Team 43 Report

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 25

VISVESVARAYA TECHNOLOGICAL UNIVERSITY

Jnana Sangama, Belagavi90018

A PROJECT REPORT

ON

“Advance tech-security solution ”


Submitted in partial fulfillment of
the requirements for the award of the degree of

Bachelor of Engineering
in
Computer Science and Engineering

Submitted by

Ragib R Shariff 4MC19CS115


Mohammed Uvaize Pasha 4MC19CS082
Salman Ahmed Siddiqui 4MC19CS134

Under the guidance of


Mrs. Margaret R.E.,
Assistant Professor

Department of Computer Science and Engineering


Malnad College of Engineering
Hassan - 573201, Karnataka, India
2021-2022
Malnad College of Engineering
Department of Computer Science and Engineering
Hassan - 573201, Karnataka, India

Certificate

This is to certify that project work entitled ‘Advance Tech-Security Solution” is a


bonafide work carried out by

Ragib R Shariff 4MC19CS115


Mohammed Uvaize Pasha 4MC19CS082
Salman Ahmed Siddiqui 4MC19CS134

in partial fulfillment for the award of Bachelor of Engineering in Computer Science


and Engineering of the Visvesvaraya Technological University, Belgavi during the year
2021-2022. It is certified that all corrections/suggestions indicated for Internal As-
sessment have been incorporated in the report deposited in the departmental library.
The project report has been approved as it satisfies the academic requirements in
respect of project work prescribed for the Bachelor of Engineering Degree.

Signature of the Guide Signature of the HOD Signature of the Principal


Margaret R.E., Dr. Geetha Kiran A Dr. C V Venkatesh
Assistant Professor Prof. & HOD Principal
Dept. of CSE, MCE Dept. of CSE, MCE MCE

Examiners
Name of the Examiner Signature of the Examiner

1.

2.
ABSTRACT
Museum security is one of the important functions of museums. Millions of precious
antique artefacts which houses in about a thousand museums across the country may
have an unprecedented significance regarding our cultural and historical heritage, but
they are undervalued in Governments plans and priorities, not only in terms of their
security but also in many other aspects like timely maintenance and administration.
Usually, it’s taken under any consideration by concerned authorities when some kind
of unpleasant calamity or event which brings that place into national headlines , this
happens only when thefts occur in museums. As soon as the media hype ceases,
the authorities generally forget about the follow-up action and ignore the necessary
precautionary measures to be taken regarding museum security. Some of the incidents
of thefts in museums across the country have exposed the inadequacy of museum
security. In the recent past, there has been a phenomenal increase in the number of
thefts in museums all over the world. For instance about 18000 works of are reported
to be stolen in 1978 in the United States alone. In India, the situation may be much
more alarming. Therefore, there is an urgent need to adopt sophisticated security
systems with modern tools and techniques. Museum security is a complicated issue
and it has to be taken up right from the planning stage of the building onwards. In
fact, security does not only mean safety against theft and vandalism, but it should also
address the security of visitors from fire, natural disasters and attack by terrorists and
etc. Although various tools and techniques are available for museum security, most
of the museums fail to adopt all the security systems all at once , therefore to provide
total cover by security of museums. Hence an integrated museum security system
may be adopted by using all available methods, including modern gadgets, enabling
a multiple security system for full security of museums.
ACKNOWLEDGEMENTS

Salutations to our beloved and highly esteemed institute “Malnad College Of Engi-
neering” for having well qualified staff and labs furnished with necessary equipment.
The successful completion of any task would be incomplete without mentioning the
people who have constantly guided and inspired for the project and the report gener-
ation.
We avail this opportunity to thank all those people who have helped us in the
whole process of completion of this project and the report.
We would like to express our deepest gratitude to our mentor Mrs.Margaret R.E,
Department of Computer Science and Engineering for her daily evaluation of the work
and for providing us constant encouragement with her unflinching support and valu-
able guidance throughout this project. We are indebted to her as she has considered
us worthy of this project and invested her faith in us. It was a great privilege to work
under her. We will take away a lot more than just the technical knowledge from her.

We are deeply indebted to the Head of Department Dr. Geetha Kiran A, Head of

the Department of Computer Science and Engineering for her constant guidance and

encouragement.We would also like to place our special thanks to Dr. C.V. Venkatesh,

Principal, Malnad College Of Engineering for providing the opportunity and the fa-

cilities for the completion of our project.

Ragib R Shariff

Mohammed Uvaize Pasha

Salman Ahmed Siddiqui


TABLE OF CONTENTS

1 Introduction 1

1.1 General Introduction . . . . . . . . . . . . . . . . . . . . 1

1.2 About Project . . . . . . . . . . . . . . . . . . . . . . . . 2

1.2.1 Problem Statement . . . . . . . . . . . . . . . . . 2

1.2.2 Objective . . . . . . . . . . . . . . . . . . . . . . 2

2 Literature Survey 3

2.1 Security systems in buildings and structures of museum

complexes . . . . . . . . . . . . . . . . . . . . . . . . . . 3

2.2 A review of reseArch And literAture on museums And

librAries . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

2.3 Inside Museum Security Systems Around The World . . 4

3 System Requirements 5

3.1 Software Requirements . . . . . . . . . . . . . . . . . . . 5

3.2 Hardware Requirements . . . . . . . . . . . . . . . . . . 5

3.2.1 Raspberry PI: . . . . . . . . . . . . . . . . . . . . 6

3.2.2 Ultrasonic sensor: . . . . . . . . . . . . . . . . . . 6

3.2.3 LED: . . . . . . . . . . . . . . . . . . . . . . . . . 7

3.2.4 Buzzer: . . . . . . . . . . . . . . . . . . . . . . . 7

i
3.2.5 Jumper Wires: . . . . . . . . . . . . . . . . . . . 8

4 Project Design 9

4.1 Working . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

5 Design and Implementation 10

5.1 Raspberry PI Code . . . . . . . . . . . . . . . . . . . . . 13

5.2 Face detection Code . . . . . . . . . . . . . . . . . . . . 15

6 Conclusion and scope for future work 17

7 References 18

ii
LIST OF FIGURES

5.1 Flowchart . . . . . . . . . . . . . . . . . . . . . . . . . . 10

5.2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

5.3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

5.4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

5.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

iii
Chapter 1

Introduction

1.1 General Introduction


Security systems have always been manual. Old fashioned lock and
keys are the main security devices used. Close circuit cameras are be-
ing used nowadays. But they have the disadvantage of being expensive.
Another problem that comes with them is that people have to sit in
front of monitors constantly watching the feed. If something had hap-
pened when no one was watching or if the watcher failed to notice the
incident then the theft of a valuable object would be undetectable. To
add another layer of security to particularly important objects would
increase their safety immensely and reduce lapses of security due to
human error. Our system is fully automated once activated. It do not
require anyone to continuously stand guard. If an intrusion or theft
occurs only then will the authorities be alerted. It adds security with-
out increasing the workload of the people tasked with security. It also
scalable, the number of sensors can be increased and any number of
the system can be operational in a given facility. Since our system is
room and object specific, authorities will instantly know where to focus
their attention when an alarm goes off. Our system being relatively in-
expensive, it will add extra security without a huge investment in new
equipment. Its era of technology world is becoming faster and easier
due to this reason our museums also should become part of it. Sitting
in any part of world we can view the security systems of the museums
just by our smart phone. Here we use the concepts called IOT, ML and

1
OOP. Using the concept of internet of things we design our project to
make security management life easier..

1.2 About Project

1.2.1 Problem Statement

Design and develop a model Weather some person entered in the re-
stricted area, Verify the person is authorized or intruder,Produce the
signal if the person is an intruder.

1.2.2 Objective

The objective is to conserve, preserve, protect- cultural, historical, re-


ligious and mythologically important pieces of archaeological art, lit-
erature, utensils, ornaments, stones, gems etc. which are unique and
extremely valuable as they are just one off their kind.

2
Chapter 2

Literature Survey

To carry out any project work it is very essential to understand the


current scenario and the technology advantages and disadvantages. In
this context through literature survey as been carried out. Many papers
as been referred and it as been summarized and different techniques
used to design and implement the project using Raspberry pi.

2.1 Security systems in buildings and structures of


museum complexes
Author: G Ekinil1,2, L Gorgadze1, V Provotorina1, and A Petrenko1
This study is aimed at analyzing the museums of the Rostov region
and identifying the main approaches to the design of museums. Par-
ticular attention is paid to ensuring security in museums. The article
proposes a comprehensive concept of museum security

2.2 A review of reseArch And literAture on muse-


ums And librAries
Author: Rachel Smithies, Arts Council England
Museums and libraries are strongly oriented to thinking about the
people who engage with them, and ways to broaden and deepen that
engagement. This was evident from the documents suggested for this
review,a view shared in varying degrees across the DCMS sectors, and
much research on engagement with the cultural sectors (arts, heritage,

3
museums and libraries),has looked at these sectors in tandem and has
encouraged them to focus on their users (Fresh Minds, 2007; Marsh
etal, 2010). The evidence about public engagement in these sectors is
quite substantial, with good data and research; this is particularly the
case for museums, where the MLA has funded the collection of data on
visitor numbers and experiences at Renaissance hub museums (BDRC
Continental, 2010)

2.3 Inside Museum Security Systems Around The


World
Author: Aliza Vigderman
Museum security poses a very particular problem: extremely valu-
able items must be kept safe while simultaneously remaining on display
for hundreds of visitors each day. After all, horror stories of failed mu-
seum security are etched into the public mind: Munch Museum theft:
In 2004, Edvard Munch’s “The Scream” and “Madonna” were taken off
the wall of the Munch Museum in Oslo by two thieves in stereotypical
black ski masks.

4
Chapter 3

System Requirements

3.1 Software Requirements


• Python IDLE

• Operating system: Windows 7 or higher

• raspberry os

3.2 Hardware Requirements


• Raspberry PI

• Ultrasonic Sensor

• LED

• Buzzer

• webcam

• Jumper Wires

5
3.2.1 Raspberry PI:

The Raspberry Pi is a low cost, credit-card sized computer that


plugs into a computer monitor or TV, and uses a standard keyboard
and mouse. It is a capable little device that enables people of all ages
to explore computing, and to learn how to program in languages like
Scratch and Python.

3.2.2 Ultrasonic sensor:

A system for the detection of objects under water by emitting sound


pulses and detecting or measuring their return after being reflected.

6
3.2.3 LED:

A Light Emitting Diode (LED) is a semiconductor device, which


can emit light when an electric current passes through it. To do this,
holes from p-type semiconductors recombine with electrons from n-type
semiconductors to produce light.

3.2.4 Buzzer:

A buzzer or beeper is an audio signaling device, which may be me-


chanical, electromechanical, or piezoelectric (piezo for short). Typical
uses of buzzers and beepers include alarm devices, timers, train and
confirmation of user input such as a mouse click or keystroke.

7
3.2.5 Jumper Wires:

Jumper wires are used for making connections between items on your
breadboard and your Arduino’s header pins.

8
Chapter 4

Project Design

4.1 Working
The security system circuit is built with Raspberry pi. The Raspberry
pi is connected to various components such as motor, buzzer, ultrasonic
sensor and so on, each having their own functions.A particular range
is set around the area.checks weather any human or object enters that
range of particular area through ultrasonic sensor, if a person enters
to the restricted area then Raspberry PI send a signal to the ubidots
(IOT).which further sends the signal to the camera which recognizes the
person through face detection technology, weather he is an authorized
person or an intruder.If an intruder is detected then a signal is sent
back to the Raspberry pi through ubidots(IOT) which in turn turns on
the Buzzer, LED.

9
Chapter 5

Design and Implementation

Figure 5.1: Flowchart

10
Step1: Continuously sensing through ultrasonic sensor.

Figure 5.2:

Step2: Raspberry PI Send signal to ubidots(IOT) when some person


enters the Restricted area.

Figure 5.3:

11
Step3: Checks Weather a person is an intruder or an authorized.

Figure 5.4:

Step4: Produce signal if the person is an Intruder.

Figure 5.5:

12
5.1 Raspberry PI Code

import RPi.GPIO as GPIO


from ubidots import ApiClient
import time
GPIO.setmode(GPIO.BOARD)
trig=40
echo=38
led=36
bp=35
in1=23
in2=21
GPIO.setup(led,GPIO.OUT)
GPIO.setup(bp,GPIO.OUT)
GPIO.setup(in1,GPIO.OUT)
GPIO.setup(in2,GPIO.OUT)
GPIO.setup(trig,GPIO.OUT)
GPIO.setup(echo,GPIO.IN,pull_up_down=GPIO.PUD_UP)
api=ApiClient(token=’BBFF-qf4WcKRCFmUg3dve4mjd0F8Hpco46z’)
var=api.get_variable("6246846ffd67d3adfcd6f7be")
var1=api.get_variable("624692c7fd67d3adfd540d58")
var2=api.get_variable("6246a002ab3659af657144fd")
while 1:
response=var1.save_value({"value":0})
GPIO.output(trig,1)
time.sleep(0.02)
GPIO.output(trig,0)
while(GPIO.input(echo)==0):
start_time=time.time()
while(GPIO.input(echo)==1):
stop_time=time.time()

13
duration=stop_time-start_time
distance=(duration*34300)/2
print(distance)
time.sleep(1)
response=var.save_value({"value":distance})
if(distance<=20):
response=var1.save_value({"value":1})
GPIO.output(trig,0)
vr=var2.get_values(1)
d=vr[0][’value’]
print("var2",d)
if(d==1):
for i in range (10):
GPIO.output(led,1)
time.sleep(0.2)
GPIO.output(led,0)
time.sleep(0.2)
GPIO.output(bp,1)
time.sleep(0.2)
GPIO.output(bp,0)
time.sleep(0.2)

14
5.2 Face detection Code

from ubidots import ApiClient


import numpy as np
import cv2
api=ApiClient(token="BBFF-ySytORDhLzueAiu2IzVC2as1CwWI4e")
var1=api.get_variable("62a39547f4d91044d0c3a4ee")
var2=api.get_variable("62a39587f4d91044d210d41b")
face_cascade=cv2.CascadeClassifier("C:/Users\Ragib rs/Desktop/face re
cap=cv2.VideoCapture(0)
rec=cv2.face.LBPHFaceRecognizer_create()
rec.read("C:/Users\Ragib rs/Desktop/face recognition/train.yml")
x=0
y=0
response=var2.save_value({"value":0})
while 1:
vr=var1.get_values(1)
d=vr[0][’value’]
print("cheking")
if(d==1):
break
if(d==1):
while 1:
ret,img=cap.read()
gray=cv2.cvtColor(img,cv2.COLOR_BGR2GRAY)

faces=face_cascade.detectMultiScale(gray,1.5,5)
for(x,y,w,h) in faces:
cv2.rectangle(img,(x,y),(x+w,y+h),(255,0,0),2)
id,conf=rec.predict(gray[y:y+h,x:x+w])
if(conf<60):
if(id==1):

15
print("Raghib")
response=var2.save_value({"value":0})
break

else:
print("unknown")
response=var2.save_value({"value":1})
break

cv2.imshow(’img’,img)
if cv2.waitKey(1)==ord(’q’):
break

cap.release()
cv2.destroyAllWindows()

16
Chapter 6

Conclusion and scope for future


work

The announced comprehensive concept of museum security meets two


main requirements that distinguish its innovative nature, and confirms
a completely new approach to solving museum security, which is distin-
guished by its unconditional usefulness. Of no small importance is the
fact that the concept is based on the current Russian legislation in the
field of museum affairs and is suitable for implementation in any insti-
tution in which museum items are stored, regardless of the size, location
of the repository and expositions, composition of museum collections,
etc. The concept of integrated security provides for its main goal to
preserve the life, health of employees and visitors of the museum, with
the unconditional preservation of cultural values that are temporarily or
permanently stored in the museum. Taking into account the fact that
the field of application of the concept of museum security is the museum
space and a multitude of subjects, objects, processes, phenomena and
entities, forces and interactions, temporarily or permanently occurring,
located, located or acting in this space, it can be argued that the mu-
seum acts for the researcher as a system of relations ”cultural values
- visitors - employees” and a subsystem of more complex relationships
”museum - world around”.

17
Chapter 7

References

1. For Machine Learning

(a) https://www.w3schools.com/python/pythonml-getting-started.asp
(b) https://www.ncbi.nlm.nih.gov/books/NBK109715/

2. For IOT

(a) https://sites.google.com/site/v3viceiot/references
(b) https: //wso2.com/whitepapers/a-reference-architecture-for-the-
internet-of-things/

18

You might also like