SlideShare a Scribd company logo
1 of 8
Download to read offline
TELKOMNIKA, Vol.15, No.4, December 2017, pp. 1651~1658
ISSN: 1693-6930, accredited A by DIKTI, Decree No: 58/DIKTI/Kep/2013
DOI: 10.12928/TELKOMNIKA.v15i4.6532  1651
Received May 24, 2017; Revised August 30, 2017; Accepted December 6, 2017
Intelligent Image Capturing Alarm System Using Raspberry Pi
K.A.M Annuar*
1
, N.A. Ab Hadi
2
, S.K. Subramaniam
3
, M. F. M. Ab Halim
4
, M.B.N. Shah
5
,
A.F. Kadmin
6
, M.S. Amri
7
, A. Abdul Salam
8
1-7
Faculty of Engineering Technology, Universiti Teknikal Malaysia Melaka,
Hang Tuah Jaya, 76100 Durian Tunggal, Melaka, Malaysia
8
Universiti Kuala Lumpur-British Malaysian Institute, Selangor Malaysia
*Corresponding author, e-mail: khalilazha@utem.edu.my
Abstract
Home surveillance system assumes an essential part in this present day living style to help
recognizing illegal activities. In this proposed paper, an intelligent image capturing alarm system to protect
locker was developed. Raspberry Pi 2 is used as the main controller (server). At the point when any
conceivable intrusion is identified, a webcam installed to Raspberry Pi 2 will capture the picture of the
intruder. In the meantime, the spotlight or light of the house which represented by an LED will be turned
"ON" alongside an alarm sound from a buzzer which is fixed as an output. Taking everything into account,
this improvement offers reasonable and easy to use surveillance alarm system.
Keywords: image capturing, locker, raspberry pi, PIR Sensor
Copyright © 2017 Universitas Ahmad Dahlan. All rights reserved.
1. Introduction
In present days, the system of home security turns into an indispensable issue with the
expanding cases of home breaking or thievery cases. Moreover, the system of home
surveillance is essential since the house owner wants to screen their home's circumstances by
identifying any undesirable and illegal activity [1]. Years ago, the traditional home surveillance
systems have obtained much demand. As time passes, the technology of traditional home
surveillance systems has evolved and offers many exciting benefits to the user. These
improvements have conquered the weakness of traditional security systems such as power loss
caused by the turning on and turning off the process [2].
Home surveillance security system is a smart method for controlling and observing at
home by utilizing information technology. Thus, this security system additionally gives a helpful,
adaptable and secured environment that improves life quality. Hence, the internet services have
become more familiar with these devices and services which are being used to control the
recent home surveillance security system.
Recently, the necessity of home surveillance security system is turning out to be
extremely important and it is oftentimes utilized in the house or residence [3], business firms [4-
6], robotics [7-9] and also for traffic monitoring systems [10]. The purpose of home surveillance
security system is essentially used to screen the activities, behavior or other changes in
information in order to manage or protect personal belongings. These days, this surveillance
system is being installed at home to monitor and avoid any unwanted activities to occur. Thus,
the owner can quickly take necessary actions in case of any aggravations [11].
As house break-in cases increasingly rapidly, there is multiple intelligent home security
system that is being developed with many necessary features [12]. One of the fundamental
reasons that bring about the increase in the rate of this case is the failure in intruder
confirmations [13]. In fact, these failures lead to prolonged crimes. A smart alarm system is
developed in this paper to be installed in the locker to overcome the intruder confirmation
issues. The development works in a way that when an object’s movement or action passes
through infrared radiation and blocks it.
Therefore, the movement will be automatically detected by the motion detector thus the
image of the moving object will be captured using the camera module installed. As a result, the
snapped picture will be sent to the user or the house owner via email as an attachment. In
 ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 4, December 2017 : 1651 – 1658
1652
respect to that, the proposed development will manage to capture an image upon detecting
intruder’s motion. Furthermore, a quick move to make a report to the authorized party with the
intruder’s image as an evidence can be made.
Besides that, an increase in locker break-in cases can occur due to the owner and the
authorized party’s late action or movement. Owner’s lack of awareness of the unwanted
incidents may cause this incident to occur often. Therefore, the system is developed to produce
an alarm sound to alert surround people. Not only that, a notification will be sent via email to
notify the owner that an intrusion had occurred in the house.
This paper introduces a new technique by using Linux system software development
with a USB camera (UVC compatible) attached together to it [14]. The locker security system
proposes a proper system that is convenient for the user to access. Besides that, some theft
happens over and over due to lack of evidence. Hereby, the proposed project will give us
enough evidence on the thief and makes it easier to make a report to the authorized party.
In this era of technology, exploration towards a product that costs reasonable price and
capable of solving ideas is increasing. A small embedded microcontroller with a flexible platform
utilization of the hardware projects is known as the Raspberry Pi. The Raspberry Pi 2 crosses
off both criteria [15]. Raspberry Pi is a card-sized minicomputer that can either operate on mains
or battery power. It has Linux as its operating system.
2. Research Method
This section will discuss on the development using a Raspberry Pi 2 based real-time
image capturing alarm system. The intruder will be detected using passive infrared (PIR)
sensor's infrared (IR) radiation. The changes in radiation field are checked by the sensor. At the
point when an intrusion happens, the presence of an intruder will be detected by the developed
system and an image of an intruder will be captured simultaneously. From there on, an email
will be sent to the user with the captured image as an attachment.
Meanwhile, an LED will be turned on simultaneously in this developed system. The LED
will be a replacement for house lamp due to the high cost of the lamp. Not only that, this system
will also trigger an alarm sound to alert the house owner or surround people using a buzzer.
Figure 1 demonstrates the design system block diagram
Figure 1. Block diagram of the project
The designed system generally consists of an Raspberry Pi 2, a PIR sensor, a camera
module (Logitech C270 webcam), an LED, and a buzzer. Here, the PIR sensor is set as the
input while the outputs are camera module, LED, and buzzer. This system works by reading the
input from the passive infrared radiation (PIR) sensor continuously. Normally the output of the
sensor will be low.
In case, if any changes in infrared radiation detected, the output will turn on high. Once
the output of passive infrared radiation (PIR) sensor turns high, it will automatically trigger the
camera module to capture an image as it is set. In the meantime, an LED will be turned on. This
LED will indicate that intrusion is happening and will alert surround people. Not only that, a
buzzer was installed in the output that will trigger alarm sound when an intrusion occurs.
TELKOMNIKA ISSN: 1693-6930 
Intelligent Image Capturing Alarm System Using Raspberry Pi (K.A.M Annuar)
1653
After that, an email will be generated with the snapped picture as an attachment to the
user's email address. In order to install and configure the email in Raspberry Pi 2, the system
will require SMTP library [16]. SMTP is defined as Simple Mail Transfer Protocol. Raspberry Pi
2 will be connected to the internet and acts as a server to this system. The Raspberry Pi 2 as
the main microcontroller will control the input and then the output of the system.
As a conclusion, the system will assist the house owner to make a report to authorized
party with the intruder’s image as an evidence. Since notification via email is included, a
configuration is made to the Raspberry Pi 2 to install the SMTP library. The software and
hardware components developed are integrated together. Finally, the analysis and verification
are conducted to the system performance.
3. Results and Discussion
In this section, the overall system of intelligent image capturing alarm system to protect
locker using Raspberry Pi will be tested and simulated. The outcome of the research will be
discussed. Each element focused to be accomplished by this project is verified here. The steps
to test every one of those components will be clarified in this part also.
3.1. Intelligent Image Capturing Alarm System to Protect Locker Using Raspberry Pi
Hardware and Software Results
Figure 2 shows the intelligent image capturing alarm system to protect locker using
Raspberry Pi setup. The Raspberry Pi is powered by a 5V micro USB supplied from a laptop. A
TP-Link WiFi dongle is inserted into the USB port to connect the Raspberry Pi to the internet.
The PIR sensor which acts as the input is connected to the GPIO 4 of the Raspberry Pi. Thus,
the buzzer is connected to the GPIO 18 of the Raspberry Pi. Furthermore, the LED is connected
to the GPIO24.
(a) Front view (b) Top view
Figure 2. Hardware of the intelligent image capturing alarm system setup
At the point when each of the hardware consists of the PIR sensor, WiFi dongle, C270
webcam, LED and buzzer have been installed to the Raspberry Pi and the webcam successfully
activated, the entire system program will be run. After that, the whole system will be tested
accordingly.
The result demonstrates that the system can perform the operation as desired. At the
point a movement or changes in infrared radiation detected, the sensor will be activated. PIR
motion sensor will give output HIGH, 1 if motion detected and output LOW, 0 if no movement is
detected. The HIGH, 1 output of the sensor will trigger the webcam to capture the picture, turn
"ON" the LED and turn “ON” the buzzer respectively. Next, the system will send an email to user
to notify the possible intrusion. Not only that, the captured image will be attached to the email as
attachment and it will enable the user to identify the intruder. Lastly, when the email was
effectively sent, the LED will turn "OFF" and the buzzer will turn “OFF” [13-14].
Figure 3 shows the results interface in Putty terminal. The GPIO 4 shows 1 when
motion was detected. After that, the webcam will capture the image of the intruder and send to
 ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 4, December 2017 : 1651 – 1658
1654
user’s email. The GPIO 4 resets to 0 once the email was successfully sent. Figure 4 and 5 show
email notification with image capture. The different with Aiman et al., this system can capture
the intruder image in front [17].
Figure 3. Result of the system
Figure 4. Email notification
Figure 5. Email content
3.2. Analysis on WiFi Dongle bandwidth
In order to study the range that the WiFi dongle would be able to detect without lose the
connectivity between the Raspberry Pi and the router. The analysis was performed by a test
using the Raspberry Pi with a WiFi dongle. For this analysis, the Raspberry Pi was connected to
the laptop via WiFi dongle and the software Iperf was used to measure the bandwidth. Figure 6
TELKOMNIKA ISSN: 1693-6930 
Intelligent Image Capturing Alarm System Using Raspberry Pi (K.A.M Annuar)
1655
shows the strength of bandwidth detected by Wifi dongle against the distance of the WiFi dongle
from Internet router in metres.
Figure 6. Bandwidth reading
From this analysis, it is proven that the dongle could be used up to a distance of 70m
without losing connection and at distance around 70m keeping bandwidth superior to 2.2 Mbps
which was the sufficient bandwidth usage of the system.
3.3. Analysis the effect of the internal walls to the wireless signal
The total time taken for the system to send an email alert to the user with the presence
of internal walls was recorded. The respective cycle starts from the moment motion is being
detected by the PIR sensor until an email notification is sent to the user. A total of 10 tests is
made under a stable and fixed internet connectivity at a fixed distance of 6m. Figure 7 shows
the data collected from the analysis carried out.
Figure 7. Time taken for complete cycle during 10 tests (internal walls)
The average time taken is calculated as:
Average time taken(s) =
(14.97 + 14.25 + 15.58 + 14.15 + 15.42 + 13.53 +
14.32 + 15.35 + 14.37 + 14.77)
10
= 14.67 𝑠𝑒𝑐𝑜𝑛𝑑𝑠
19.7 18.9
17.1
15.4
11.7
6.6
2.28 2.2
0 0 0
0
2
4
6
8
10
12
14
16
18
20
0 10 20 30 40 50 60 70 80 90 100
Mbit/s
Distance(metre)
Bandwidth
14.97 14.25
15.58
14.15
15.42
13.53 14.32
15.35
14.37 14.77
0
4
8
12
16
20
Test 1 Test 2 Test 3 Test 4 Test 5 Test 6 Test 7 Test 8 Test 9 Test 10
Timetaken(s)
Number of test
Time taken for system to complete a
cycle (internal walls)
 ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 4, December 2017 : 1651 – 1658
1656
The average time taken for the system to detect a motion and send an email to the user
with the existence of internal walls is approximately 14.67s. Despite the fact that the Wi-Fi data
transmission uses digital signal, the real signal uses analogue radio waves. This analogue radio
waves are highly sensitive to interference just in the same way as the radio in the car. For
example, when a car is being driven through an underground tunnel, the signal will be weaker.
As a result, the driver will either hear a noise or complete dropout of the radio channel. Thus.
The same impact occurs to the Wi-Fi signal.
Figure 8 shows three different laptops which are placed in three different rooms in a
house. Based on the Figure 9 above, it shows that the full signal strength is gained by the laptop
placed directly above the internet router. This is because it is the closest to the router which acts
as signal generator and scientifically proven that the wireless signal are capable of penetrating a
ceiling without any.
Figure 8. Router connected to three laptops in the living room
As the laptop in the loft are further away, it may receive a slightly weaker signal and the
user may experience some performance issues. Apart from that, the third laptop which is placed
in the kitchen experiences the weakest. Although it is near to the router. This is due to the
blocked signal by load bearing wall.
In fact, there are several layer behind this walls which are mainly from substantial
material. For example, the wall constructed by using bricks, concretes and stones. This factor
plays a huge role in signal between the router and Wi-Fi device. Slowness and intermittent
connections are also the impact of the factor.
3.4. Analysis on the wireless signal when testing in an open space
This analysis was made in a circumstances where the WiFi dongle was connected to
the router at a distance of 6 m. There was no walls or any sort of block in between this devices.
Figure 9 show data taken for complete cycle during ten tests.
Figure 9. Time taken for complete cycle during 10 tests (open space)
TELKOMNIKA ISSN: 1693-6930 
Intelligent Image Capturing Alarm System Using Raspberry Pi (K.A.M Annuar)
1657
The average time taken is calculated as:
𝐴𝑣𝑒𝑟𝑎𝑔𝑒 𝑡𝑖𝑚𝑒 𝑡𝑎𝑘𝑒𝑛(𝑠) =
(11.96 + 13.4 + 12.95 + 12.7 + 13.65 + 12.73 +
12.65 + 12.93 + 11.65 + 12.45)
10
= 12.73 𝑠𝑒𝑐𝑜𝑛𝑑𝑠
The average time taken for the system to detect a motion and send an email to the user
within an open space is approximately 12.73s. In comparison to analysis in part 3.3, there is a
slight difference in timing for the system to complete a full cycle. The total cycle meant here is
the time taken for the system to detect a motion via PIR motion sensor, trigger an alarm via
buzzer sound. Turn ON LED which represent the house lamp, capture image of the intruder
through Logitech C270 webcam and lastly send an email notification with picture of the intruder
as an attachment. The whole process took about 14.67s for analysis with internal walls and
12.73s for the analysis within an open space.
As a conclusion, at both the situations the system will be able to send the email to the
user successfully. However, in an open space without any internal walls blocking the wireless
signal the system sends the email notifications a little faster in an average time difference of
1.94s.
3.5. Analysis on the performance of the PIR sensor with distance
The PIR motion sensor analysis was based on motion detection performance validation.
The trials were conducted for motion detection at various ranges starting from within 1 m to 7 m
range in distance. This process was done during trials in which 10 instances of movement was
recorded each for less 1 m, 3 m, 5 m and 7 m ranges respectively.
Besides, the probability of detection (Pd) based on these 10 iterations was calculated
for each range. In every one of the trials, the sensitivity potentiometer of the PIR sensor was set
for maximum value, 7m range.
From the analysis in Figure 10, it was observed that when the distance is up to 3m
range, the probability of detection (Pd) is around 0.9. At 4m range, the Pd is 0.7. However, the
Pd reduces to 0.6 for 5m and 6m range. Furthermore, the probability of detection further
decreases to 0.4 when detection range is at 7m [3].
Figure 10. Performance of the PIR sensor with distance
4. Conclusion
Based on the research works, there are three objectives that have been discuss. The
first objective is to develop system that can reduce the locker break-in cases. It was
successfully develop system that intruders can be caught by image capture. The second
objective is to alert the owner on possible locker intrusion. This objective is achieved when
intrusion triggers an alarm sound to alert the surround people and sends email notification to the
user. Besides that, the objective to develop a notification system for the user via email
notification with the picture as an attachment have been achieved from this project. Hereby, the
user will be able to identify the intruder. As a conclude, an intelligent image capturing alarm
system to protect locker using Raspberry Pi has been effectively created by desired objectives
0
0.2
0.4
0.6
0.8
1
<1m 2m 3m 4m 5m 6m 7m
ProbabilityofDetection(Pd)
Performance of PIR sensor with
Distance
 ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 4, December 2017 : 1651 – 1658
1658
and specifications. Apart from that, this system can be improved to make more advanced and
reliable by using internet of things [18].
Acknowledgment
The authors would like to thanks for the support given to this research by Ministry of
Higher Education Malaysia and Universiti Teknikal Malaysia Melaka (UTeM) for support this
under PJP/2017FTK-CERIA/S01552 project.
References
[1] Duc VN, Hung TL, Anh TP, Truong CT, Jin YL, Kugjin Y. Adaptive Home Surveillance System using
HTTP Streaming. International Joint Conference on Awareness Science and Technology and Ubi-
Media Computing (iCAST-UMEDIA), Journal of Telecommunication, Electronic and Computer
Engineering. 2013: 579-583.
[2] Syarif H, Syahrizal FF. Scheduler and Voice Recognition on Home Automation Control System. 3rd
International Conference on Information and Communication Technology (ICoICT). 2015: 150-155.
[3] WWI Wan Jusoh, KAM Annuar, SH Johari, IM Saadon, MH Harun. Motorcycle Security System using
GSM and RFID. Journal of Advance Research in Applied Mechanics. 2015; 16(1): 1-9.
[4] NAA Hadi, MHC Hasan, NMZ Hashim, NR Mohamad, AS Rahimi, KAM Annuar. Temperature
Monitoring System for Infant Incubator using Arduino. International Journal for Advance Research in
Engineering and Technology. 2015; 3(6): 8-11.
[5] Mohd FMAH, Mohamad HH, Khalil AMA, Suziana A. Monitoring Grid Frequency. ARPN Journal of
Engineering and Applied Science. 2015; 10(18): 8413-8416.
[6] Intan MS, Herlanda W, Emy ZA, Khalil AMA. River Debris Management System using Off-Grid
Photovoltaic Module. MATEC Web of Conference. 2017; 97: 1-8.
[7] MH Zulkefli, KAM Annuar, SH Johari, MRM Sapiee, S Ahmad. Graphical User Interface (GUI)
Controlled Mobile Robot. Journal of Advanced Research in Computing and Applications. 2015; 1(1):
42-49.
[8] Mohamad HH, Mohd SMA, Mohd FMB, Shahrum SA, Khalil AMA. Synchronization of Compass
Module with Pressure and Temperature Sensor System for Autonomous Underwater Vehicle (AUV).
Jurnal Teknologi. 2015; 74(9): 161-167,
[9] Khalil AMA, Muhammad HMZ, Mohamad HH, Mohd FMAH, Arman HA. Design and Development of
Search and Rescue Robot. International Journal of Mechanical & Mechatronics Engineering IJMME-
IJENS. 2016; 16(02): 36-41.
[10] JMM Ferreras, FP Martinez, JC Gallego, AA Lopez, BPD Naranjo, AB del-Campo. Traffic
Surveillance System Based on a High-Resolution Radar. IEEE Transactions on Geoscience and
Remote Sensing. 2008; 46(6).
[11] R Hariprakash, GV Ramu, T Rajakumari, S Ananthi, K Padmanabhan. Some Problem & Methods for
Remotely Controllable Automatic Home Security Systems. The Third International Conference on
Systems and Networks Communications. 2008: 400-403.
[12] Kenny CTH, Chai CT, Tan KL, Yea DC, Alvey HLC, Tan RW. Development of Home Monitoring
System with Integration of Safety and Security Modules. IEEE Conference on Sustainable Utilization
and Development in Engineering and Technology (STUDENT). 2012: 277-282.
[13] M Poorani, V Vaidehi, M Rajesh, Bharghavi, Balamuralidhar, G Chandra. Semantic Intruder
Detection System in WSN. Conference on Advanced Computing. 2010: 26-32.
[14] J Weerachai, P Siam, K Narawith. USB Security Camera Software for Linux. 2nd International
Science, Social-Science, Engineering and Energy Conference. 2010.
[15] Qianqian Y, Guangyao Z, Wenhui Q, Bin Z, PY Chiang. Air-kare: A Wi-Fi based, multi-sensor, real-
time indoor air quality monitor. 2015 IEEE International Wireless Symposium (IWS 2015). 2015: 1-4.
[16] V Tipsuwanporn, A Numsomran, S Samaimak, S Harnnarong. Development of redundant bus library
for arduino to apply in SCADA system. 2014 14th International Conference on Control, Automation
and Systems (ICCAS 2014). Seoul. 2014: 42-46.
[17] Aiman ZJ, Lim MS. Web based home security and automation system. International Journal of
Reconfigurable and Embedded Systems (IJRES). 2016; 5(2): 92-98.
[18] Teddy SG, Intan RHY, Mira K, Nanang I, Nor FZ, Hasmah M, Anis NN. Prototype design of smart
home system using internet of things. Indonesian Journal of Electrical Engineering and Computer
Science. 2017; 7(1): 107-115.

More Related Content

What's hot

IRJET- Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry PiIRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET- Iot Based Home Visitor Monitoring System using Raspberry PiIRJET Journal
 
Home Automation System using Raspberry Pi
Home Automation System using Raspberry PiHome Automation System using Raspberry Pi
Home Automation System using Raspberry PiIRJET Journal
 
Message based home automation & security system
Message based home automation  & security systemMessage based home automation  & security system
Message based home automation & security systemJahid Hassan
 
Communication Methods to build Smart Home Monitoring System: A Survey
Communication Methods to build Smart Home Monitoring System: A SurveyCommunication Methods to build Smart Home Monitoring System: A Survey
Communication Methods to build Smart Home Monitoring System: A Surveydbpublications
 
IRJET- IoT based Noise and Pollution Monitoring System
IRJET- IoT based Noise and Pollution Monitoring SystemIRJET- IoT based Noise and Pollution Monitoring System
IRJET- IoT based Noise and Pollution Monitoring SystemIRJET Journal
 
IRJET- Development of Surveillance System for Indian Military
IRJET- Development of Surveillance System for Indian MilitaryIRJET- Development of Surveillance System for Indian Military
IRJET- Development of Surveillance System for Indian MilitaryIRJET Journal
 
Performance Evaluation of Smart Home System using Internet of Things
Performance Evaluation of Smart Home System using   Internet of Things Performance Evaluation of Smart Home System using   Internet of Things
Performance Evaluation of Smart Home System using Internet of Things IJECEIAES
 
Night vision infrared thermal imaging and ir laser technology
Night vision infrared thermal imaging and ir laser technologyNight vision infrared thermal imaging and ir laser technology
Night vision infrared thermal imaging and ir laser technologyElsa Wang
 
Paper 5 tahun kebelakang 2019 2015 ferdi andersen nugraha 09030581721005
Paper 5 tahun kebelakang 2019 2015 ferdi andersen nugraha 09030581721005Paper 5 tahun kebelakang 2019 2015 ferdi andersen nugraha 09030581721005
Paper 5 tahun kebelakang 2019 2015 ferdi andersen nugraha 09030581721005ferdiandersen08
 
IoT home automation project
IoT home automation projectIoT home automation project
IoT home automation projectShohin Aheleroff
 
Formatted Paper_References added
Formatted Paper_References addedFormatted Paper_References added
Formatted Paper_References addedMark Kurtz
 
Connectivity for Smart Home IoT - Brad Kayton
Connectivity for Smart Home IoT - Brad KaytonConnectivity for Smart Home IoT - Brad Kayton
Connectivity for Smart Home IoT - Brad KaytonWithTheBest
 
Implement via Smart Home blynk
Implement via Smart Home blynk Implement via Smart Home blynk
Implement via Smart Home blynk adminjeet
 
Design & implementation of smart house control using lab view
Design & implementation of smart house control using lab viewDesign & implementation of smart house control using lab view
Design & implementation of smart house control using lab viewKalyan Palwai
 
Home automation using blynk app with fan direction control and displaying sta...
Home automation using blynk app with fan direction control and displaying sta...Home automation using blynk app with fan direction control and displaying sta...
Home automation using blynk app with fan direction control and displaying sta...Diwash Kapil Chettri
 
Home Automation System using Arduino and Android
Home Automation System using Arduino and AndroidHome Automation System using Arduino and Android
Home Automation System using Arduino and AndroidMuhammad Ayesh
 
IOT: Home Automation using Android Application
IOT: Home Automation using Android ApplicationIOT: Home Automation using Android Application
IOT: Home Automation using Android ApplicationNikhil Jadav
 
Presentation Smart Home With Home Automation
Presentation Smart Home With Home AutomationPresentation Smart Home With Home Automation
Presentation Smart Home With Home AutomationArifur Rahman
 

What's hot (20)

IRJET- Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry PiIRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET- Iot Based Home Visitor Monitoring System using Raspberry Pi
 
Home Automation System using Raspberry Pi
Home Automation System using Raspberry PiHome Automation System using Raspberry Pi
Home Automation System using Raspberry Pi
 
Message based home automation & security system
Message based home automation  & security systemMessage based home automation  & security system
Message based home automation & security system
 
Communication Methods to build Smart Home Monitoring System: A Survey
Communication Methods to build Smart Home Monitoring System: A SurveyCommunication Methods to build Smart Home Monitoring System: A Survey
Communication Methods to build Smart Home Monitoring System: A Survey
 
Hn3114461450
Hn3114461450Hn3114461450
Hn3114461450
 
IRJET- IoT based Noise and Pollution Monitoring System
IRJET- IoT based Noise and Pollution Monitoring SystemIRJET- IoT based Noise and Pollution Monitoring System
IRJET- IoT based Noise and Pollution Monitoring System
 
IRJET- Development of Surveillance System for Indian Military
IRJET- Development of Surveillance System for Indian MilitaryIRJET- Development of Surveillance System for Indian Military
IRJET- Development of Surveillance System for Indian Military
 
Performance Evaluation of Smart Home System using Internet of Things
Performance Evaluation of Smart Home System using   Internet of Things Performance Evaluation of Smart Home System using   Internet of Things
Performance Evaluation of Smart Home System using Internet of Things
 
Night vision infrared thermal imaging and ir laser technology
Night vision infrared thermal imaging and ir laser technologyNight vision infrared thermal imaging and ir laser technology
Night vision infrared thermal imaging and ir laser technology
 
Paper 5 tahun kebelakang 2019 2015 ferdi andersen nugraha 09030581721005
Paper 5 tahun kebelakang 2019 2015 ferdi andersen nugraha 09030581721005Paper 5 tahun kebelakang 2019 2015 ferdi andersen nugraha 09030581721005
Paper 5 tahun kebelakang 2019 2015 ferdi andersen nugraha 09030581721005
 
IoT home automation project
IoT home automation projectIoT home automation project
IoT home automation project
 
Formatted Paper_References added
Formatted Paper_References addedFormatted Paper_References added
Formatted Paper_References added
 
Connectivity for Smart Home IoT - Brad Kayton
Connectivity for Smart Home IoT - Brad KaytonConnectivity for Smart Home IoT - Brad Kayton
Connectivity for Smart Home IoT - Brad Kayton
 
Implement via Smart Home blynk
Implement via Smart Home blynk Implement via Smart Home blynk
Implement via Smart Home blynk
 
Design & implementation of smart house control using lab view
Design & implementation of smart house control using lab viewDesign & implementation of smart house control using lab view
Design & implementation of smart house control using lab view
 
Home automation using blynk app with fan direction control and displaying sta...
Home automation using blynk app with fan direction control and displaying sta...Home automation using blynk app with fan direction control and displaying sta...
Home automation using blynk app with fan direction control and displaying sta...
 
Mini Project- Home Automation
Mini Project- Home AutomationMini Project- Home Automation
Mini Project- Home Automation
 
Home Automation System using Arduino and Android
Home Automation System using Arduino and AndroidHome Automation System using Arduino and Android
Home Automation System using Arduino and Android
 
IOT: Home Automation using Android Application
IOT: Home Automation using Android ApplicationIOT: Home Automation using Android Application
IOT: Home Automation using Android Application
 
Presentation Smart Home With Home Automation
Presentation Smart Home With Home AutomationPresentation Smart Home With Home Automation
Presentation Smart Home With Home Automation
 

Similar to Intelligent Image Capturing Alarm System Using Raspberry Pi

Home Security System based on IOT: A Systematic Alert System
Home Security System based on IOT: A Systematic Alert SystemHome Security System based on IOT: A Systematic Alert System
Home Security System based on IOT: A Systematic Alert SystemIRJET Journal
 
Design and Implementation of a Smart Surveillance Security System.pdf
Design and Implementation of a Smart Surveillance Security System.pdfDesign and Implementation of a Smart Surveillance Security System.pdf
Design and Implementation of a Smart Surveillance Security System.pdfssuser793b4e
 
[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...
[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...
[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...PUBLISHERJOURNAL
 
[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...
[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...
[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...PUBLISHERJOURNAL
 
IRJET- An Alert System for Home Security based on Internet of Thing
IRJET- An Alert System for Home Security based on Internet of ThingIRJET- An Alert System for Home Security based on Internet of Thing
IRJET- An Alert System for Home Security based on Internet of ThingIRJET Journal
 
IRJET- IOT based Intrusion Detection and Tracking System
IRJET- IOT based Intrusion Detection and Tracking SystemIRJET- IOT based Intrusion Detection and Tracking System
IRJET- IOT based Intrusion Detection and Tracking SystemIRJET Journal
 
IRJET - Smart Doorbell System
 IRJET - Smart Doorbell System IRJET - Smart Doorbell System
IRJET - Smart Doorbell SystemIRJET Journal
 
IoT Based Smart Surveillance and Automation
IoT Based Smart Surveillance and AutomationIoT Based Smart Surveillance and Automation
IoT Based Smart Surveillance and AutomationIRJET Journal
 
S.W.A.T – Motion Based Intrusion Detection System
S.W.A.T – Motion Based Intrusion Detection SystemS.W.A.T – Motion Based Intrusion Detection System
S.W.A.T – Motion Based Intrusion Detection SystemIRJET Journal
 
Secured Spy for Highly Secured Areas
Secured Spy for Highly Secured AreasSecured Spy for Highly Secured Areas
Secured Spy for Highly Secured AreasIRJET Journal
 
IRJET- An Intelligent Remote Controlled System for Smart Home Automation
IRJET- An Intelligent Remote Controlled System for Smart Home AutomationIRJET- An Intelligent Remote Controlled System for Smart Home Automation
IRJET- An Intelligent Remote Controlled System for Smart Home AutomationIRJET Journal
 
RealNET – Internet of Things in Everyday Life using Raspberry Pi
RealNET – Internet of Things in Everyday Life using Raspberry PiRealNET – Internet of Things in Everyday Life using Raspberry Pi
RealNET – Internet of Things in Everyday Life using Raspberry PiIRJET Journal
 
IRJET-An Automatic Fire Detection and Warning System under Home Video Surveil...
IRJET-An Automatic Fire Detection and Warning System under Home Video Surveil...IRJET-An Automatic Fire Detection and Warning System under Home Video Surveil...
IRJET-An Automatic Fire Detection and Warning System under Home Video Surveil...IRJET Journal
 
IRJET - Raspberry Pi based Intelligent Security System
IRJET -  	  Raspberry Pi based Intelligent Security SystemIRJET -  	  Raspberry Pi based Intelligent Security System
IRJET - Raspberry Pi based Intelligent Security SystemIRJET Journal
 
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...
IRJET-  	  Smart Security System in Homes using Simple Internet of Things Ena...IRJET-  	  Smart Security System in Homes using Simple Internet of Things Ena...
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...IRJET Journal
 
IRJET- Laser Disrupted Security System Via Image Capturing
IRJET- Laser Disrupted Security System Via Image CapturingIRJET- Laser Disrupted Security System Via Image Capturing
IRJET- Laser Disrupted Security System Via Image CapturingIRJET Journal
 
csc project .docx
csc project .docxcsc project .docx
csc project .docxvorsv
 
Smart Door Monitoring and Locking system
Smart Door Monitoring and Locking systemSmart Door Monitoring and Locking system
Smart Door Monitoring and Locking systemIRJET Journal
 
Raspberry pi project smart motion detection system using raspberry pi 3
Raspberry pi project smart motion detection system using raspberry pi 3Raspberry pi project smart motion detection system using raspberry pi 3
Raspberry pi project smart motion detection system using raspberry pi 3Bhaskar Nemala
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IRJET Journal
 

Similar to Intelligent Image Capturing Alarm System Using Raspberry Pi (20)

Home Security System based on IOT: A Systematic Alert System
Home Security System based on IOT: A Systematic Alert SystemHome Security System based on IOT: A Systematic Alert System
Home Security System based on IOT: A Systematic Alert System
 
Design and Implementation of a Smart Surveillance Security System.pdf
Design and Implementation of a Smart Surveillance Security System.pdfDesign and Implementation of a Smart Surveillance Security System.pdf
Design and Implementation of a Smart Surveillance Security System.pdf
 
[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...
[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...
[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...
 
[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...
[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...
[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...
 
IRJET- An Alert System for Home Security based on Internet of Thing
IRJET- An Alert System for Home Security based on Internet of ThingIRJET- An Alert System for Home Security based on Internet of Thing
IRJET- An Alert System for Home Security based on Internet of Thing
 
IRJET- IOT based Intrusion Detection and Tracking System
IRJET- IOT based Intrusion Detection and Tracking SystemIRJET- IOT based Intrusion Detection and Tracking System
IRJET- IOT based Intrusion Detection and Tracking System
 
IRJET - Smart Doorbell System
 IRJET - Smart Doorbell System IRJET - Smart Doorbell System
IRJET - Smart Doorbell System
 
IoT Based Smart Surveillance and Automation
IoT Based Smart Surveillance and AutomationIoT Based Smart Surveillance and Automation
IoT Based Smart Surveillance and Automation
 
S.W.A.T – Motion Based Intrusion Detection System
S.W.A.T – Motion Based Intrusion Detection SystemS.W.A.T – Motion Based Intrusion Detection System
S.W.A.T – Motion Based Intrusion Detection System
 
Secured Spy for Highly Secured Areas
Secured Spy for Highly Secured AreasSecured Spy for Highly Secured Areas
Secured Spy for Highly Secured Areas
 
IRJET- An Intelligent Remote Controlled System for Smart Home Automation
IRJET- An Intelligent Remote Controlled System for Smart Home AutomationIRJET- An Intelligent Remote Controlled System for Smart Home Automation
IRJET- An Intelligent Remote Controlled System for Smart Home Automation
 
RealNET – Internet of Things in Everyday Life using Raspberry Pi
RealNET – Internet of Things in Everyday Life using Raspberry PiRealNET – Internet of Things in Everyday Life using Raspberry Pi
RealNET – Internet of Things in Everyday Life using Raspberry Pi
 
IRJET-An Automatic Fire Detection and Warning System under Home Video Surveil...
IRJET-An Automatic Fire Detection and Warning System under Home Video Surveil...IRJET-An Automatic Fire Detection and Warning System under Home Video Surveil...
IRJET-An Automatic Fire Detection and Warning System under Home Video Surveil...
 
IRJET - Raspberry Pi based Intelligent Security System
IRJET -  	  Raspberry Pi based Intelligent Security SystemIRJET -  	  Raspberry Pi based Intelligent Security System
IRJET - Raspberry Pi based Intelligent Security System
 
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...
IRJET-  	  Smart Security System in Homes using Simple Internet of Things Ena...IRJET-  	  Smart Security System in Homes using Simple Internet of Things Ena...
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...
 
IRJET- Laser Disrupted Security System Via Image Capturing
IRJET- Laser Disrupted Security System Via Image CapturingIRJET- Laser Disrupted Security System Via Image Capturing
IRJET- Laser Disrupted Security System Via Image Capturing
 
csc project .docx
csc project .docxcsc project .docx
csc project .docx
 
Smart Door Monitoring and Locking system
Smart Door Monitoring and Locking systemSmart Door Monitoring and Locking system
Smart Door Monitoring and Locking system
 
Raspberry pi project smart motion detection system using raspberry pi 3
Raspberry pi project smart motion detection system using raspberry pi 3Raspberry pi project smart motion detection system using raspberry pi 3
Raspberry pi project smart motion detection system using raspberry pi 3
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

Recently uploaded

Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...ronahami
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...ppkakm
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptxrouholahahmadi9876
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 

Recently uploaded (20)

Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 

Intelligent Image Capturing Alarm System Using Raspberry Pi

  • 1. TELKOMNIKA, Vol.15, No.4, December 2017, pp. 1651~1658 ISSN: 1693-6930, accredited A by DIKTI, Decree No: 58/DIKTI/Kep/2013 DOI: 10.12928/TELKOMNIKA.v15i4.6532  1651 Received May 24, 2017; Revised August 30, 2017; Accepted December 6, 2017 Intelligent Image Capturing Alarm System Using Raspberry Pi K.A.M Annuar* 1 , N.A. Ab Hadi 2 , S.K. Subramaniam 3 , M. F. M. Ab Halim 4 , M.B.N. Shah 5 , A.F. Kadmin 6 , M.S. Amri 7 , A. Abdul Salam 8 1-7 Faculty of Engineering Technology, Universiti Teknikal Malaysia Melaka, Hang Tuah Jaya, 76100 Durian Tunggal, Melaka, Malaysia 8 Universiti Kuala Lumpur-British Malaysian Institute, Selangor Malaysia *Corresponding author, e-mail: khalilazha@utem.edu.my Abstract Home surveillance system assumes an essential part in this present day living style to help recognizing illegal activities. In this proposed paper, an intelligent image capturing alarm system to protect locker was developed. Raspberry Pi 2 is used as the main controller (server). At the point when any conceivable intrusion is identified, a webcam installed to Raspberry Pi 2 will capture the picture of the intruder. In the meantime, the spotlight or light of the house which represented by an LED will be turned "ON" alongside an alarm sound from a buzzer which is fixed as an output. Taking everything into account, this improvement offers reasonable and easy to use surveillance alarm system. Keywords: image capturing, locker, raspberry pi, PIR Sensor Copyright © 2017 Universitas Ahmad Dahlan. All rights reserved. 1. Introduction In present days, the system of home security turns into an indispensable issue with the expanding cases of home breaking or thievery cases. Moreover, the system of home surveillance is essential since the house owner wants to screen their home's circumstances by identifying any undesirable and illegal activity [1]. Years ago, the traditional home surveillance systems have obtained much demand. As time passes, the technology of traditional home surveillance systems has evolved and offers many exciting benefits to the user. These improvements have conquered the weakness of traditional security systems such as power loss caused by the turning on and turning off the process [2]. Home surveillance security system is a smart method for controlling and observing at home by utilizing information technology. Thus, this security system additionally gives a helpful, adaptable and secured environment that improves life quality. Hence, the internet services have become more familiar with these devices and services which are being used to control the recent home surveillance security system. Recently, the necessity of home surveillance security system is turning out to be extremely important and it is oftentimes utilized in the house or residence [3], business firms [4- 6], robotics [7-9] and also for traffic monitoring systems [10]. The purpose of home surveillance security system is essentially used to screen the activities, behavior or other changes in information in order to manage or protect personal belongings. These days, this surveillance system is being installed at home to monitor and avoid any unwanted activities to occur. Thus, the owner can quickly take necessary actions in case of any aggravations [11]. As house break-in cases increasingly rapidly, there is multiple intelligent home security system that is being developed with many necessary features [12]. One of the fundamental reasons that bring about the increase in the rate of this case is the failure in intruder confirmations [13]. In fact, these failures lead to prolonged crimes. A smart alarm system is developed in this paper to be installed in the locker to overcome the intruder confirmation issues. The development works in a way that when an object’s movement or action passes through infrared radiation and blocks it. Therefore, the movement will be automatically detected by the motion detector thus the image of the moving object will be captured using the camera module installed. As a result, the snapped picture will be sent to the user or the house owner via email as an attachment. In
  • 2.  ISSN: 1693-6930 TELKOMNIKA Vol. 15, No. 4, December 2017 : 1651 – 1658 1652 respect to that, the proposed development will manage to capture an image upon detecting intruder’s motion. Furthermore, a quick move to make a report to the authorized party with the intruder’s image as an evidence can be made. Besides that, an increase in locker break-in cases can occur due to the owner and the authorized party’s late action or movement. Owner’s lack of awareness of the unwanted incidents may cause this incident to occur often. Therefore, the system is developed to produce an alarm sound to alert surround people. Not only that, a notification will be sent via email to notify the owner that an intrusion had occurred in the house. This paper introduces a new technique by using Linux system software development with a USB camera (UVC compatible) attached together to it [14]. The locker security system proposes a proper system that is convenient for the user to access. Besides that, some theft happens over and over due to lack of evidence. Hereby, the proposed project will give us enough evidence on the thief and makes it easier to make a report to the authorized party. In this era of technology, exploration towards a product that costs reasonable price and capable of solving ideas is increasing. A small embedded microcontroller with a flexible platform utilization of the hardware projects is known as the Raspberry Pi. The Raspberry Pi 2 crosses off both criteria [15]. Raspberry Pi is a card-sized minicomputer that can either operate on mains or battery power. It has Linux as its operating system. 2. Research Method This section will discuss on the development using a Raspberry Pi 2 based real-time image capturing alarm system. The intruder will be detected using passive infrared (PIR) sensor's infrared (IR) radiation. The changes in radiation field are checked by the sensor. At the point when an intrusion happens, the presence of an intruder will be detected by the developed system and an image of an intruder will be captured simultaneously. From there on, an email will be sent to the user with the captured image as an attachment. Meanwhile, an LED will be turned on simultaneously in this developed system. The LED will be a replacement for house lamp due to the high cost of the lamp. Not only that, this system will also trigger an alarm sound to alert the house owner or surround people using a buzzer. Figure 1 demonstrates the design system block diagram Figure 1. Block diagram of the project The designed system generally consists of an Raspberry Pi 2, a PIR sensor, a camera module (Logitech C270 webcam), an LED, and a buzzer. Here, the PIR sensor is set as the input while the outputs are camera module, LED, and buzzer. This system works by reading the input from the passive infrared radiation (PIR) sensor continuously. Normally the output of the sensor will be low. In case, if any changes in infrared radiation detected, the output will turn on high. Once the output of passive infrared radiation (PIR) sensor turns high, it will automatically trigger the camera module to capture an image as it is set. In the meantime, an LED will be turned on. This LED will indicate that intrusion is happening and will alert surround people. Not only that, a buzzer was installed in the output that will trigger alarm sound when an intrusion occurs.
  • 3. TELKOMNIKA ISSN: 1693-6930  Intelligent Image Capturing Alarm System Using Raspberry Pi (K.A.M Annuar) 1653 After that, an email will be generated with the snapped picture as an attachment to the user's email address. In order to install and configure the email in Raspberry Pi 2, the system will require SMTP library [16]. SMTP is defined as Simple Mail Transfer Protocol. Raspberry Pi 2 will be connected to the internet and acts as a server to this system. The Raspberry Pi 2 as the main microcontroller will control the input and then the output of the system. As a conclusion, the system will assist the house owner to make a report to authorized party with the intruder’s image as an evidence. Since notification via email is included, a configuration is made to the Raspberry Pi 2 to install the SMTP library. The software and hardware components developed are integrated together. Finally, the analysis and verification are conducted to the system performance. 3. Results and Discussion In this section, the overall system of intelligent image capturing alarm system to protect locker using Raspberry Pi will be tested and simulated. The outcome of the research will be discussed. Each element focused to be accomplished by this project is verified here. The steps to test every one of those components will be clarified in this part also. 3.1. Intelligent Image Capturing Alarm System to Protect Locker Using Raspberry Pi Hardware and Software Results Figure 2 shows the intelligent image capturing alarm system to protect locker using Raspberry Pi setup. The Raspberry Pi is powered by a 5V micro USB supplied from a laptop. A TP-Link WiFi dongle is inserted into the USB port to connect the Raspberry Pi to the internet. The PIR sensor which acts as the input is connected to the GPIO 4 of the Raspberry Pi. Thus, the buzzer is connected to the GPIO 18 of the Raspberry Pi. Furthermore, the LED is connected to the GPIO24. (a) Front view (b) Top view Figure 2. Hardware of the intelligent image capturing alarm system setup At the point when each of the hardware consists of the PIR sensor, WiFi dongle, C270 webcam, LED and buzzer have been installed to the Raspberry Pi and the webcam successfully activated, the entire system program will be run. After that, the whole system will be tested accordingly. The result demonstrates that the system can perform the operation as desired. At the point a movement or changes in infrared radiation detected, the sensor will be activated. PIR motion sensor will give output HIGH, 1 if motion detected and output LOW, 0 if no movement is detected. The HIGH, 1 output of the sensor will trigger the webcam to capture the picture, turn "ON" the LED and turn “ON” the buzzer respectively. Next, the system will send an email to user to notify the possible intrusion. Not only that, the captured image will be attached to the email as attachment and it will enable the user to identify the intruder. Lastly, when the email was effectively sent, the LED will turn "OFF" and the buzzer will turn “OFF” [13-14]. Figure 3 shows the results interface in Putty terminal. The GPIO 4 shows 1 when motion was detected. After that, the webcam will capture the image of the intruder and send to
  • 4.  ISSN: 1693-6930 TELKOMNIKA Vol. 15, No. 4, December 2017 : 1651 – 1658 1654 user’s email. The GPIO 4 resets to 0 once the email was successfully sent. Figure 4 and 5 show email notification with image capture. The different with Aiman et al., this system can capture the intruder image in front [17]. Figure 3. Result of the system Figure 4. Email notification Figure 5. Email content 3.2. Analysis on WiFi Dongle bandwidth In order to study the range that the WiFi dongle would be able to detect without lose the connectivity between the Raspberry Pi and the router. The analysis was performed by a test using the Raspberry Pi with a WiFi dongle. For this analysis, the Raspberry Pi was connected to the laptop via WiFi dongle and the software Iperf was used to measure the bandwidth. Figure 6
  • 5. TELKOMNIKA ISSN: 1693-6930  Intelligent Image Capturing Alarm System Using Raspberry Pi (K.A.M Annuar) 1655 shows the strength of bandwidth detected by Wifi dongle against the distance of the WiFi dongle from Internet router in metres. Figure 6. Bandwidth reading From this analysis, it is proven that the dongle could be used up to a distance of 70m without losing connection and at distance around 70m keeping bandwidth superior to 2.2 Mbps which was the sufficient bandwidth usage of the system. 3.3. Analysis the effect of the internal walls to the wireless signal The total time taken for the system to send an email alert to the user with the presence of internal walls was recorded. The respective cycle starts from the moment motion is being detected by the PIR sensor until an email notification is sent to the user. A total of 10 tests is made under a stable and fixed internet connectivity at a fixed distance of 6m. Figure 7 shows the data collected from the analysis carried out. Figure 7. Time taken for complete cycle during 10 tests (internal walls) The average time taken is calculated as: Average time taken(s) = (14.97 + 14.25 + 15.58 + 14.15 + 15.42 + 13.53 + 14.32 + 15.35 + 14.37 + 14.77) 10 = 14.67 𝑠𝑒𝑐𝑜𝑛𝑑𝑠 19.7 18.9 17.1 15.4 11.7 6.6 2.28 2.2 0 0 0 0 2 4 6 8 10 12 14 16 18 20 0 10 20 30 40 50 60 70 80 90 100 Mbit/s Distance(metre) Bandwidth 14.97 14.25 15.58 14.15 15.42 13.53 14.32 15.35 14.37 14.77 0 4 8 12 16 20 Test 1 Test 2 Test 3 Test 4 Test 5 Test 6 Test 7 Test 8 Test 9 Test 10 Timetaken(s) Number of test Time taken for system to complete a cycle (internal walls)
  • 6.  ISSN: 1693-6930 TELKOMNIKA Vol. 15, No. 4, December 2017 : 1651 – 1658 1656 The average time taken for the system to detect a motion and send an email to the user with the existence of internal walls is approximately 14.67s. Despite the fact that the Wi-Fi data transmission uses digital signal, the real signal uses analogue radio waves. This analogue radio waves are highly sensitive to interference just in the same way as the radio in the car. For example, when a car is being driven through an underground tunnel, the signal will be weaker. As a result, the driver will either hear a noise or complete dropout of the radio channel. Thus. The same impact occurs to the Wi-Fi signal. Figure 8 shows three different laptops which are placed in three different rooms in a house. Based on the Figure 9 above, it shows that the full signal strength is gained by the laptop placed directly above the internet router. This is because it is the closest to the router which acts as signal generator and scientifically proven that the wireless signal are capable of penetrating a ceiling without any. Figure 8. Router connected to three laptops in the living room As the laptop in the loft are further away, it may receive a slightly weaker signal and the user may experience some performance issues. Apart from that, the third laptop which is placed in the kitchen experiences the weakest. Although it is near to the router. This is due to the blocked signal by load bearing wall. In fact, there are several layer behind this walls which are mainly from substantial material. For example, the wall constructed by using bricks, concretes and stones. This factor plays a huge role in signal between the router and Wi-Fi device. Slowness and intermittent connections are also the impact of the factor. 3.4. Analysis on the wireless signal when testing in an open space This analysis was made in a circumstances where the WiFi dongle was connected to the router at a distance of 6 m. There was no walls or any sort of block in between this devices. Figure 9 show data taken for complete cycle during ten tests. Figure 9. Time taken for complete cycle during 10 tests (open space)
  • 7. TELKOMNIKA ISSN: 1693-6930  Intelligent Image Capturing Alarm System Using Raspberry Pi (K.A.M Annuar) 1657 The average time taken is calculated as: 𝐴𝑣𝑒𝑟𝑎𝑔𝑒 𝑡𝑖𝑚𝑒 𝑡𝑎𝑘𝑒𝑛(𝑠) = (11.96 + 13.4 + 12.95 + 12.7 + 13.65 + 12.73 + 12.65 + 12.93 + 11.65 + 12.45) 10 = 12.73 𝑠𝑒𝑐𝑜𝑛𝑑𝑠 The average time taken for the system to detect a motion and send an email to the user within an open space is approximately 12.73s. In comparison to analysis in part 3.3, there is a slight difference in timing for the system to complete a full cycle. The total cycle meant here is the time taken for the system to detect a motion via PIR motion sensor, trigger an alarm via buzzer sound. Turn ON LED which represent the house lamp, capture image of the intruder through Logitech C270 webcam and lastly send an email notification with picture of the intruder as an attachment. The whole process took about 14.67s for analysis with internal walls and 12.73s for the analysis within an open space. As a conclusion, at both the situations the system will be able to send the email to the user successfully. However, in an open space without any internal walls blocking the wireless signal the system sends the email notifications a little faster in an average time difference of 1.94s. 3.5. Analysis on the performance of the PIR sensor with distance The PIR motion sensor analysis was based on motion detection performance validation. The trials were conducted for motion detection at various ranges starting from within 1 m to 7 m range in distance. This process was done during trials in which 10 instances of movement was recorded each for less 1 m, 3 m, 5 m and 7 m ranges respectively. Besides, the probability of detection (Pd) based on these 10 iterations was calculated for each range. In every one of the trials, the sensitivity potentiometer of the PIR sensor was set for maximum value, 7m range. From the analysis in Figure 10, it was observed that when the distance is up to 3m range, the probability of detection (Pd) is around 0.9. At 4m range, the Pd is 0.7. However, the Pd reduces to 0.6 for 5m and 6m range. Furthermore, the probability of detection further decreases to 0.4 when detection range is at 7m [3]. Figure 10. Performance of the PIR sensor with distance 4. Conclusion Based on the research works, there are three objectives that have been discuss. The first objective is to develop system that can reduce the locker break-in cases. It was successfully develop system that intruders can be caught by image capture. The second objective is to alert the owner on possible locker intrusion. This objective is achieved when intrusion triggers an alarm sound to alert the surround people and sends email notification to the user. Besides that, the objective to develop a notification system for the user via email notification with the picture as an attachment have been achieved from this project. Hereby, the user will be able to identify the intruder. As a conclude, an intelligent image capturing alarm system to protect locker using Raspberry Pi has been effectively created by desired objectives 0 0.2 0.4 0.6 0.8 1 <1m 2m 3m 4m 5m 6m 7m ProbabilityofDetection(Pd) Performance of PIR sensor with Distance
  • 8.  ISSN: 1693-6930 TELKOMNIKA Vol. 15, No. 4, December 2017 : 1651 – 1658 1658 and specifications. Apart from that, this system can be improved to make more advanced and reliable by using internet of things [18]. Acknowledgment The authors would like to thanks for the support given to this research by Ministry of Higher Education Malaysia and Universiti Teknikal Malaysia Melaka (UTeM) for support this under PJP/2017FTK-CERIA/S01552 project. References [1] Duc VN, Hung TL, Anh TP, Truong CT, Jin YL, Kugjin Y. Adaptive Home Surveillance System using HTTP Streaming. International Joint Conference on Awareness Science and Technology and Ubi- Media Computing (iCAST-UMEDIA), Journal of Telecommunication, Electronic and Computer Engineering. 2013: 579-583. [2] Syarif H, Syahrizal FF. Scheduler and Voice Recognition on Home Automation Control System. 3rd International Conference on Information and Communication Technology (ICoICT). 2015: 150-155. [3] WWI Wan Jusoh, KAM Annuar, SH Johari, IM Saadon, MH Harun. Motorcycle Security System using GSM and RFID. Journal of Advance Research in Applied Mechanics. 2015; 16(1): 1-9. [4] NAA Hadi, MHC Hasan, NMZ Hashim, NR Mohamad, AS Rahimi, KAM Annuar. Temperature Monitoring System for Infant Incubator using Arduino. International Journal for Advance Research in Engineering and Technology. 2015; 3(6): 8-11. [5] Mohd FMAH, Mohamad HH, Khalil AMA, Suziana A. Monitoring Grid Frequency. ARPN Journal of Engineering and Applied Science. 2015; 10(18): 8413-8416. [6] Intan MS, Herlanda W, Emy ZA, Khalil AMA. River Debris Management System using Off-Grid Photovoltaic Module. MATEC Web of Conference. 2017; 97: 1-8. [7] MH Zulkefli, KAM Annuar, SH Johari, MRM Sapiee, S Ahmad. Graphical User Interface (GUI) Controlled Mobile Robot. Journal of Advanced Research in Computing and Applications. 2015; 1(1): 42-49. [8] Mohamad HH, Mohd SMA, Mohd FMB, Shahrum SA, Khalil AMA. Synchronization of Compass Module with Pressure and Temperature Sensor System for Autonomous Underwater Vehicle (AUV). Jurnal Teknologi. 2015; 74(9): 161-167, [9] Khalil AMA, Muhammad HMZ, Mohamad HH, Mohd FMAH, Arman HA. Design and Development of Search and Rescue Robot. International Journal of Mechanical & Mechatronics Engineering IJMME- IJENS. 2016; 16(02): 36-41. [10] JMM Ferreras, FP Martinez, JC Gallego, AA Lopez, BPD Naranjo, AB del-Campo. Traffic Surveillance System Based on a High-Resolution Radar. IEEE Transactions on Geoscience and Remote Sensing. 2008; 46(6). [11] R Hariprakash, GV Ramu, T Rajakumari, S Ananthi, K Padmanabhan. Some Problem & Methods for Remotely Controllable Automatic Home Security Systems. The Third International Conference on Systems and Networks Communications. 2008: 400-403. [12] Kenny CTH, Chai CT, Tan KL, Yea DC, Alvey HLC, Tan RW. Development of Home Monitoring System with Integration of Safety and Security Modules. IEEE Conference on Sustainable Utilization and Development in Engineering and Technology (STUDENT). 2012: 277-282. [13] M Poorani, V Vaidehi, M Rajesh, Bharghavi, Balamuralidhar, G Chandra. Semantic Intruder Detection System in WSN. Conference on Advanced Computing. 2010: 26-32. [14] J Weerachai, P Siam, K Narawith. USB Security Camera Software for Linux. 2nd International Science, Social-Science, Engineering and Energy Conference. 2010. [15] Qianqian Y, Guangyao Z, Wenhui Q, Bin Z, PY Chiang. Air-kare: A Wi-Fi based, multi-sensor, real- time indoor air quality monitor. 2015 IEEE International Wireless Symposium (IWS 2015). 2015: 1-4. [16] V Tipsuwanporn, A Numsomran, S Samaimak, S Harnnarong. Development of redundant bus library for arduino to apply in SCADA system. 2014 14th International Conference on Control, Automation and Systems (ICCAS 2014). Seoul. 2014: 42-46. [17] Aiman ZJ, Lim MS. Web based home security and automation system. International Journal of Reconfigurable and Embedded Systems (IJRES). 2016; 5(2): 92-98. [18] Teddy SG, Intan RHY, Mira K, Nanang I, Nor FZ, Hasmah M, Anis NN. Prototype design of smart home system using internet of things. Indonesian Journal of Electrical Engineering and Computer Science. 2017; 7(1): 107-115.