspicious objects are
detected by the object detection module the decision tree module will
return a “NO” Value and the after this the program will pass the image to
the Face detection module to try to find human faces in the image which
was been captured by the camera module.
The Decision box of the face recognition module tries to find faces in the
image and on not finding any face it simply returns a “NO” value. That is
if any face is detected by the face detection module then the decision tree
will simply return a “Yes” value which means the image will be passed
to the face recognition module to recognize detected faces in the image
to be able to classify it as a known and unknown face.
The Face Recognition module on getting the image with the faces
detected will look for known people’s faces in the images if an unknown
face is found then the image will be forwarded to the alert module to
send the name of the recognized person and its image to the homeowner
alert module alerts the owner via text or with just the name on the
speaker.
If the face recognition module will not be able to find any known
people's faces in the Image then an alert saying that “An Unknown
person is detected at the door” will be sent to the homeowner via text and
Page 17 of 68
voice alert by the speaker module which is installed inside the home to
let the owner of the home get alert

3.4 PROCESS INVOLVED AND ERRORS

At first, we collected Arduino UNO and the PIR sensor from the faculties
of our college through our guide after researching the use case and using
techniques of arduino.

Figure 3.3 Arduino UNO

Figure 3.4 PIR sensor

We have connected the Arduino UNO kit with the PIR sensor by using
the male- to-female jumper wires. The “GND” pin of the PIR sensor is
connected to the “GND” pin of Arduino UNO. The “VCC” pin of the
PIR sensor is connected to the “5v power supply” pin of the Arduino
Page 18 of 68
UNO board. At last, the Input pin of the PIR sensor is connected with the
“Analog 0” of the Arduino UNO board.

Page 19 of 68
Figure 3.5 connection of Arduino UNO with the PIR sensor
After finishing these we move on to the laptop to install Arduino IDE
from the official website of Arduino.

Figure 3.6 Search result for Arduino IDE installation

Then click on the download page link on the Arduino website as


mentioned in the below image.

Page 20 of 68
Figure 3.7 Interface for the installation process of Arduino IDE

Then as the site proceeds forward we have to choose windows 10 and


newer, 64- bit from the download options, and proceed forward for the
next step as shown in the below figure.

figure 3.8 Download page for Arduino


By clicking on the desired place we arrived at a place where we have to
click on just download for completing the downloading process which
takes some time for the downloading process after that, the installation
process begins, and the IDE is then ready for writing codes.

Page 21 of 68
Figure 3.9 final process for Arduino download

After finishing the installation process open the Arduino IDE and inside
it install all the packages that the Arduino needs to be installed. Then
insert the Arduino code for the PIR sensor which can collect the
information from the PIR sensor and show the result through the serial
monitor.

Figure 3.10 starting layout of Arduino IDE


Page 22 of 68
Figure 3.11 Arduino code for PIR sensor reading

Then for the connection of the Arduino to the laptop, we use A-B
connecting cables and then select the board name and the port name
available by the laptop. For this, we have to go to the Device manager
and then there will be a port option from where we knew about our
device's communication port number as “COM3”.Then we select the
BOARD from the Arduino IDE as serial port USB.

Page 23 of 68
Figure 3.12 finding device manager in our laptop

Page 24 of 68
Figure 3.13 interface of device manager

Figure 3.14 communication port identification

Page 25 of 68
Figure 3.15 selecting the Arduino UNO as BOARD

Figure 3.16 selecting COM3 as PORT

Then select the BUDRATE as 9600 from the serial monitor and the
output tab in the serial monitor the output of the PIR sensor is shown
along with the time of the implementation of the sensor and along with
the analog data from the sensor.

Page 26 of 68
Figure 3.17 Adjusting the BAUD RATE in Arduino IDE

Figure 3. 18 The output while no movement is detected

Page 27 of 68
Figure 3.19 The output while some movement is detected

Once the program for Arduino is inserted into the Arduino UNO board
then there is no need for the Arduino IDE to remain. So after that, we
integrated the code into python IDE which we require to install python
from its official website. For this, we go to our web page and with the
Google search engine we searched for python for windows installation.
After that, a pop-up window from the python official is shown according
to figure 3.20.

Figure 3.20 Search results for python installation

Page 28 of 68
In the next step, a pop-up window for the downloading process of python
is shown and the python is downloaded from that.

Figure 3.21 Download tab for python

After downloading python, we installed python and then we install the


VS code as a code editor. For this, we go to the VS code official website,
and using the google search engine we installed VS code.

Page 29 of 68
Figure 3.22 search result for VS code installation

Figure 3.23 The download page for VS code installer

Page 30 of 68
After installing the VS code, we inserted some of the modules of python
in VS code such as Code Runner v0.12.0, isort v2022.8.0, Pylance
v2023.2.20, ddddddddddd5\9and Python v2023.2.0.

Figure 3.24 The Code Runner extension in VS code

Figure 3.25 The isort extension in VS code

Page 31 of 68
Figure 3.26 The Pylance extension in VS code

Figure 3.27 The Python extension in VS code

After that, we inserted the Pyserial module of python by using pip


install Pyserial

and also, for the serial communication.

Page 32 of 68
Figure 3.28 The installation of the Pyserial module in VS code

The following packages or libraries were installed to execute the


program in python. The First library which was installed in python is
google text-to-speech which is a library to convert text to speech using
google’s trained AI modules. This can be used very simply to convert
very simple text to convert it into audio files.

Figure 3.29 The google text-to-speech python library


installation

Play sound is used to give an alert to the speaker. The audio file which
was used is produced by the google text-to-speech library earlier.

Page 33 of 68
Figure 3.30 The play sound python library installation

A Face Recognition module was installed in python to compare faces in


the images with the pretend data set of images.

Figure 3.31 The Face Recognition python library installation

Serial was installed to connect Arduino UNO with python code.

Figure 3.32 The Serial python library installation

Numpy was installed as it is used for mathematical calculation. And here


it was used to calculate the matrices which refer to the facial features
present in the image.

Figure 3.33 The Numpy python library installation

Page 34 of 68
3.5 ALGORITHMS

Arduino IDE works on two functions that are "Void setup” and “Void
loop". The main goal of these two functions is to stick to the program.
Here "void setup" calls the early words whereas "Void loop" calls the
execution. If not finished, the "Void loop” will be called again and again
till completion. Once the work is done in the setup function (i.e
declaration, input, and output), the task will be written in the loop
function. For all Arduino codes, the setup will be called once, and after
that loop is called again and again. As Arduino code contains some rules
for its successful application. that are
 program runs in a linear fashion
 Curly brackets should be applied at every turn

 It is a case-sensitive program

 Use // to add comments


Some of the variables are used to store data, referenced, and manipulated
in a program. In Arduino, there are three things required to declare a
variable in Arduino that are
 Data type

 Variable name
 Value
Global variables can be accessed on any function in the program. Local
variables are declared inside a function and can be used only inside that
function. Some basic functions for controlling the Arduino Board are

 Pin mode()

These are used to give information to the Arduino board to which pin in the
board we are going to use through the program, whether it is analog or
digital and it also tells how to use the pin in the Arduino board (i-e We are
going to send output or receive input).
Syntax- Pin Mode (Pin, mode); Pin: Arduino pon mode: INPUT/OUTPUT

Page 35 of 68
Figure 3.34 pinMode

 digitalWrite

These are used to send any two types of signals from a digital pin of an
Arduino board.

The two signals are High and Low.

If we use ‘High’ in any Arduino pin that means the pin gets 5V. If we
use 'Low' in any Arduino pin then the pin gets 0V. So the LED will not
glow as there is no potential difference.

Syntax: digitalWrite (pin, value);

Figure 3.35 digitalWrite

 Delay()

This function uses the program for the amount of time in milliseconds
specified as a parameter.

Syntax: delay(ms);

Figure 3.36 Delay

 Serial Communication

Communication of data through TX and RX pins is called UART.

Page 36 of 68
TX-
Trans
mitter
Pin
RX-
Receiv
er Pin
Then Programs are uploaded to Arduino Board through TX And RX.
A serial Monitor is a tool of Arduino Software where we can observe
serial communication through a Laptop.

 Serial.begin()

This is the keyword by using which the serial communication initializes.


It is written for the communication of data from the laptop to Arduino. It
is also used if some Tx and RX modules are used. It is used when serial
communication is used.

Syntax: serial. begin()

Figure 3.37 Serial. begin

 Serial.read()

This command is used to read the Serial Communication Send by the


serial.begin() function.

Syntax: serial. read()

Figure 3.38 Serial. read

Page 37 of 68
 serial.available()

It is used to put the condition to reduce the

garbage value. Syntax: serial. available()

Core Libraries used to implement this project include Open CV python


library, numpy, Google text to speech (GTTS) python library, play
sound library to play sound on speaker, face_recognition library for
comparing faces in the captured images, keyboard library to automate
keystrokes and whatsit to us WhatsApp python support library to send
messages with text and image to the homeowner.

Figure 3.39 Import the modules in python code


Common variables that have been declared include the “Unknown Text”
variable which is declared to address the response of Unknown people.
“my Text” variable is declared to address the text used.

Figure 3.40 Import common variable


On Detection of an Object by the PIR Sensor, we get this detected value
as a “true” value from Arduino to python, and on getting this true value
of the “Movement” variable face detection function starts to run. which
first of all opens the camera and on opening the camera it starts to
capture live video using cv2.VideoCapture(0) function of the Open CV-
Library. Read Live Video stream is captured in the form of continuous
Page 38 of 68
series of frames of images this image is to be analyzed by the
Harchascade algorithm but before analysis of finding We'll begin by
making our image black and white because we don't require color data to
detect faces. Then we'll examine each pixel in our image one by one. We
want to look at the pixels that are directly surrounding each pixel. Our
goal is to determine how dark the current pixel is in comparison to the
pixels immediately surrounding it. Then we'll create an arrow to
demonstrate which direction the image is becoming darker. This
produces a HOG image.
Example image of HOG image generation:

Figure 3.41 (Image of an Eye in black and white mode before HOG
generation)

Figure 3.42 (Image of an Eye in black and white mode after HOG

Page 39 of 68
generation)

All we have to do to locate faces in this HOG image is find the area of our
image that appears most similar to a known HOG pattern generated from a
number of other training faces. On Detection of faces in the image, a
matrix value is returned of the format [X, Y, L, B] where X & Y is the
coordinate of the point on the image at which an image is detected and the
L and B value is the length and breadth of the rectangle which is drawn on
the detected face in the captured image. If no face is detected by the
HarCascade Algorithm then it returns an empty curly-braces bracket that is
the “()” value. On getting an empty curly-braces bracket that is “()” we
print on the console saying “ NO face is detected please try again…..”. At
multiple places in the code, we have used the sleep function in the time
library of python to give enough time for various functions to process and
to prevent a loop from stopping due to errors caused by functions taking a
time too long to return value and to use same memory space effectively.

Page 40 of 68
Figure 3.43 coding on face recognition module

Page 41 of 68
Figure 3.44 coding on face recognition module conditions

The face-detection function on finding faces in the image clicks the


image and saves it and then calls the face-recognition function which
passes two parameters where the first image is the saved current image
and the second image is the homeowner's image. The number of people
will not be much hence requirement for comparison of each homeowner
is low. If there is more than 1 person who stays at home then we can
create a dictionary with a list of images. A dictionary can be
implemented in the future where we can train the Modal to learn the
names of newly recognized people by taking input via chat. This will
help in the labeling of images to improve the user experience of the
homeowners giving the name of the exact person visiting the door

Page 42 of 68
Figure 3.45 coding on similar face recognition

Page 43 of 68
After a comparison of both faces previously stored face images of the
homeowner and currently captured images of the home visitor. If the
Similarface variable returns ‘true’ then we can say that it is a known
person which means the homeowner is visiting the home. We can even
identify multiple new faces with names in the future by maintaining a
dictionary of images with labeled names. Currently, we are restricting it
to the single homeowner. On getting the “False” value of “Similarface”
we know that it is an Unknown person at the door. We can alert the user
via speaker alert as well as what’s app message.

Figure 3.46 Coding on speaker alert

On getting the “true” value of the “Similarface” variable we get the

result after the comparison of images. If the Similarface variable


returns ‘true’ then we can speak out the name of the person to improve
the experience and we can use “sendWhatsAppMsg” function to send
messages to the home Owners number.
Figure 3.47 Coding on sending Whatsapp messages

The pyserial library has been used to connect Arduino UNO with Python
Program

Figure 3.48 Coding on serial communication

Page 44 of 68
3.6 TESTING PROCESS

In this project, if any movement is found in the PIR sensor then the
camera module gets activated, and all the face and object detection
process goes on. If there is no face in the camera then the result shows
false, and also if there is any face in the camera then it moves toward the
next step i.e face recognition. after the recognition of the face, it sends
an alert message to Whatsapp and also an alert via speakers. all the
images that are captured during the testing process are given below.

Figure 3.49 working of the integrated code for sending messages

Page 45 of 68
Figure 3.50 Whatsapp message to the owner

3.7 CODE

 Arduino code

Page 46 of 68
 Python code

Page 47 of 68
Page 48 of 68
Page 49 of 68
Page 50 of 68
Page 51 of 68
CHAPTER 4

CONCLUSION AND FUTURE SCOPE

4.1CONCLUSION

In conclusion, the documentation for the project on home security and


alert system provides a comprehensive overview of the system's design,
implementation, and functionality. Throughout the project, our primary
objective was to develop a robust and reliable system that enhances the
safety and security of homes.
The documentation begins with an introduction that outlines the purpose
and goals of the project. It highlights the increasing importance of home
security in today's world and the need for advanced systems to protect
our homes and loved ones.
We then delve into the system's architecture, discussing the various
components and their interactions. The home security and alert system
consist of multiple layers, including sensors, a central processing unit,
communication modules, and user interfaces. Each component plays a
crucial role in ensuring the effectiveness and efficiency of the system.
Next, we provide a detailed description of the sensors employed in the
system. These sensors include motion detectors and our laptop camera
for the demonstration of surveillance camera. We discuss their
placement, functionality, and integration with the central processing unit.
Then, all the data is processed and we get the result by distinguishing
between known and unknown persons while using this feature.
In conclusion, the documentation of the home security and alert system
project serves as a comprehensive guide for understanding the system's
design, implementation, and functionality. It offers valuable insights into
the various components, their interactions, and the overall architecture.
With this documentation, users can gain a deeper understanding of the
system and leverage its features to enhance the security of their homes.

Page 52 of 68
4.2 FUTURE SCOPE

In future we can modify this system by implementing it on real time as


we can change the arduino micro controller with raspberry pi and the
laptop cameras to the IP cameras which can be helpful in the real time
monitoring by using the open CV module of python and implementing it
on the system.
For this we have to first set up the raspberry pi. For this first of all we
have to collect a raspberry pi kit of version 3B of latest edition as it has
the SSH feature enabled.
We require a SD card for the storage function in raspberry pi.
Then, we can go to the raspberry pi official website i.e.
https://www.raspberrypi.com/software/ to install raspberry pi os and then
we go to
the software section then choose the imager that we require to download
for the next processes. Then we download the zip file and then we extract
the zip file and move this imager to the sd card using the os installed.

Fig 4.1 Download raspberrian OS

Page 53 of 68
Fig 4.2 show download options

Fig 4.3 download raspberry pi os with desktop and extract it

Fig 4.4 Open the imager


Page 54 of 68
Fig 4.4 Choose the OS, choose the SD card, enable SSH and click write

After doing all this remove the SD card and plug it to the raspberry pi
and then connect the raspberry pi to the power supply.

Then configure the raspberry pi and connect it to the IP camera through


RJ 45 Ethernet cable. After all that setup do the following in order to get
the data from the IP camera.

Page 55 of 68
Page 56 of 68
Page 57 of 68
N.B:- Here the IP camera should be isolated syatem or a system
which can take the data from routers, where the raspberry pi will act
as a DVR (Digital Video Recorder), as thje DVR of a particular
company or system will not give the permission to the raspberry pi to
take its data and process.

After all this install the VS code in raspberry pi windows and run the
same code for face recognition by only removing the serial
communication.

Page 58 of 68
CHAPTER 5

REFERENCES

[1]Vattheuer, C., Liu, C., Abedi, A., & Abari, O. (2023). Are Home Security
Systems Reliable?. arXiv preprint arXiv:2301.07202.

[2] Reza, M. S. (2023). Low-Cost Approach Plan and Development of GSM-


Based Smart Home Automation System. International Journal of Research
in Science & Engineering (IJRISE) ISSN: 2394-8299, 3(1), 1-8.

[3] Kavitha, S., Anand, K. G., Poornima, T., & Girija, H. S. (2023). IoT-
Centered Household Security and Person's Healthcare System
Predominantly Aimed at Epidemic Circumstances. In Internet of Things
and Data Mining for Modern Engineering and Healthcare
Applications (pp. 65-88). Chapman and Hall/CRC.

[4] Rambabu, K., Chinnaiah, M. C., Dubey, S., & Yellanki, S. (2023,
January). Remote Accessible Security System with IoT Using LabVIEW.
In Proceedings of the International Conference on Cognitive and
Intelligent Computing: ICCIC 2021, Volume 2 (pp. 385-393). Singapore:
Springer Nature Singapore.

[5] Qasim, H. H., Jasim, A. M., & Hashim, K. A. (2023). Real-time


monitoring system based on integration of internet of things and global
system of mobile using Raspberry Pi. Bulletin of Electrical Engineering
and Informatics, 12(3), 1418-1426.

[6] Dhanamjayulu, C., Suraj, G. V., Nikhil, M., Kaluri, R., & Koppu, S. (2023,
January). A Machine Learning Algorithm-Based IoT-Based Message Alert
System for Predicting Coronary Heart Disease. In Advancements in Smart
Page 59 of 68
Computing and Information Security: First International Conference,
ASCIS 2022, Rajkot, India, November 24–26, 2022, Revised Selected
Papers, Part I (pp. 362-376). Cham: Springer Nature Switzerland.

[7] BALAKRISHNA, B., ASMA, M., RAJU, K., SUSRUTHA, S., &
ANEESH, S. AUTOMATIC INTRUDER SPOTTER (AIS).

[8] Puvaneswari, G., Ramya, M., Kalaivani, R., & Ganesh, S. B. (2023,
February). Smart Home Security System Using Facial Recognition.
In Proceedings of Third International Conference on Sustainable Expert
Systems: ICSES 2022 (pp. 239-252). Singapore: Springer Nature
Singapore.

[9] Aldahmani, A., Ouni, B., Lestable, T., & Debbah, M. (2023). Cyber-
security of embedded IoTs in smart homes: challenges, requirements,
countermeasures, and trends. IEEE Open Journal of Vehicular
Technology.

[10] Yudidharma, A., Nathaniel, N., Gimli, T. N., Achmad, S., & Kurniawan,
A. (2023). A systematic literature review: Messaging protocols and
electronic platforms used in the internet of things for the purpose of
building smart homes. Procedia Computer Science, 216, 194-203.

[11] Bhardwaj, A., Kaushik, K., Alshehri, M., Mohamed, A. A. B., & Keshta, I.
(2023). ISF: Security Analysis and Assessment of Smart Home IoT-based
Firmware. ACM Transactions on Sensor Networks.

[12] Li, J., Sun, K., Huff, B. S., Bierley, A. M., Kim, Y., Schaub, F., & Fawaz,
K. (2023, January). “It’s up to the Consumer to be Smart”: Understanding
the Security and Privacy Attitudes of Smart Home Users on Reddit.
In IEEE Symp. on Security and Privacy (SP)(SP) (pp. 380-396).

[13] Shi, Q., Yang, Y., Sun, Z., & Lee, C. (2022). Progress of advanced
devices and internet of things systems as enabling technologies for smart
homes and health care. ACS Materials Au, 2(4), 394-435.

Page 60 of 68
[14] Hussain, S., Alabrah, A., Ullah, S. S., Khattak, H., Alfakih, T. M., &
Ullah, I. (2022). An Efficient Online/Offline Signcryption Scheme for
Internet of Things in Smart Home. Wireless Communications and Mobile
Computing, 2022.

[15] Tao, J., Wu, H., Deng, S., & Qi, Z. (2022). Overview of intelligent home
security and early warning system based on internet of things
technology. International Core Journal of Engineering, 8(5), 727-732.

[16] Hermanu, C., Maghfiroh, H., Santoso, H. P., Arifin, Z., & Harsito, C.
(2022). Dual mode system of smart home based on internet of
things. Journal of Robotics and Control (JRC), 3(1), 26-31.

[17] Kim, M., & Choi, B. R. (2022). The impact of privacy control on users'
intention to use smart home internet of things (IoT) services. Asia
Marketing Journal, 24(1), 4.

[18] Baytamouny, M., Kolandaisamy, R., & ALDharhani, G. S. (2022, April).


AI-based Home Security System with Face Recognition. In 2022 6th
International Conference on Trends in Electronics and Informatics
(ICOEI) (pp. 1038-1042). IEEE.

[19] Chakraborty, P., & Sultana, S. (2022). IoT-based smart home security and
automation system. In Micro-Electronics and Telecommunication
Engineering: Proceedings of 5th ICMETE 2021 (pp. 497-505). Singapore:
Springer Nature Singapore.

[20] Bagchi, T., Mahapatra, A., Yadav, D., Mishra, D., Pandey, A.,
Chandrasekhar, P., & Kumar, A. (2022). Intelligent security system based
on face recognition and IoT. Materials Today: Proceedings, 62, 2133-
2137.

[21] Nader, S. I., Das, A., Al Mamun, A., Nath, P. D., & Chowdhury, G. M.
(2022, January). Cost-efficient smart home automation and security system
based on IoT and GSM. In 2022 International Conference for

Page 61 of 68
Advancement in Technology (ICONAT) (pp. 1-5). IEEE.

[22] Hammi, B., Zeadally, S., Khatoun, R., & Nebhen, J. (2022). Survey on
smart homes: vulnerabilities, risks, and countermeasures. Computers &
Security, 117, 102677.

[23] Lara, B., Kottler, J., Olsen, A., Best, A., Conkright, J., & Larimer, K.
(2022). Home monitoring programs for patients testing positive for SARS-
CoV-2: an integrative literature review. Applied Clinical
Informatics, 13(01), 203-217.

[24] Anderson, L. O., Burton, C., dos Reis, J. B., Pessôa, A. C. M., Bett, P.,
Carvalho, N. S., ... & Wiltshire, A. J. (2022). An alert system for seasonal
fire probability forecast for South American protected areas. Climate
Resilience and Sustainability, 1(1), e19.

[25] Mosemann, F. (2022). Assessing Security Risks with the Internet of


Things.

[26] Li, S., Qin, D., Wu, X., Li, J., Li, B., & Han, W. (2022). False alert
detection based on deep learning and machine learning. International
Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-21.

[27] Khan, A. R., Kashif, M., Jhaveri, R. H., Raut, R., Saba, T., & Bahaj, S. A.
(2022). Deep learning for intrusion detection and security of Internet of
things (IoT): current analysis, challenges, and possible solutions. Security
and Communication Networks, 2022.

[28] Jenal, M., Omar, A. N., Hisham, M. A. A., Noh, W. N. W. M., & Razali,
Z. A. I. (2022). Smart Home Controlling System. Journal of Electronic
Voltage and Application, 3(1), 92-104.

[29] Amraoui, N., & Zouari, B. (2022). Securing the operation of Smart Home
Systems: A literature review. Journal of Reliable Intelligent
Environments, 8(1), 67-74.

Page 62 of 68
[30] Hoque, M. A., & Davidson, C. (2019). Design and implementation of an
IoT-based smart home security system. Int. J. Networked Distributed
Comput., 7(2), 85-92.

[31] Abdulla, A. I., Abdulraheem, A. S., Salih, A. A., Sadeeq, M. A., Ahmed,
A. J., Ferzor, B. M., ... & Mohammed, S. I. (2020). Internet of things and
smart home security. Technol. Rep. Kansai Univ, 62(5), 2465-2476.

[32] Ray, A. K., & Bagwari, A. (2020, April). IoT based Smart home: Security
Aspects and security architecture. In 2020 IEEE 9th international
conference on communication systems and network technologies
(CSNT) (pp. 218-222). IEEE.

[33] Touqeer, H., Zaman, S., Amin, R., Hussain, M., Al-Turjman, F., & Bilal,
M. (2021). Smart home security: challenges, issues and solutions at
different IoT layers. The Journal of Supercomputing, 77(12), 14053-
14089.

[34] Taiwo, O., & Ezugwu, A. E. (2021). Internet of things-based intelligent


smart home control system. Security and Communication Networks, 2021,
1-17.

[35] Gladence, L. M., Anu, V. M., Rathna, R., & Brumancia, E. (2020).
Recommender system for home automation using IoT and artificial
intelligence. Journal of Ambient Intelligence and Humanized Computing,
1-9.

[36] Yedulapuram, S., Arabelli, R., Mahender, K., & Sidhardha, C. (2020,
December). Automatic Door Lock System by Face Recognition. In IOP
Conference Series: Materials Science and Engineering (Vol. 981, No. 3, p.
032036). IOP Publishing.

[37] Shah, S. K. A., & Mahmood, W. (2020). Smart home automation using
IOT and its low cost implementation. International Journal of Engineering
and Manufacturing (IJEM), 10(5), 28-36.

Page 63 of 68
[38] Mubeen, S., & Shiva, N. S. (2022). REAL TIME MONITORING OF
INDUSTRIAL MACHINES USING IOT WITH SMS ALERT
SYSTEM. Journal of Optoelectronics Laser, 41(10), 208-220.

[39] Abdulraheem, A. S., Salih, A. A., Abdulla, A. I., Sadeeq, M. A., Salim, N.
O., Abdullah, H., ... & Saeed, R. A. (2020). Home automation system
based on IoT. Technology Reports of Kansai University, 62(5), 2453-64.

[40] Anwar, S., & Kishore, D. (2016). IOT based smart home security system
with alert and door access control using smart phone. International Journal
of Engineering Research & Technology (IJERT), 5(12), 504-509.

[41] Dimitrov, K., Shterev, V., & Valkovski, T. (2020, September). Low-cost
system for recognizing people through infrared arrays in smart home
systems. In 2020 XXIX International Scientific Conference Electronics
(ET) (pp. 1-4). IEEE.

[42] Gazis, A., & Katsiri, E. (2021). Smart home IoT sensors: principles and
applications-a review of low-cost and low-power solutions. International
Journal on Engineering Technologies and Informatics, 2(1), 19-23.

[43] Stojkoska, B. L. R., & Trivodaliev, K. V. (2017). A review of Internet of


Things for smart home: Challenges and solutions. Journal of cleaner
production, 140, 1454-1464.

[44] Mustafa, B., Iqbal, M. W., Saeed, M., Shafqat, A. R., Sajjad, H., & Naqvi,
M. R. (2021, June). IOT based low-cost smart home automation system.
In 2021 3rd International Congress on Human-Computer Interaction,
Optimization and Robotic Applications (HORA) (pp. 1-6). IEEE.

[45] Adiono, T., Tandiawan, B., Fuada, S., Muttaqin, R., Fathany, M. Y.,
Adijarto, W., & Harimurti, S. (2017, November). Prototyping design of IR
remote controller for smart home applications. In TENCON 2017-2017
IEEE Region 10 Conference (pp. 1304-1308). IEEE.

Page 64 of 68
CHAPTER 6

APPENDICES

6.1 DETAILS OF SOFTWARE USED

6.1.1 Visual Studio Code:

Visual Studio Code used as IDE.


Visual Studio Code is a freeware source-code editor made by Microsoft for
Windows, Linux and macOS. Features include support for debugging, syntax
highlighting, intelligent code completion, snippets, code refactoring, and embedded
Git. Users can change the theme, keyboard shortcuts, preferences, and install
extensions that add additional functionality.

Page 65 of 68
Figure 6.1 VS code interface

6.1.2 Arduino

It is also used as an IDE.


It runs over arduino kits and it has its own platform where it can read the sensors
and instruct the sensors by there codes which are connecte to the arduino micro
controllers. It is desined by its parent company i.e Arduino and can be accessed by
windows, mac and linux OS.we can go to its official site to install it.

fig 6.2 Arduino interface

6.2 STEPS TO EXECUTE/RUN/IMPLEMENT

6.2.1 PIR sensor connection


Step-1
Get the Arduino UNO kit.
Step-2
Get PIR sensor.
Step-3
Using male to female jumper wires connect the GND PIN and the Vcc pin of PIR
sensor to the GND pin and 5v power supplyof Arduino UNO respectively.
Page 66 of 68
Step-4
Connect the input pin of PIR sensor to A0 pin of Arduino

6.2.2 Activate the PIR sensor

Step-1
Connect the Arduino to laptop which has already the Arduino IDE installed with the
connecting cable.

Step-2
Write the Arduino code given on page no. 43 and 44.
Step -3
Choose the Communication port as COM(1/2/3/4/5/..) and Arduino UNO.
Step-4
Verify the code and then run it.
Step 5
Go to the serial monitor to get the readings from the PIR sensor.
Step-6
Close the Arduino IDE.

6.2.3 Final execution of the project

Step-1
Open VS Code.
Step-2
Install Python extension from the extension tab.
Step-3
After installation of the extension create a new file and name the sub file.
Step-4
In that paste the Python code given from page no. 44 to 48
Step-5
Run the code for results.

Page 67 of 68
After doing all these if any movement is detected then the result will be shown
accordimg to 3.6 the testing process this will show the result as follows
Step-1
It will run the code in the terminal of VS code.
Step 2
If any movement detected ,the camera module gets activated

Step-3
Object detection occurs
Step-4
If person detected then face recognition proceeds otherwise process exits. Clearly
shown in figure no 3.49
Step-5
If a known person is detected then the name of the person can be heard from the voice
speaker and the image captured is sent to the owner`s Whatsapp with his name.
If an unknown person is detected the the voice speaker will alert as unknown person
detected at the door and the image captured will be sent to the owner`s Whatsapp with
the message that unknown person was detected, as per the figure no 3.50.

Page 68 of 68

You might also like