0% found this document useful (0 votes)
12 views4 pages

Final Project-Proposal 11

Uploaded by

Nafiz Ahmed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views4 pages

Final Project-Proposal 11

Uploaded by

Nafiz Ahmed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Project Proposal

Title:
Advanced Security with Computer Vision: AI-Driven Access Control and Real-Time Alerts

1. Overview

This project focuses on developing an advanced security system powered by computer vision and AI.
It leverages a customized machine learning model to predict and identify individuals, granting or
denying access to sensitive and restricted areas. The system ensures enhanced security measures,
making it suitable for use in critical locations such as:

• Government administrative offices


• Industrial restricted zones
• Nuclear power plant cores
• Military and defense facilities
• Central banks
• Medical ICUs and other high-security zones

By automating access control and implementing real-time alert mechanisms, this project addresses
the growing demand for robust security systems in modern life.

2. Problem Statement

In the modern era, one of the fundamental challenges is the vulnerability of traditional security
systems, which often fail to prevent unauthorized access to sensitive areas. With increasing
digitalization and the growing reliance on technology, ensuring high-level security has become
essential. This project aims to minimize such security breaches by employing AI-powered solutions
that combine computer vision, facial recognition, and real-time alert systems.

3. Objectives

• Ensure High-Level Security: Utilize AI-driven facial recognition and computer vision for secure
access control.
• Reduce Costs: Minimize security and manpower costs by automating processes.
• Improve Efficiency: Guarantee seamless, error-free identification in sensitive government,
industrial, and medical zones.
• Real-Time Alerts: Provide instant notifications and alerts in case of unauthorized access
attempts.
4. Methodology

Technology Stack
• Programming Language: Python
• Libraries and Frameworks: OpenCV, YOLOv8, TensorFlow,
• Data Tools: Kaggle datasets, Numpy, Pandas

• AI Model: Custom machine learning model trained with a proprietary dataset

Software and Hardware Components

• Software: OpenCV, YOLOv8, TensorFlow, Face Recognition Library


• Hardware: Raspberry Pi, Arduino, Solenoid Door Lock, 12V DC Jack, 3-Channel
Relay Array, Alarm Buzzer, LED Lights, Breadboard, Jumper Wires
• Initial prototype: Laptop with built-in camera for input feed
• Industrial setup: Raspberry Pi microcontroller with external Raspberry pi camera
module integration
Integration Plan

• Raspberry Pi (High-Level Microcontroller): Handles AI processing and access


control.
• Arduino (Low-Level Microcontroller): Controls hardware components like solenoid
locks, LED indicators, and alarm buzzers.
• Real-Time Alerts: Integrated alarms, red/green LED lights, and real-time monitoring
dashboards for notifications.
System Architecture

1. Step 1: Capture real-time video/image input using a laptop or industrial cameras.


2. Step 2: Process the input through AI algorithms for facial recognition and person
identification.
3. Step 3: Compare the identified individual with an encrypted access control
database.
4. Step 4: If unauthorized access is detected, trigger alarms and notifications.
5. Step 5: Automatically unlock the solenoid door lock for authorized personnel or
keep it locked for unauthorized individuals.

5. Budget and Resources

• Resources Needed: Hardware components (as listed below)


• Cost Breakdown:
SL NO. COMPONENTS Quantity Unit Cost(BDT) Total Cost References

Raspberry Pi 3 Robodocbd.co
1 1 11990 11990
Model B+ m
Raspberry Pi Robodocbd.co
2 1 959 959
Camera Module m

3 Arduino Uno R3 1 1050 1050 RoboticsBD

Solenoid Stainless Steel Door Robotechbdco


4 1 730 730
lock m
5 1 Channel 3 V Relay
1 160 160 RoboticsBd
board module

6 DC Jack 1 40 40 toolboxBD.com
7
Boost Module 1 60 60 Electronics.com.bd

12 2A Power Electronics.com
8 1 120 120
Adapter .bd

9 LED 4 5 20

10 Breadboard 1 150 150 RoboticsBd

11 Resistors 5 5 25
2 set
12 Zamper Wires 50 100

13 Buzzer 1 20 20 RoboticsBD

Total = 15424

(NB for reducing cost we will use direct Laptop feed and laptop camera instead of Raspberry Pi 3
Model B+ and Raspberry camera Module)

6. Significance and Efficiency


This project holds immense significance in today’s security landscape. By integrating AI and
computer vision, it provides an efficient, automated, and cost-effective solution to address the
growing risks of security breaches. The combination of technology and hardware ensures robustness,
scalability, and reliability for sensitive applications.
7. Expected Outcomes

• Enhanced Security: Significant improvement in restricting unauthorized access in critical


zones.
• Cost Savings: Reduced dependency on human security personnel, resulting in long-term
cost efficiency.
• Real-Time Response: Instant alerts and monitoring for enhanced safety measures.
• Scalability: Potential for deployment in various sectors, including government, defense,
healthcare, and banking.

Concept Image

Below is a visual representation of the system in action:

• Top Left: Facial recognition processing a person’s input.


• Top Right: Real-time monitoring dashboard displaying alerts.
• Bottom Left: Green LED indicating authorized access.
• Bottom Right: Red LED and buzzer indicating unauthorized access.

You might also like