Professional Documents
Culture Documents
Team 43 Report
Team 43 Report
Team 43 Report
A PROJECT REPORT
ON
Bachelor of Engineering
in
Computer Science and Engineering
Submitted by
Certificate
Examiners
Name of the Examiner Signature of the Examiner
1.
2.
ABSTRACT
Museum security is one of the important functions of museums. Millions of precious
antique artefacts which houses in about a thousand museums across the country may
have an unprecedented significance regarding our cultural and historical heritage, but
they are undervalued in Governments plans and priorities, not only in terms of their
security but also in many other aspects like timely maintenance and administration.
Usually, it’s taken under any consideration by concerned authorities when some kind
of unpleasant calamity or event which brings that place into national headlines , this
happens only when thefts occur in museums. As soon as the media hype ceases,
the authorities generally forget about the follow-up action and ignore the necessary
precautionary measures to be taken regarding museum security. Some of the incidents
of thefts in museums across the country have exposed the inadequacy of museum
security. In the recent past, there has been a phenomenal increase in the number of
thefts in museums all over the world. For instance about 18000 works of are reported
to be stolen in 1978 in the United States alone. In India, the situation may be much
more alarming. Therefore, there is an urgent need to adopt sophisticated security
systems with modern tools and techniques. Museum security is a complicated issue
and it has to be taken up right from the planning stage of the building onwards. In
fact, security does not only mean safety against theft and vandalism, but it should also
address the security of visitors from fire, natural disasters and attack by terrorists and
etc. Although various tools and techniques are available for museum security, most
of the museums fail to adopt all the security systems all at once , therefore to provide
total cover by security of museums. Hence an integrated museum security system
may be adopted by using all available methods, including modern gadgets, enabling
a multiple security system for full security of museums.
ACKNOWLEDGEMENTS
Salutations to our beloved and highly esteemed institute “Malnad College Of Engi-
neering” for having well qualified staff and labs furnished with necessary equipment.
The successful completion of any task would be incomplete without mentioning the
people who have constantly guided and inspired for the project and the report gener-
ation.
We avail this opportunity to thank all those people who have helped us in the
whole process of completion of this project and the report.
We would like to express our deepest gratitude to our mentor Mrs.Margaret R.E,
Department of Computer Science and Engineering for her daily evaluation of the work
and for providing us constant encouragement with her unflinching support and valu-
able guidance throughout this project. We are indebted to her as she has considered
us worthy of this project and invested her faith in us. It was a great privilege to work
under her. We will take away a lot more than just the technical knowledge from her.
We are deeply indebted to the Head of Department Dr. Geetha Kiran A, Head of
the Department of Computer Science and Engineering for her constant guidance and
encouragement.We would also like to place our special thanks to Dr. C.V. Venkatesh,
Principal, Malnad College Of Engineering for providing the opportunity and the fa-
Ragib R Shariff
1 Introduction 1
1.2.2 Objective . . . . . . . . . . . . . . . . . . . . . . 2
2 Literature Survey 3
complexes . . . . . . . . . . . . . . . . . . . . . . . . . . 3
librAries . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
3 System Requirements 5
3.2.3 LED: . . . . . . . . . . . . . . . . . . . . . . . . . 7
3.2.4 Buzzer: . . . . . . . . . . . . . . . . . . . . . . . 7
i
3.2.5 Jumper Wires: . . . . . . . . . . . . . . . . . . . 8
4 Project Design 9
4.1 Working . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
7 References 18
ii
LIST OF FIGURES
5.1 Flowchart . . . . . . . . . . . . . . . . . . . . . . . . . . 10
5.2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
5.3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
5.4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
5.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
iii
Chapter 1
Introduction
1
OOP. Using the concept of internet of things we design our project to
make security management life easier..
Design and develop a model Weather some person entered in the re-
stricted area, Verify the person is authorized or intruder,Produce the
signal if the person is an intruder.
1.2.2 Objective
2
Chapter 2
Literature Survey
3
museums and libraries),has looked at these sectors in tandem and has
encouraged them to focus on their users (Fresh Minds, 2007; Marsh
etal, 2010). The evidence about public engagement in these sectors is
quite substantial, with good data and research; this is particularly the
case for museums, where the MLA has funded the collection of data on
visitor numbers and experiences at Renaissance hub museums (BDRC
Continental, 2010)
4
Chapter 3
System Requirements
• raspberry os
• Ultrasonic Sensor
• LED
• Buzzer
• webcam
• Jumper Wires
5
3.2.1 Raspberry PI:
6
3.2.3 LED:
3.2.4 Buzzer:
7
3.2.5 Jumper Wires:
Jumper wires are used for making connections between items on your
breadboard and your Arduino’s header pins.
8
Chapter 4
Project Design
4.1 Working
The security system circuit is built with Raspberry pi. The Raspberry
pi is connected to various components such as motor, buzzer, ultrasonic
sensor and so on, each having their own functions.A particular range
is set around the area.checks weather any human or object enters that
range of particular area through ultrasonic sensor, if a person enters
to the restricted area then Raspberry PI send a signal to the ubidots
(IOT).which further sends the signal to the camera which recognizes the
person through face detection technology, weather he is an authorized
person or an intruder.If an intruder is detected then a signal is sent
back to the Raspberry pi through ubidots(IOT) which in turn turns on
the Buzzer, LED.
9
Chapter 5
10
Step1: Continuously sensing through ultrasonic sensor.
Figure 5.2:
Figure 5.3:
11
Step3: Checks Weather a person is an intruder or an authorized.
Figure 5.4:
Figure 5.5:
12
5.1 Raspberry PI Code
13
duration=stop_time-start_time
distance=(duration*34300)/2
print(distance)
time.sleep(1)
response=var.save_value({"value":distance})
if(distance<=20):
response=var1.save_value({"value":1})
GPIO.output(trig,0)
vr=var2.get_values(1)
d=vr[0][’value’]
print("var2",d)
if(d==1):
for i in range (10):
GPIO.output(led,1)
time.sleep(0.2)
GPIO.output(led,0)
time.sleep(0.2)
GPIO.output(bp,1)
time.sleep(0.2)
GPIO.output(bp,0)
time.sleep(0.2)
14
5.2 Face detection Code
faces=face_cascade.detectMultiScale(gray,1.5,5)
for(x,y,w,h) in faces:
cv2.rectangle(img,(x,y),(x+w,y+h),(255,0,0),2)
id,conf=rec.predict(gray[y:y+h,x:x+w])
if(conf<60):
if(id==1):
15
print("Raghib")
response=var2.save_value({"value":0})
break
else:
print("unknown")
response=var2.save_value({"value":1})
break
cv2.imshow(’img’,img)
if cv2.waitKey(1)==ord(’q’):
break
cap.release()
cv2.destroyAllWindows()
16
Chapter 6
17
Chapter 7
References
(a) https://www.w3schools.com/python/pythonml-getting-started.asp
(b) https://www.ncbi.nlm.nih.gov/books/NBK109715/
2. For IOT
(a) https://sites.google.com/site/v3viceiot/references
(b) https: //wso2.com/whitepapers/a-reference-architecture-for-the-
internet-of-things/
18