Seminar Report Format 2024aJIT
Seminar Report Format 2024aJIT
Submitted By
MONTH - YEAR
i
ACKNOWLEDGEMENT
And finally thanks to Prof. Chitta Ranjan Mohanty, Principal, PMEC for his
continued efforts for enhancing the quality in everything that happens at PMEC. This
report is a dedicated contribution towards that greater goal.
ii
TABLE OF CONTENTS
1. INTRODUCTION
2. OBJECTIVES
3. ARCHITECTURE
4. PASSIVE INFRARED SENSOR
5. STORAGE PROCESS
6. SURVEILLANCE
7. CHALLENGES
8. CONCLUSION
9. REFERENCE
LIST OF FIGURES
iii
iv
TOPIC NAME USED AS HEADER
1. INTRODUCTION
5
TOPIC NAME USED AS HEADER
COAP etc. Internet of Things treat each sensor as a “virtual object” with an abstracted
hardware layer.
OBJECTIVES
To store and record the data whenever an event occurs which reduces lot of
unnecessary data to be stored in ideal time and also to decrease power consumption
as system works. To uploads the data directly in to the cloud based on the threshold
limit set by us. Provide seamless interactions and personalized services to users.
Utilize data analytics to predict failures and schedule maintenance, reducing
downtime. Promote environmentally friendly practices through efficient resource
management A security camera records and stores data on 24X7 basis but most of
the data recorded by it during the ideal time (when the presence of human and
motion of any other living beings is not there) is not useful to us, this leads to a lot of
waste utilization of memory and is to be either manually deleted by the operator
repeatedly and has to be uploaded to cloud again and again, since this type of
classical system needs a lot of memory and manual work, as both of them are time
consuming and costlier (pay for manual labour and storage space).
If the thieves attack the secured area and destroy the local storage also then there
will be no evidence to catch thieves and the entire purpose of security system is not
fully utilized. Thus we propose an intelligent security system to solve this problem
with increased efficiency. The objective of this work is designing a novel system for
security cameras in IoT networks with event (presence of living being or motion of
thing) driven system to store and record the data whenever an event occurs which
reduces lot of unnecessary data to be stored in ideal time and also to decrease
power consumption as system works only when driven by an event. This system
uploads the data directly in to the cloud based on the threshold limit set by us. By
this way as data is already in cloud even thief’s destroy the local storage we can get
it from cloud with the event log and can be analysed to catch them.
6
TOPIC NAME USED AS HEADER
ARCHITECTURE
1.Actuators:
Control Unit:
Communication Module:
2. Data Management
Edge Computing:
Cloud Storage:
o Store and analyze data from multiple devices for historical records,
analytics, and alert management.
3. User Interface
o Users can monitor real-time feeds, receive alerts, and control devices
remotely. The interface should be intuitive and accessible.
4. Security Features
Data Encryption:
7
TOPIC NAME USED AS HEADER
Low-Power Components:
Power Management:
o Implement sleep modes for devices when they’re not in use, reducing
energy consumption.
o Interoperability:
o Installation Guide:
o Remote Diagnostics:
o Home Security:
o Business Security:
8
TOPIC NAME USED AS HEADER
Fig. 1. Block
diagram of
proposed
security
system
In this block air sensor is used to detect the activity surrounding (focal area of) the
camera [14], similar type of work is adopted by us to detect the presence of living
beings in the camera focal area and is used to trigger the camera and other sensor
nodes in network which saves a lot of energy during ideal time (i.e. system is
switched on only when needed) and also decreases the length of video by which we
can decrease the storage space needed as less recording time, because of time
stamping video is easily accessible. PIR sensors are more complicated than many of
the other sensors explained in these tutorials (like photocells, FSRs and tilt switches)
because there are multiple variables that affect the sensors input and output. The
PIR sensor itself has two slots in it, each slot is made of a special material that is
9
TOPIC NAME USED AS HEADER
PIR SENSOR
PIR sensor housed in a hermetically sealed metal can to improve
noise/temperature/humidity- immunity. There is a window made of PIR transmissive
material (typically coated silicon since that is very easy to come by) that protects the
sensing element. Behind the window are the two balanced sensors [15]. This sensor
produces an output voltage of 3.3v which is used to drive the load (the security
system).
1.
1.Detection Mechanism:
PIR sensors work by detecting changes in infrared radiation levels. All objects emit
infrared radiation, and the PIR sensor senses these emissions.
o When a warm body (like a human) moves across the sensor's field of
view, it changes the infrared radiation levels detected by the sensor.
The PIR sensor has two zones of detection (typically called “fresnel
lenses”) that allow it to detect the movement of warm objects within
its range.
2. Components:
o Pyroelectric Sensors: Detect the changes in infrared radiation.
o Fresnel Lens: Focuses the infrared signals onto the pyroelectric
sensors, enhancing sensitivity and range.
o Amplifier Circuitry: Amplifies the sensor signals to trigger an output
.
3. Specifications
3. Applications
Security Systems: Commonly used in alarm systems to detect intruders.
Lighting Control: Automatically turn on lights when motion is detected.
Home Automation: Integrated into smart home systems for automation
based on occupancy.
Energy Efficiency: Used in HVAC systems to optimize heating and cooling
based on occupancy.
10
TOPIC NAME USED AS HEADER
Figure 2: A
PIR Sensor
The lens used here is not really doing much and so we see that the two slots can
'see' out past some distance (basically the sensitivity of the sensor). When the sensor
is idle, both slots detect the same amount of PIR, the ambient amount radiated from
the room or walls or outdoors. When a warm body like a human or animal passes by,
it first intercepts one half of the PIR sensor, which causes a positive differential
change between the two halves.
The part of PIR sensor and triggering circuit is as shown in Figure 4. The PIR led in
Figure 4 once detects the thermal waves of a certain threshold (i.e. living being) it
will switch on the BC547 transistor. The voltage will be transferred to the NO (open
of relay) and this diode will trigger the positive voltage and load is connected to the
AC mains thus camera recorder and the sensory network will be switched on, the
recording starts and the data is stored. If PIR sensor has sensed null (below threshold
i.e. no human being) it will stop giving sufficient voltage at Op pin and thus transistor
BC547 is switched off NO will get to negative supply voltage thus the relay open and
since no closed connection mains will be switched off. So the camera stops recording
and all sensory network will also be switched off
11
TOPIC NAME USED AS HEADER
Storage Process
pecifically designed to handle time-stamped data from IoT devices (e.g., InfluxDB,
TimescaleDB). These databases are optimized for querying and storing time-series
data efficiently.
NoSQL Databases:
Flexible schema design makes them suitable for unstructured or semi-structured IoT
data (e.g., MongoDB, Cassandra).
Relational Databases:
Traditional SQL databases can be used for structured data but may face scalability
challenges for massive IoT datasets.
APIs:
Application Programming Interfaces (APIs) facilitate data access for applications and
users, enabling retrieval and analysis of stored data.
Data Querying:
Use query languages suitable for the chosen storage solution (e.g., SQL for relational
databases, query builders for NoSQL) to fetch specific datasets.
12
TOPIC NAME USED AS HEADER
It stores the recorded data and we have used the method [3] which is a motion
estimation hardware model that is suitable to implement the circuit and cloud
uploading.
13
TOPIC NAME USED AS HEADER
Surveillance
Cameras:
IP Cameras: Connect via the internet, offering high-resolution video feeds and
remote access.
PTZ Cameras (Pan-Tilt-Zoom): Allow users to control the camera's direction and
zoom remotely for a detailed view.
Sensors:
Protocols:
Various communication protocols (e.g., Wi-Fi, Zigbee, LoRa) are used to transmit
data from devices to a central server or cloud storage.
Real-Time Streaming:
14
TOPIC NAME USED AS HEADER
Role-Based Access:
Figure 4:Pre-
processed
video frame
15
TOPIC NAME USED AS HEADER
Challenges
The implementation of the interface for Raspy-Berry pi with a smart camera and web
server for data collection and data storage in the cloud can be done by python
programming script as the python script is easier and widely available for all
platforms with Inter-portability across different devices and platforms
Major problem faced by a security camera in IoT networks like more power
consuming, data storing, need for storing long length videos, uneasy access of video
data.
Data Security: Protecting stored data from unauthorized access is critical, especially
in applications involving personal spaces or sensitive environments.
16
TOPIC NAME USED AS HEADER
5. CONCLUSION
The recording length decrease which in turn decreases the required space for the
video storage, decreases the length of video, power consumption.
his paper a special PIR motion detection sensor has been used to trigger security
system, camera recorder and sensor network during the presence of living beings and
any movement of other activity. So the recording length decrease which in turn
decreases the required space for the video storage, decreases the length of video,
power consumption and also due to time stamping on each frame during pre-
processing makes the video more accessible to the user, saves lot of power, storage
space and also automatic uploading of data into cloud storage makes the system more
efficient. As the IoT era is being run only M2M (Machine to Machine)
Communication occurs this type of system can be put in living being restricted areas
for both safety and security by adding a piezo electric buzzer with Wi-Fi to the system
as an alarming sound for detection of activity of living being in living being restricted
areas.
17
TOPIC NAME USED AS HEADER
REFERENCE
[1] A. Whitmore et. al. “The Internet of Things—A survey of topics and trends” in
Information Systems Frontiers, Volume 17, Issue 2, pp 261– 274, April 2015.
[2] S. Madakam et. al. “Internet of Things (IoT): A Literature Review” in Journal of Computer
and Communications, Volume 3, pp 164-173, 2015
[3] Martin Strohbac et. al. “Towards a Big Data Analytics Framework for IoT and Smart City
Applications” in Modelling and Processing for NextGe
[4] . Calabrese, M. Colonna, P. Lovisolo, D. Parata, and C. Ratti, “RealTime Urban Monitoring
Using Cell Phones: A Case Study in Rome,” IEEE Trans. on Intelligent Transportation Systems,
vol. 12, no. 1, pp.141– 151, March 2011.
[5] A. Sevincer, A. Bhattarai, M. Bilgi, M. Yuksel, and N. Pala, “Lightnets: smart lighting and
mobile optical wireless networks –A Survey,” IEEE Communications Surveys & Tutorials, vol.
15, no. 4, pp.1620–1641, 2013
18
TOPIC NAME USED AS HEADER
19