SlideShare a Scribd company logo
1 of 17
INVISIBLE EYES-ADVANCE
SECURITY SYSTEM
Guided by… Presented by...
G.SireeshaSpoorthi Mam
CONTENTS
INTRODUCTION
METHODOLOGY
WORKING
BLOCK DIAGRAM
ADVANTAGES
DISADVANTAGES
APPLICATIONS
CONCLUSION
REFERENCES
INTRODUCTION
• In this modern era, property crimes are more predominant. This
necessitates our need to develop an advanced security system which
is the INVISIBLE EYES. It is basically a single camera based
security system that can be used to protect valuable kept in a room of
a house or property
• Manager can only view the footage which was alerted on the presence
of intrusion. Once the intruder has been detected this information
about intruder will be directed to the cop through the sms. And the
same time camera can slew around the room and record only when it
is alerted by the presence of any intrusion.
METHODOLOGY
This system consists of the following components:
1. Microcontroller
2. Stepper motor
3. PIR Sensors
4. Camera
5. GSM modem
6. Personal computer
MICROCONTROLLER
It is a small computer on a single integrated circuit containing a CPU,
memory, Timer and programmable input/output ports
Microcontroller available with different word length such as 8bit, 16bit
and 32 bits microcontroller
Microcontroller can contain a varying number of I/O pins. These pins
can configured to either an input or an output state.
STEPPER MOTOR
 Stepper motors are digital motors, We
actually Send Position signals to the Motor to
drive them.
It is of four wire stepper motor.
PIR SENSOR
PIR sensor allow us to sense the motion, almost
Always use to detect whether a human has moved
in or out of the sensors range
It is commonly found in appliances and gadgets
Used in homes or business,
Sensitivity Range: up to 20 feet (6 meterss
We, homo sapiens, radiate heat in form of radiation
at wavelength of 10-12 micrometer that can only
detect by the PIR sensor
GSM MODEM
It is a special type of modem which accepts
SIM card.
These GSM modem are more frequently used
to provide mobile connectivity.
Many of them can also be used for sending
and receiving SMS.
In this case we are using GSM modem for
sending the message only.
WORKING
• Step1: user enters the password, if password entered is correct then the
system starts else he is prompted to re-enter the password.
• Step2: If sensor sense any change or sense any motion, then an intrusion is
detected. Else there is no intrusion.
• Step3: If intrusion is detected, then relay triggered, stepper motor rotates
the camera, it start recording and an e-mail is sent to user
8051
M.C.
ALERT
GSM MODEM
SMS
TO
OWNER
SMS
TO
POLICES4
S1 S2
S3
KEYPAD
CAMERA
STEPPE
R
MOTOR
BLOCK DIAGRAM
ADVANTAGES
• Invisible Eye Security system solves many of the problems
faced by the multiple camera based security system at an
easily affordable cost.
The biggest advantage is that we can avoid having to wade
through hours of footage of empty rooms.
One can also avoid having to install multiple cameras to
cover a single room.
DISADVANTAGES
• we have to deactivate the system while your
shop is open
• If the owner is out of network then message
will not be sent.
APPLICATIONS
• Use for home security systems.
• Office security system
• Bank security system
CONCLUSION
• It is very secure security system as compare to present
security system.
it solves many of the problems faced by the multiple
Camera based security system.
so we can use Invisible eyes instead of present security
system.
REFERENCES
• The 8051 microcontroller and embedded system
by Muhammad Ali Mazidi
• http://www.scribd.com/mobile/doc/84040168/INVISI
BLE-EYE-ADVANCE-SECURITY-SYSTEM-PPT
• http://www.seminarsonly.com/computer%20science/i
nvisible-eye-seminar-report-ppt-pdf.php
Invisible Eye
Invisible Eye

More Related Content

What's hot

Night vision technology
Night vision technologyNight vision technology
Night vision technologypravin. r.k
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentationVivek Kumar
 
Drowsiness detection ppt
Drowsiness detection pptDrowsiness detection ppt
Drowsiness detection pptsafepassage
 
GSM Based Anti theft system
GSM Based Anti theft systemGSM Based Anti theft system
GSM Based Anti theft systemKshitij Rokde
 
Vehicle tracking system using gps and gsm
Vehicle tracking system using gps and gsmVehicle tracking system using gps and gsm
Vehicle tracking system using gps and gsmanita maharjan
 
Smart doorbell - Using Raspberry pi
Smart doorbell - Using Raspberry piSmart doorbell - Using Raspberry pi
Smart doorbell - Using Raspberry piAabid Ansar
 
AUTOMATION OF RATION DISTRIBUTION SYSTEM
AUTOMATION OF RATION DISTRIBUTION SYSTEMAUTOMATION OF RATION DISTRIBUTION SYSTEM
AUTOMATION OF RATION DISTRIBUTION SYSTEMPreetiSingh518
 
Night vision system in automobiles
Night  vision system  in automobilesNight  vision system  in automobiles
Night vision system in automobilesRohit Raj
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security systempraful borad
 
Night vision report
Night vision reportNight vision report
Night vision reportdeepakmarndi
 
Advance security system (ppt)
Advance security system (ppt)Advance security system (ppt)
Advance security system (ppt)Komal Kumra
 
Image authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingImage authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingNawin Kumar Sharma
 
Final Year Project presentation
Final Year Project presentationFinal Year Project presentation
Final Year Project presentationnmittal1109
 
ACCIDENT DETECTION AND VEHICLE TRACKING USING GPS,GSM AND MEMS
ACCIDENT DETECTION AND VEHICLE TRACKING USING GPS,GSM AND MEMSACCIDENT DETECTION AND VEHICLE TRACKING USING GPS,GSM AND MEMS
ACCIDENT DETECTION AND VEHICLE TRACKING USING GPS,GSM AND MEMSKrishna Moparthi
 
IRJET- IoT based Noise and Pollution Monitoring System
IRJET- IoT based Noise and Pollution Monitoring SystemIRJET- IoT based Noise and Pollution Monitoring System
IRJET- IoT based Noise and Pollution Monitoring SystemIRJET Journal
 
NIGHT VISION IN CARS
NIGHT VISION IN CARSNIGHT VISION IN CARS
NIGHT VISION IN CARSPraveen Yadav
 

What's hot (20)

Night vision technology
Night vision technologyNight vision technology
Night vision technology
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
Drowsiness detection ppt
Drowsiness detection pptDrowsiness detection ppt
Drowsiness detection ppt
 
Night vision
Night visionNight vision
Night vision
 
GSM Based Anti theft system
GSM Based Anti theft systemGSM Based Anti theft system
GSM Based Anti theft system
 
Vehicle tracking system using gps and gsm
Vehicle tracking system using gps and gsmVehicle tracking system using gps and gsm
Vehicle tracking system using gps and gsm
 
Smart doorbell - Using Raspberry pi
Smart doorbell - Using Raspberry piSmart doorbell - Using Raspberry pi
Smart doorbell - Using Raspberry pi
 
AUTOMATION OF RATION DISTRIBUTION SYSTEM
AUTOMATION OF RATION DISTRIBUTION SYSTEMAUTOMATION OF RATION DISTRIBUTION SYSTEM
AUTOMATION OF RATION DISTRIBUTION SYSTEM
 
Smart IoT Device for Vehicle Theft
Smart IoT Device for Vehicle TheftSmart IoT Device for Vehicle Theft
Smart IoT Device for Vehicle Theft
 
Night vision system in automobiles
Night  vision system  in automobilesNight  vision system  in automobiles
Night vision system in automobiles
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security system
 
Night vision report
Night vision reportNight vision report
Night vision report
 
Smart healmet
Smart healmetSmart healmet
Smart healmet
 
Advance security system (ppt)
Advance security system (ppt)Advance security system (ppt)
Advance security system (ppt)
 
Image authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingImage authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarking
 
Final Year Project presentation
Final Year Project presentationFinal Year Project presentation
Final Year Project presentation
 
ACCIDENT DETECTION AND VEHICLE TRACKING USING GPS,GSM AND MEMS
ACCIDENT DETECTION AND VEHICLE TRACKING USING GPS,GSM AND MEMSACCIDENT DETECTION AND VEHICLE TRACKING USING GPS,GSM AND MEMS
ACCIDENT DETECTION AND VEHICLE TRACKING USING GPS,GSM AND MEMS
 
IRJET- IoT based Noise and Pollution Monitoring System
IRJET- IoT based Noise and Pollution Monitoring SystemIRJET- IoT based Noise and Pollution Monitoring System
IRJET- IoT based Noise and Pollution Monitoring System
 
NIGHT VISION IN CARS
NIGHT VISION IN CARSNIGHT VISION IN CARS
NIGHT VISION IN CARS
 
Smart mirror
Smart mirrorSmart mirror
Smart mirror
 

Similar to Invisible Eye

invisible eye'.pdf
invisible eye'.pdfinvisible eye'.pdf
invisible eye'.pdfsameeru1
 
Rohan College seminar
Rohan College seminarRohan College seminar
Rohan College seminarRohan Tandel
 
gsm based security system
gsm based security systemgsm based security system
gsm based security systemnayandey
 
Invisible Eye- by pavan prasad
Invisible Eye- by pavan prasadInvisible Eye- by pavan prasad
Invisible Eye- by pavan prasadPavan prasad
 
ATM machine security system using GSM and MEMS sensor
ATM machine security system using GSM and MEMS sensorATM machine security system using GSM and MEMS sensor
ATM machine security system using GSM and MEMS sensorIRJET Journal
 
Pir and gsm based house security system
Pir and gsm based house security systemPir and gsm based house security system
Pir and gsm based house security systemKhadarbaba Shaik
 
Gsm anti theft system
Gsm anti theft systemGsm anti theft system
Gsm anti theft systemAshu0711
 
IRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS SensorIRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS SensorIRJET Journal
 
Security system with face recognition, sms alert and embedded network video m...
Security system with face recognition, sms alert and embedded network video m...Security system with face recognition, sms alert and embedded network video m...
Security system with face recognition, sms alert and embedded network video m...ijsptm
 
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET Journal
 
Advanced vehicle security system 2016 upload
Advanced vehicle security system 2016 uploadAdvanced vehicle security system 2016 upload
Advanced vehicle security system 2016 uploadNishanth C
 
Wearable technology gadget for soldiers
Wearable technology gadget for soldiersWearable technology gadget for soldiers
Wearable technology gadget for soldiersBits
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewIJSRD
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewIJSRD
 
Design of concealed alarm system based on gsm
Design of concealed alarm system based on gsmDesign of concealed alarm system based on gsm
Design of concealed alarm system based on gsmsudhakar5472
 
Smart helmet by pratik panmand
Smart helmet by pratik panmandSmart helmet by pratik panmand
Smart helmet by pratik panmandPRATIKPANMAND
 
Gsm based bank vault security system
Gsm based bank vault security systemGsm based bank vault security system
Gsm based bank vault security systemRipan Kumar Ray
 

Similar to Invisible Eye (20)

invisible eye'.pdf
invisible eye'.pdfinvisible eye'.pdf
invisible eye'.pdf
 
Rohan College seminar
Rohan College seminarRohan College seminar
Rohan College seminar
 
gsm based security system
gsm based security systemgsm based security system
gsm based security system
 
Invisible Eye- by pavan prasad
Invisible Eye- by pavan prasadInvisible Eye- by pavan prasad
Invisible Eye- by pavan prasad
 
ATM machine security system using GSM and MEMS sensor
ATM machine security system using GSM and MEMS sensorATM machine security system using GSM and MEMS sensor
ATM machine security system using GSM and MEMS sensor
 
Design and Implementation of Security Based ATM theft Monitoring system
Design and Implementation of Security Based ATM theft Monitoring systemDesign and Implementation of Security Based ATM theft Monitoring system
Design and Implementation of Security Based ATM theft Monitoring system
 
Pir and gsm based house security system
Pir and gsm based house security systemPir and gsm based house security system
Pir and gsm based house security system
 
Gsm anti theft system
Gsm anti theft systemGsm anti theft system
Gsm anti theft system
 
IRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS SensorIRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS Sensor
 
Remote car locking system
Remote car locking systemRemote car locking system
Remote car locking system
 
Security system with face recognition, sms alert and embedded network video m...
Security system with face recognition, sms alert and embedded network video m...Security system with face recognition, sms alert and embedded network video m...
Security system with face recognition, sms alert and embedded network video m...
 
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’S
 
Advanced vehicle security system 2016 upload
Advanced vehicle security system 2016 uploadAdvanced vehicle security system 2016 upload
Advanced vehicle security system 2016 upload
 
Wearable technology gadget for soldiers
Wearable technology gadget for soldiersWearable technology gadget for soldiers
Wearable technology gadget for soldiers
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
 
Design of concealed alarm system based on gsm
Design of concealed alarm system based on gsmDesign of concealed alarm system based on gsm
Design of concealed alarm system based on gsm
 
GSM Security
GSM SecurityGSM Security
GSM Security
 
Smart helmet by pratik panmand
Smart helmet by pratik panmandSmart helmet by pratik panmand
Smart helmet by pratik panmand
 
Gsm based bank vault security system
Gsm based bank vault security systemGsm based bank vault security system
Gsm based bank vault security system
 

Recently uploaded

Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 

Recently uploaded (20)

Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 

Invisible Eye

  • 1. INVISIBLE EYES-ADVANCE SECURITY SYSTEM Guided by… Presented by... G.SireeshaSpoorthi Mam
  • 3. INTRODUCTION • In this modern era, property crimes are more predominant. This necessitates our need to develop an advanced security system which is the INVISIBLE EYES. It is basically a single camera based security system that can be used to protect valuable kept in a room of a house or property • Manager can only view the footage which was alerted on the presence of intrusion. Once the intruder has been detected this information about intruder will be directed to the cop through the sms. And the same time camera can slew around the room and record only when it is alerted by the presence of any intrusion.
  • 4. METHODOLOGY This system consists of the following components: 1. Microcontroller 2. Stepper motor 3. PIR Sensors 4. Camera 5. GSM modem 6. Personal computer
  • 5. MICROCONTROLLER It is a small computer on a single integrated circuit containing a CPU, memory, Timer and programmable input/output ports Microcontroller available with different word length such as 8bit, 16bit and 32 bits microcontroller Microcontroller can contain a varying number of I/O pins. These pins can configured to either an input or an output state.
  • 6. STEPPER MOTOR  Stepper motors are digital motors, We actually Send Position signals to the Motor to drive them. It is of four wire stepper motor.
  • 7. PIR SENSOR PIR sensor allow us to sense the motion, almost Always use to detect whether a human has moved in or out of the sensors range It is commonly found in appliances and gadgets Used in homes or business, Sensitivity Range: up to 20 feet (6 meterss We, homo sapiens, radiate heat in form of radiation at wavelength of 10-12 micrometer that can only detect by the PIR sensor
  • 8. GSM MODEM It is a special type of modem which accepts SIM card. These GSM modem are more frequently used to provide mobile connectivity. Many of them can also be used for sending and receiving SMS. In this case we are using GSM modem for sending the message only.
  • 9. WORKING • Step1: user enters the password, if password entered is correct then the system starts else he is prompted to re-enter the password. • Step2: If sensor sense any change or sense any motion, then an intrusion is detected. Else there is no intrusion. • Step3: If intrusion is detected, then relay triggered, stepper motor rotates the camera, it start recording and an e-mail is sent to user
  • 11. ADVANTAGES • Invisible Eye Security system solves many of the problems faced by the multiple camera based security system at an easily affordable cost. The biggest advantage is that we can avoid having to wade through hours of footage of empty rooms. One can also avoid having to install multiple cameras to cover a single room.
  • 12. DISADVANTAGES • we have to deactivate the system while your shop is open • If the owner is out of network then message will not be sent.
  • 13. APPLICATIONS • Use for home security systems. • Office security system • Bank security system
  • 14. CONCLUSION • It is very secure security system as compare to present security system. it solves many of the problems faced by the multiple Camera based security system. so we can use Invisible eyes instead of present security system.
  • 15. REFERENCES • The 8051 microcontroller and embedded system by Muhammad Ali Mazidi • http://www.scribd.com/mobile/doc/84040168/INVISI BLE-EYE-ADVANCE-SECURITY-SYSTEM-PPT • http://www.seminarsonly.com/computer%20science/i nvisible-eye-seminar-report-ppt-pdf.php