You are on page 1of 55

ARealtimeEmbeddedImageIdentificationandAccessControlSystem

UsingEmail

ABSTRACT

Internetofthingsisthecorrespondenceofanythingwithanyotherthings.This
paperplanstoscreenandcontrolthehomeboltutilizingtheinternetofthings.Inaddition
theinternetofofthingsisutilizedremotelytoseetheactionandgetwarningwhenthereis
anearnessofclosetoIRsensorwithnophysicalcontactorwheneverthepersonpressthe
doorbellcameragettriggeredandcapturethepersonimageandsenttoemail.Theowner
willgetthenotificationthatsomeoneisnearthedoorthenifneedthatpersoncanenterthe
homethenhewillsendGRANTEDmessagetoaccessthedoororelsehewillsendALERT
messageandthebuzzerwillringtoalerttheneighbororthepersoninthehome,asthat
person is try to enter the house forcefully .Therefore advantage like these make the
applicationidealformonitoringhomesinabsence.
CONTENTS

SL.NO PARTICULARS PAGE.NO


1. PREAMBLE
1.1.INTRODUCTION
1.2.AIM
1.3.MOTIVATIONANDOBJECTIVE
1.4.IOTBASICS
1.5IRSENSOR
1.6HOWTHEIDEAOFSECURITYHASCHANGED
INTHEPRESENTDAYHOME
1.7.SPECIFICATION
1.8STRUCTUREOFTHEREPORT
2. LITERATURESURVEY
3. PROPOSEDMETHOD
3.1.WORKING

3.1FLOWCHART
4. HARDWAREANDSOFTWAREDESCRIPTION
4.1HARDWARE
4.1.1.Raspberrypi
4.1.2TCRT5000IRsensor
4.1.3 Webcam
4.1.4.Pushbutton
4.1.5. DCmotor
4.1.6.Piezobuzzer
4.1.7 L293D
4.2.SOFTWARE
4.2.1.RaspbianOS
5. RESULTSANDDISCUSSION
6. ADVANTAGESANDAPPLICATIONS
6.1.ADVANTAGES
6.2.APPLICATIONS
7. CONCLUSIONANDFUTURESCOPE
REFERENCES
LISTOFFIGURES

FIGURE.NO PARTICULARS PAGE.NO

Fig.1.1 InfraredLED
Fig.1.2 IRreceiverorphotodiode
Fig.1.3 Opamp
Fig.1.4 WorkingofIRsensor
Fig.3.1 Blockdiagramofsmartbell
Fig.3.2 SmartbellusingIoT
Fig.3.3 Flowchart
Fig.4.1 Raspberrypi3
Fig.4.2 blockdiagramofraspberrypi
Fig.4.3 TCRT5000_IRsensor
Fig.4.4 WebcamC170
Fig.4.5 Pushbutton
Fig.4.6 DCmotor
Fig.4.7 Piezobuzzer
Fig.4.8 L293D
Fig.4.9 PindiagramofL293D
Fig.4.10 FormattingSDcard
Fig.4.11 FlashingSDcard
Fig.5.1 Capturingtheimageoftheperson
Fig.5.2 Emailnotification
Fig.5.3 Dooraccesstothepersonbyemail
Fig.5.4 Alertsentbyemail
Fig.6.1 Advantageofusingasmartbell
LISTOFTABLES

TABLE.NO PARTICULARS PAGE.NO

Table4.1: comparisonofdifferentraspberrypi

Table4.2: PinconnectionofTCRT5000toaraspberrypi3

Table4.3: specificationofC170webcam

Table4.4: Pinconnectionofpushbuttontoraspberrypi3

Table4.5 pinconnectionofbuzzertoraspberrypi
ACRONYMS

IR : Infrared

PC : Personalcomputer

DC : Directcurrent

IP : Internetprotocol

IoT : InternetofThings

LED : Lightemittingdiode

HDMI : Highdefinitionmultimediainterface

VGA : Videographicsarray

CPU : Centralprocessingunit

ARM : AdvanceRISCmachines

RISC : Reducedinstructionsetcomputer:

GPIO : Generalpurposeinput/output

USB : Universalserialbus

LAN : Localareanetwork

RAM : Randomaccessmemory
Chapter 1

PREAMBLE

1.1 INTRODUCTION

The internet of things (IoT) is used in industry, security purposes, hospital and is also
progressed towards the media. The idea of home security was been around in 1970s. Yet
the home security desiring would be change with the individual perspective or the client
desire and the home security attempted to give advantageous and safety measure
whenever something went wrong near the door and we can get alert and we can also
monitor the home even when we are not in home. It is a keyless process that is when we
forget the key or lost the key we have to make a duplicate key which will make the person
to wait until he get the duplicate key and hence it will make a waste of time.

The venture thought is to outline a mechanized gadget for closing and opening of
the entryway as these days a gadget will give a great measure of human working, in
addition to, the people are more inclined to blunders and in serious conditions the
likelihood of mistake while, a computerized gadget could work with industriousness,
flexibility and with just a zero mistake. . The framework is outlined with the end goal that
the movement of the client will be caught from the camera and the client will be
identified and after that exclusive he will bolt or open the entryway.

The framework will be intended to a security reason. When the person is near the
range of IR sensor or when he press the doorbell the camera get activated and capture the
image and it will sent to email id of the owner, the owner get notification and he/she will
see that person is known or unknown by that bases he will send message as GRANTED
or ALERT for door access or buzzer ring respectively. This make the home safety and
advantageous.
1.1.1 Embedded Systems
An embedded system is a special purpose computer system that is designed to
perform very small sets of designated activities. Embedded systems date back as early as the
late 1960s where they used to control electromechanical telephone switches. The first
recognizable embedded system was the Apollo Guidance Computer developed by Charles
Draper and his team. Later they found their way into the military, medical sciences and the
aerospace and automobile industries.
Today they are widely used to serve various purposes like:

Network equipment such as firewall, router, switch, and so on.


Consumer equipment such as MP3 players, cell phones, PDAs, digital cameras,
camcorders, home entertainment systems and so on.
Household appliances such as microwaves, washing machines, televisions and so on.
Mission-critical systems such as satellites and flight control.
The key factors that differentiate an embedded system from a desktop computer:
They are cost sensitive.
Most embedded systems have real time constraints.
There are multitudes of CPU architectures such as ARM, MIPS, PowerPC that are
used in embedded systems. Application-specific processors are employed in
embedded systems.
Embedded Systems have and require very few resources in terms of ROM or other I/O
devices as compared to a desktop computer.

Types of Setup
Embedded systems generally have a setup that includes a host which is generally a
personal computer, and a target that actually executes all the embedded applications. The
various types of host/ desktop architectures that are used in embedded systems are:
Linked Setup:
In this setup, the target and the host are permanently linked together using a physical
cable. This link is typically a serial cable or an Ethernet link. The main property of this setup
is that no physical hardware storage device is being transferred between the target and the
host. The host contains the cross-platform development environment while the target contains
an appropriate boot loader, a functional kernel, and a minimal root file system.
Removable Storage Setup:
In the removable setup, there are no direct physical links between the host and the
target. Instead, a storage device is written by the host, is then transferred into the target, and is
used to boot the device. The host contains the cross-platform development environment. The
target, however, contains only a minimal boot loader. The rest of the components are stored
on a removable storage media, such as a Compact Flash IDE device, MMC Card, or any other
type of removable storage device.
Standalone Setup:
The target is a self-contained development system and includes all the required
software to boot, operate, and develop additional software. In essence, this setup is similar to
an actual workstation, except the underlying hardware is not a conventional workstation but
rather the embedded system itself. This one does not require any cross-platform development
environment, since all development tools run in their native environments. Furthermore, it
does not require any transfer between the target and the host, because all the required storage
is local to the target.
1.1.2 Operating Systems
In an embedded system, when there is only a single task that is to be performed, then
only a binary is to loaded into the target controller and is to be executed. However, when
there are multiple tasks to be executed or multiple events to be handled, then there has to be a
program that handles and prioritizes these events. This program is the Operating System
(OS), which one is very familiar with, in desktop PCs.

Various Operating Systems:


Embedded Operating Systems are classified into two categories:

Real-time Operating Systems (RTOS) :


Real Time Operating Systems are those which guarantee responses to each event
within a defined amount of time. This type of operating system is mainly used by time-critical
applications such as measurement and control systems. Some commonly used RTOS for
embedded systems are: VxWorks, OS-9, Symbian, RTLinux.

2. Non-Real-time Operating Systems:


Non-Real Time Operating Systems do not guarantee defined response times. These
systems are mostly used if multiple applications are needed. Windows CE and PalmOS are
examples for such embedded operating systems.
Why Linux?
There are a wide range of motivations for choosing Linux over a traditional embedded OS.
The following are the criteria due to which Linux is preferred:

Quality and Reliability of Code:


Quality and reliability are subjective measures of the level of confidence in the code
that comprises software such as the kernel and the applications that are provided by
distributions. Some properties that professional programmers expect from a quality code
are modularity and structure, readability, extensibility and configurability. Reliable code
should have features like predictability, error recovery and longevity. Most programmers
agree that the Linux kernel and other projects used in a Linux system fit this description of
quality and reliability. The reason is the open source development model, which invites many
parties to contribute to projects, identify existing problems, debate possible solutions, and fix
problems effectively.

Availability of Code:
Code availability relates to the fact that the Linux source code and all build tools are
available without any access restrictions. The most important Linux components, including
the kernel itself, are distributed under the GNU General Public License (GPL).Access to
these components source code is therefore compulsory (at least to those users who have
purchased any system running GPL-based software, and they have the right to redistribute
once they obtain the source in any case).
Code availability has implications for standardization and commoditization of
components, too. Since it is possible to build Linux systems based entirely upon software for
which source is available, there is a lot to be gained from adopting standardized embedded
software platforms.

3Hardware Support:
Broad hardware support means that Linux supports different types of hardware
platforms and devices. Although a number of vendors still do not provide Linux drivers,
considerable progress has been made and more is expected. Because a large number of
drivers are maintained by the Linux community itself, you can confidently use hardware
components without fear that the vendor may one day discontinue driver support for that
product line. Linux also provides support for dozens of hardware architectures. No other OS
provides this level of portability.
Typical architecture of an Embedded Linux System
Hardware
Linux normally requires at least a 32-bit CPU containing a memory management unit
(MMU).A sufficient amount of RAM must be available to accommodate the system. Minimal
I/O capabilities are required if any development is to be carried out on the target with
reasonable debugging facilities. The kernel must be able to load a root filesystem through
some form of permanent storage, or access it over a network.

Linux Kernel
Immediately above the hardware sits the kernel, the core component of the operating
system. Its purpose is to manage the hardware in a coherent manner while providing familiar
high-level abstractions to user-level software. It is expected that applications using the APIs
provided by a kernel will be portable among the various architectures supported by this kernel
with little or no changes. The low-level interfaces are specific to the hardware configuration
on which the kernel runs and provide for the direct control of hardware resources using a
hardware-independent API. Higher-level components provide the abstractions common to all
UNIX systems, including processes, files, sockets, and signals. Since the low-level APIs
provided by the kernel are common among different architectures, the code implementing the
higher-level abstractions is almost constant, regardless of the underlying architecture.
Between these two levels of abstraction, the kernel sometimes needs what could be called
interpretation components to understand and interact with structured data coming from or
going to certain devices. Filesystem types and networking protocols are prime examples of
sources of structured data the kernel needs to understand and interact with in order to provide
access to data going to and coming from these sources.

Applications and Libraries


Applications do not directly operate above the kernel, but rely on libraries and special
system daemons to provide familiar APIs and abstract services that interact with the kernel on
the applications behalf to obtain the desired functionality. The main library used by most
Linux applications is the GNU C library, glibc. For Embedded Linux systems, substitutes to
this library that are much less in size than glibc are preferred.

1.2 AIM
This project will create a smart doorbell system so that when a visitor is in the
range of IR sensor or when he/she clicks on the button, it makes a ring, a camera takes
a picture and sent to a email and through the email itself we can control the door access.

1.3 MOTIVATION AND OBJECTIVE


Including IoT in our lives has many favorable position helping people, business
and on regular premise. Safety, securities are a few structures in which new ideas are
developing in IoT. It can be extremely useful to coordinate IoT into security framework
and this venture expects to incorporate IoT in security framework to detect the person, for
instance each day when you are grinding away you will have the capacity to screen and
get notice if any action occurs at home. This framework has the capacity to close and
open entryways over the web empowering keyless section and takes care of the issue of
losing a key

1.4 IoT BASICS


As per the McKinsey report "Disruptive technology: Advances that will change
life, business, and the worldwide economy", the Internet of things (IoT) is one of the
main three innovative headways of the following decade (together with the versatile web
and the computerization of learning work). The report goes ahead to state that "The
Internet of Things is such a general idea, to the point that it is a test to try and envision all
the conceivable courses in which it will influence business, economies, and society."

The thought is that not just youre PC and your cell phone can converse with each
other, yet additionally every one of the things around you. From associated homes and
urban communities to associated autos and machines to gadgets that track a person's
conduct and utilize the information gathered for new sort of administrations.

"The Internet of things will include a gigantic form out of associated gadgets and
sensors woven into the texture of our lives and organizations. Gadgets profoundly
implanted in broad daylight and private spots will remember us and adjust to our
prerequisites for comfort, wellbeing, streamlined business, amusement, training, asset
protection, operational productivity and individual prosperity.", as indicated by Intel's
report "Ascent of the Embedded Internet".

1.5 IR SENSOR
IR sensor Sensors are essentially electronic gadgets which are utilized to detect
the progressions that happen in their environment. The change might be in shading,
temperature, dampness, sound, warm and so forth. They sense the change and work as
needs be.

Types of IR Sensors

o passive IR sensor
o Active. IR sensor

Passive infrared sensors are fundamentally Infrared detectors. Infrared sensors


don't utilize any infrared source and identifies vitality transmitted by obstacles in
the field of view.

Active infrared sensors have two components: infrared-source and infrared


detectors. Infrared sources has a LED or infrared laser diode. Infrared detector has
photodiodes or phototransistors. The vitality produced by the infrared source is
reflected by a protest and falls on the infrared detector. Emitter transmits the IR
beams and detector identifies it.

Active IR sensor has 3 components


IR transmitter(LED)
IR receiver (photodiode)
Op-amp

IR Transmitter
Infrared Transmitters are light emitting diode which produces infrared radiations.
Thus, they are called IR LED's. as IR LED is similar to the original LED, but the
radiation produced by it is not visible to human eye.

The picture of an Infrared LED is demonstrated as follows

Fig1.1: infrared LED

IR Receiver
Infrared receivers are likewise called as infrared sensors as they distinguish the
radiation from an IR transmitter. IR receiver comes as photodiodes and phototransistors.
Infrared Photodiodes are not the same as would be expected photo diodes as they
distinguish just infrared radiation.

The photo of an IR receiver or a photodiode is demonstrated as follows.

Fig1.2: IR receiver or photodiode

Op-amp
Op-Amp represented to operational amplifier. It is DC-coupled high pick up
enhancer with a differential information sources and to a single yield. Commonly the
yield of operation amplifier is guarded by either negative input or positive criticism.
Because of the way that it plays out a few operations like expansion, subtraction,
augmentation, mix and so forth, it is named as operational amplifier. It has two data
sources pins and one output..

Fig1.3: op-amp
LM358M is universally useful for a Dual Operational Amplifier (Op-Amp). the
working of an Op-amp is truly of no utilization to us, as we are not utilizing it has an
amplifier and all things considered, so we might be discussing how we utilize it here in
the IR sensor circuit, what it does is yet a very little about how it does is. So essentially,
we use it to look at two voltages, one is settled and other is always alternate fluctuates
with an ecological parameter. In the event that the controlled voltage is higher than that of
the settled voltage, at that point the IC should provide a one yield, and in the event that it
is lower than the settled voltage, at that point it should give another yield. Along these
lines, we see that the IC provide a two sorts of yields, which we configuration to 5 Volts
and a 0 Volts.

Principal of working
The principle of IR sensor functioning as an Object or a human Detection Sensor can be clarified
by appropriate figure. An IR sensor comprises of an IR LED and an IR Photodiode; together they
are called as Photo Coupler or Opto Coupler

Fig 1.4: working of IR sensor

From the figure 1.4 it show that when the object comes near to the sensor IR
transmitter produce a radiation to that object and come of the radiation is reflected back to
the IR receiver. In this way IR sensor is use to sense whenever there is any presence of
object or a human near to that sensor. Normally IR sensor range would be up to 6cm with
our perspective or for an accuracy purpose we can reduce the value of range of IR sensor.
1.6 HOW THE IDEA OF SECURITY HAS CHANGED IN THE
PRESENT DAY HOME
"The security framework incorporates recognizing a gatecrasher attempting to
access the home, alarming the property holder about the interruption or interruption
endeavor, keeping the interloper from accessing the home, and assembling or gathering
proof with respect to the interruption so the perpetuators could be conveyed." The
headway of innovation has added to the changing idea of security in current homes. It has
transformed from a key security idea to actualizing refined security frameworks by
utilizing cameras, pushbutton, IR sensors, cautions, quiet alerts, and so forth. By
interfacing current homes to the Web which is extremely prominent today, clients can get
to and control their homes remotely whenever and from anyplace on the planet.

We need to give a more extensive clarification or intending to the expression


"gatecrasher" in our definition when we join homes with the Web and pervasive
registering, additionally considering the quantity of gadgets utilized as a part of home
mechanization. In conventional homes, gatecrashers could just take or debilitate a home
in the event that they are in physical closeness to the home. By interfacing a home to the
Web, a gatecrasher or assailant can get to the home from anyplace on the planet whenever
with a Web association, and with cameras in the home they can watch out for a home's
tenants. So recognizing and protecting against such interruptions are greatly troublesome,
even without the additional security defects of the advances actualized at home.

In short, the security at home we consider gatecrasher in the conventional sense,


as cheats attempting to soften up by picking the bolt or prying opening a window, and
once in a while consider complex hoodlums who are great with innovation or lawbreakers
who work with programmers. Our idea of gatecrasher needs to develop from the
conventional sense keeping in mind the end goal to represent gadget vulnerabilities. A
great deal of research has gone into distinguishing and averting such gatecrashers by
utilizing cautions, infrared sensors, or contact sensors, however next to no work has gone
into recognizing and avoiding innovatively talented interlopers.
1.7 SPECIFICATIONS
The hardware and the software tools essential for implementing this project are
given below:

SOFTWARE
REQUIREMENT:

o Raspbian OS


HARDWARE
REQUIREMENT: o
Raspberry pi 3
o IR sensor
o Push-button
o Webcam
o Piezo-buzzer
o DC motor

1.8 STRUCTURE OF THE REPORT



Chapter 1: Preamble it includes introduction, aim, motivation and
objective, about IR sensor, how the idea of security has changed in the
present day home, specification of hardware and software.

Chapter 2: Literature survey it describes the literature study which
consists of previous works.

Chapter 3: Proposed method this part of the section explains the working
of the module and its block diagram.

Chapter 4: Hardware and software description it consist of basic details
of the hardware and software used in the project.

Chapter 5: Results and discussion It includes outcomes of the proposed
module.

Chapter 6: Advantages and applications it include the applications and
advantages of this method.

Chapter 7: Conclusion and Future scope this section includes conclusion
and future work of the project.

Chapter 2

LITERATURE SURVEY

Bhalekar Pandurang et aL
This paper aims to a security. It will performs whenever the person ring the bell
camera get activated and camera will catch a video of that standing near the gateway that
will be enrolled to a client who is far away from home via a Bluetooth he/she will
recognize that person if that person is known to the owner, the owner will impart the way
to that person for a specific time. This will provide an awesome security for the home
with a human intercession. These frameworks also work to an extent that the movement
of the person can be captured from the camera and the owner will recognize and after that
he will provide a door access. Our smart home framework will work over remote system
like Bluetooth.

Issues of utilizing Bluetooth for home computerization:


Bluetooth has a communication range up to a 100m in an ideal condition. But for
the home security in concern it requires a long range.
Bluetooth will consume a high power thus the device battery get down and the
device may require frequently change of the battery.
Bluetooth is used on occasion where there is less security concerned.

T.Venkat et al.,[3]
Narayana Rao et al proposed automatic security home with message empowered
feature. The doorbell assumes a vital part in home security; a proficient and steady
framework must be produced for better security which could be gotten to bring down
cost. In this day and age, there are numerous doorbells frameworks performing diverse
operations. This paper center on IOT related programmed doorbell frameworks which are
intended to ring the bell naturally when a guest approaches the entryway. On the off
chance that the guest remains for more than a indicated time traverse without the
entryway being opened, an SMS will be sent to an enrolled versatile number of the house
part and the reaction of the house part (i.e. as a SMS) will be shown on a LCD screen set
adjacent to the entryway so that the guest can read the SMS.
U. Saeed et al.,[2]
This paper aims to control the home by SMS and it also used a java based
application in phone. The java based application can be login with an appropriate
username and password and we have to select the room/floor/ building and through the
application he will send SMS to the GSM model and the GSM will receive and passes
where we need to control and perform an appropriate action. It uses a 4 digital pass key
for security at the door. If the person is in the range of IR sensor he will get notification if
he feels to access the door he will send a passkey so that the person can enter the home.

Alheraish et al. ,[1]


This paper aims for a security concern by utilizing SMS based. This paper. This
frame allows us to detect illegal attackers who are trying to enter the home forcefully by
monitoring the home entryway by utilizing infrared sensor. The door access is by 4 digital
passkeys which can be set by using the keypad or by using SMS form by using an owner
number which is enrolled. In this paper it also controls the lights in home remotely by an
owner number. If proposes a home the person is in the range of IR sensor the owner get
message that some is near to the door if owner feel to share the passkey he will send the
passkey by SMS which will display on LCD which is placed outside the home by that that
person can enter the home.

Security worries about SMS-based home security frameworks:

The 4 digital security passkeys which were used by A.Alheraish and U.saeed is a
less security because an attacker may stand outside and peep through to take a
passkey. So one cant anticipate that owner must be conscious every time that
some has entered the passkey. So there will a possible that the owner might be
careless.
By using the passkey there will be a chance of hacking the keypad.
By a SMS based method we cannot come to known that who is at the door hence
this make a high risk.
In paper T.venkat et al. Is also a home security concerned where he will get the
SMS that someone is waiting at the door please leave an SMS. This has a
drawback of the guest should wait until he comes and open the door.
Chapter 3

PROPOSED DESIGN METHODOLOGY


Home security control framework has turned out to be key in day by day life. The
plan and advancement of a home security framework, in view of human face
acknowledgment innovation and remotely observing innovation, to affirm guest
personality and to control entryway openness has been accounted for in this paper. This
paper portrays about the execution and arrangement of remote control framework and
availability in to a home situation for validated individuals as it were.

Host side

Fig3.1 block diagram of smart bell


Doorbell is connected to a raspberry pi. Whenever someone come to home and
press button the buzzer starts to transmit music. This causes an interrupt to raspberry pi.
IR sensor is also connected to GPIO. The IR sensor also generates a high voltage
whenever it detects presence of any human. Raspberry pi is always scanning for IR sensor
input or calling bell input. In the algorithm it is defined that if any visitor comes in and
press the bell or when IR senses the human detection means the interrupt happened it is a
common situation and indicating that a visitor has arrived .When the system received any
one of the interrupts raspberry pi take a snap shot of the person through webcam.
Raspberry pi send the snapshot to the email and through the email itself he can control the
door access if he wishes that person can enter the home he will send GRANTED
message through the email or if that person is gate crasher then he send ALERT
message and the buzzer will ring to alert.

3.1 WORKING
The block diagram of smart door bell is shown in figure. It consist of raspberry pi
which is heart of the project used as a controller, IR sensor used sense the person in the
range, pushbutton which is used as a doorbell, buzzer is used to make sound when the
person in the range and when the button is pressed, camera is used to capture the image of
the person when buzzer makes sound. DC motor is used to open and close the door.

Sl.no Name Sl.no Name


1 Camera 2 Monitor
3 CPU 4 Regulated Power supply

5 HDMI to VGA converter 6 Buzzer


7 Raspberry pi 8 IR sensor
9 Pushbutton 10 L293D

11 Dc motor
Fig3.2: smart bell using IoT

Various steps involved in this process they are:

1. When the person is the range of IR sensor or when he press


the pushbutton
2. Camera activated
3. Image capture
4. Image is sent to email through raspberry pi by Wi-Fi
5. If the person is known send GRANTED to access the door else
send ALERT message
3.2 FLOWCHART

Fig 3.3: flowchart


Chapter 4

HARDWARE AND SOFTWARE DESCRIPTION

4.1 HARDWARE
4.1.1 Raspberry pi

Raspberry pi is a single board PCs developed in the United Kingdom to the


instructing of essential software engineering in schools and in creating nations. The raspberry
pi has a Broadcom BCM2835 SoC as a processor. The raspberry pi has become a popular
now and has been used in many of the application like robotics.
In our project we are using raspberry pi 3 which is 50% faster than the raspberry pi 2.

Fig 4.1 Raspberry pi 3

14

Raspberry Pi 3 - Model B Technical Specification
Broadcom BCM2387 chipset
1.2GHz Quad-Core ARM Cortex-A53
802.11 bgn Wireless LAN and Bluetooth 4.1 (Bluetooth Classic and LE)
1GB RAM
64 Bit CPU
4 x USB ports
4 post Stereo yield and Composite video port
Full size HDMI
10/100 BaseT Ethernet socketbr
CSI camera port for associating the Raspberry Pi camera
DSI show port for associating the Raspberry Pi touch screen show
Micro SD port for stacking your working framework and putting away
information
Micro USB control source

Fig 4.2 : block diagram of raspberry pi

15
Pi processors

The original sheets utilized the Broadcom BCM2835 SoC comprising of a 700 MHz
ARM1176JZF-S processor, VideoCore IV designs handling unit (GPU), and RAM. Store is
estimated at 16 KB for L1 and 128 KB for L2. L2 reserve is principally utilized by the GPU.
The pi 2 utilizes the BCM2836 SoC with a 32-bit quad-center ARM Cortex-A7 processor
timed at 900 MHz, with 256 KB shared L2 store. The third emphasis of the pi utilizes the
BCM 2837 SoC which additionally ups the diversion with a 64-bit quad center ARM Cortex-
A53 processor timed at 1.2 GHz, with 512KB shared L2 store.

The spec sheet is clear to outline increment in execution throughout the years. At 700
MHz, the CPU on the original raspberry pi gives an execution like the 300 MHz Pentium II,
which has expanded definitely in the third era. The third emphasis of the raspberry pi is
evaluated at 10 times the execution of the pi first gen. The CPU chips under 1 GHZ on the
first and second era take into consideration overclocking up to 1GHz. The pi 2 can likewise
be overclocked to 1500 MHz with appropriate cooling, which goes down the deplete on the
off chance that the chip comes to 85 degree Celsius.

Raspberry Pi 3 - Model B Features
Now 10x Faster - Broadcom BCM2387 ARM Cortex-A53 Quad Core
Processor controlled Single Board Computer running at 1.2GHz!
1GB RAM so you can now run greater and all the more capable applications
40pin stretched out GPIO to upgrade your "certifiable" ventures.
Stream and watch Hi-definition video yield at 1080
Micro SD opening for putting away data and stacking your working
frameworks.
10/100 Base Ethernet attachment to rapidly associate the Raspberry Pi to the
Interne
Comparison of different generation of raspberry pi:
Raspberry pi Raspberry pi 2 Raspberry pi 3
Released February 2012 February 2015 February 2016
CPU ARM1176JZF-S ARM Cortex-A7 ARM Cortex-A53
CPU speed 700MHz 900MHz 1,200MHz
single core quad core quad core
RAM 512MB 1GB 1GB
256MB Rev 1
GPU Broadcom Broadcom Broadcom
VideoCore IV VideoCore IV VideoCore IV
Storage SDHC slot MicroSDHC slo MicroSDHC slot
MicroSDHC Model
A+ and B+
USB Ports 2 on Model B 4 4
Wi-Fi No built-in Wi-Fi No built-in Wi-Fi 802.11n and
Bluetooth 4.1

Table 4.1: comparison of different raspberry pi

ARM ARCHITECTURE
Introduction
ARM is a 32-bit RISC processor architecture developed by the ARM corporation. ARM
processors possess a unique combination of features that makes ARM the most popular
embedded architecture today. First, ARM cores are very simple compared to most other general-
purpose processors, which means that they can be manufactured using a comparatively small
number of transistors, leaving plenty of space on the chip for application specific macro cells. A
typical ARM chip can contain several peripheral controllers, a digital signal processor, and some
amount of on-chip memory, along with an ARM core. Second, both ARM ISA and pipeline
design are aimed at minimizing energy consumption a critical requirement in mobile
embedded systems. Third, the ARM architecture is highly modular: the only mandatory
component of an ARM processor is the integer pipeline; all other components, including caches,
MMU, floating point and other co-processors are optional, which gives a lot of flexibility in
building application-specific ARM-based processors. Finally, while being small and low-power,
ARM processors provide high performance for embedded applications.
For example, the PXA255 XScale processor running at 400MHz provides performance
comparable to Pentium 2 at 300MHz, while using fifty times less energy.
ARM vs RISC
In most respects, ARM is a RISC architecture. Like all RISC architectures, the ARM ISA
is a load-store one, that is, instructions that process data operate only on registers and are separate
from instructions that access memory. All ARM instructions are 32-bit long and most of them
have a regular three-operand encoding. Finally, the ARM architecture features a large register file
with 16 general-purpose registers. All of the above features facilitate pipelining of the ARM
architecture. However, the ARM architecture deviated from the RISC architecture in some
respects to improve its performance. The ARM did not include register windows that were used
by original RISC architectures to reduce complexity. The ARM architecture introduced an auto-
indexing addressing mode, where the value of an index register is incremented or decremented
while a load or store is in progress. ARM supports multiple register- transfer instructions that
allow loading or storing up to 16 registers at once.

Thumb instruction set extension


The Thumb instruction set was introduced in the fourth version of the ARM architecture
in order to achieve higher code density for embedded applications. Thumb provides a subset of
the most commonly used 32-bit ARM instructions which have been compressed into 16-bit wide
opcodes. On execution, these 16-bit instructions can be either decompressed to full 32- bit ARM
instructions or executed directly using a dedicated Thumb decoding unit. Although Thumb code
uses 40% more instructions than equivalent 32-bit ARM code, it typically requires 30% less
space. Thumb code is 40% slower than ARM code; therefore Thumb is usually used only in non-
performance-critical routines in order to reduce memory and power consumption of the system.
RASPBERRY PI BOARD
The Raspberry Pi is a credit-card-sized single-board computer developed in the UK by the
Raspberry Pi Foundation with the intention of promoting the teaching of basic computer science
in schools.
The Raspberry Pi is manufactured in two board configurations through licensed manufacturing
deals with Newark element14 (Premier Farnell), RS Components and Egoman. These companies
sell the Raspberry Pi online. Egoman produces a version for distribution solely in China and
Taiwan, which can be distinguished from other Pis by their red coloring and lack of FCC/CE
marks. The hardware is the same across all manufacturers.
The Raspberry Pi has a Broadcom BCM2835 system on a chip (SoC), which includes an
ARM1176JZF-S 700 MHz processor, Video Core IV GPU, and was originally shipped with
256 megabytes of RAM, later upgraded to 512 MB. It does not include a built-in hard disk or
solid-state drive, but uses an SD card for booting and persistent storage.
The Foundation provides Debian and Arch Linux ARM distributions for download. Tools are
available for Python as the main programming language, with support for BBC BASIC (via the
RISC OS image or the Brandy Basic clone for Linux),C, Java and Perl.

BOARD FEATURES

BCM 5825 FEATURES.


CPU: 533 MHz Samsung S3C6410A ARM11

RAM: up to 256 MB DDR RAM, 32 bit Bus

Flash: up to 1GB NAND Flash

EEPROM: 256 Byte (I2C)

Ext. Memory: SD-Card socket


Serial Ports: 1x DB9 connector (RS232), total: 4x serial port connectors

IR: Infrared Receiver

USB: 1x USB-A Host 1.1, 1x miniUSB Slave/OTG 2.0

Audio Output: 3.5 mm stereo jack

Audio Input: Condenser microphone

Ethernet: RJ-45 10/100M (DM9000)

RTC: Real Time Clock with battery

Beeper: PWM buzzer

Camera: 20 pin (2.0 mm) Camera interface

TV Output: AV Out

LCD Interface: 40 pin (2.0 mm) and 41 pin connector for FriendlyARM Displays and
VGA Board

User Inputs: 8x push buttons and 1x A/D pot

User Outputs: 4x LEDs

Expansion: 40 pin System Bus, 30 pin GPIO, 20 pin SDIO (SD, SPI, I2C), 10 pin
Buttons (2.0 mm)

Debug: 10 pin JTAG (2.0 mm)

Power: regulated 5V

Power Consumption: Mini6410: 0.25 A, Mini6410 + 4.3" LCD: 0.5 A

OS Support

o Windows CE 6

o Linux

o Android

o Ubunt
FEATURES:

ARCHITECTURE:
Integrated system for hand-held devices and general embedded applications.
16/32-Bit RISC architecture and powerful Instruction set with ARM920T CPU core.
Enhanced ARM architecture MMU to support WinCE, EPOC 32 and Linux.
Instruction cache, data cache, writes buffer and Physical address TAG RAM to reduce the
effect of main memory bandwidth and latency on Performance.
ARM920T CPU core supports the ARM debug Architecture.
Internal Advanced Microcontroller Bus Architecture (AMBA) (AMBA2.0, AHB/APB).

SYSTEM MANAGER:
Little/Big Endean support.
Support Fast bus mode and Asynchronous bus mode.
Address space: 128M bytes for each bank (total 1G bytes).
Supports programmable 8/16/32-bit data bus width for each bank.
Fixed bank start address from bank 0 to bank 6.
Programmable bank start address and bank size for bank 7.
Eight memory banks:
o Six memory banks for ROM, SRAM, and others.
Two memory banks for ROM/SRAM/Synchronous DRAM.
Complete Programmable access cycles for all memory banks.
Supports external wait signals to expand the bus cycle.
Supports self-refresh mode in SDRAM for power down.
Supports various types of ROM for booting (NOR/NAND Flash, EEPROM, and others).

NAND Flash Boot Loader


Supports booting from NAND flash memory.
4KB internal buffer for booting.
Supports storage memory for NAND flash memory after booting.
Supports Advanced NAND flash
Cache Memory
64-way set-associative cache with I-Cache (16KB) and D-Cache (16KB).
8words length per line with one valid bit and two dirty bits per line.
Pseudo random or round robin replacement algorithm.
Write-through or write-back cache operation to update the main memory.
The write buffer can hold 16 words of data and four addresses.

CLOCK & POWER MANAGER


On-chip MPLL and UPLL: UPLL generates the clock to operate USB
Host/Device. MPLL generates the clock to operate MCU at maximum 400MHz @ 1.3V.
Clock can be fed selectively to each function block by software.
Power mode: Normal, Slow, Idle, and Sleep mode
o Normal mode: Normal operating mode
o Slow mode: Low frequency clock without PLL
o Idle mode: The clock for only CPU is stopped.
o Sleep mode: The Core power including all peripherals is shut down.
Woken up by EINT[15:0] or RTC alarm interrupt from Sleep mode

INTERRUPT CONTROLLER
60 Interrupt sources (One Watch dog timer, 5 timers, 9 UARTs, 24 external interrupts, 4
DMA, 2 RTC, 2 ADC, 1 IIC, 2 SPI, 1 SDI, 2 USB, 1 LCD, 1 Battery Fault, 1 NAND and
2 Camera), 1 AC97
Level/Edge mode on external interrupt source
Programmable polarity of edge and level
Supports Fast Interrupt request (FIQ) for very urgent interrupt request

TIMER WITH PULSE WIDTH MODULATION (PWM)


4-ch 16-bit Timer with PWM / 1-ch 16-bit internal timer with DMA-based or interrupt-
based operation
Programmable duty cycle, frequency, and polarity
Dead-zone generation
Supports external clock sources
RTC (REAL TIME CLOCK)
Full clock feature: msec, second, minute, hour, date, day, month, and year
32.768 KHz operation
Alarm interrupt
Time tick interrupt

GENERAL PURPOSE INPUT/OUTPUT PORTS


24 external interrupt ports
130 Multiplexed input/output ports

DMA CONTROLLER
4-ch DMA controller
Supports memory to memory, IO to memory, memory to IO, and IO to IO transfers
Burst transfer mode to enhance the transfer rate

LCD CONTROLLER STN LCD DISPLAYS FEATURE


Supports 3 types of STN LCD panels: 4-bit dual scan, 4-bit single scan, 8-bit single scan
display type
Supports monochrome mode, 4 gray levels, 16 gray levels, 256 colors and 4096 colors for
STN LCD
Supports multiple screen size
o Typical actual screen size: 640x480, 320x240, 160x160, and others.
o Maximum frame buffer size is 4 Mbytes.
o Maximum virtual screen size in 256 color
o mode: 4096x1024, 2048x2048, 1024x4096 and others

TFT(THIN FILM TRANSISTOR) COLOR DISPLAYS FEATURE


Supports 1, 2, 4 or 8 bpp (bit-per-pixel) palette color displays for color TFT
Supports 16, 24 bpp non-palette true-color displays for color TFT
Supports maximum 16M color TFT at 24 bpp mode
LPC3600 Timing controller embedded for LTS350Q1-PD1/2(SAMSUNG 3.5 Portrait /
256Kcolor/Reflective a-Si TFT LCD)
LCC3600 Timing controller embedded for LTS350Q1-PE1/2(SAMSUNG 3.5 Portrait /
256Kcolor/Transflective a-Si TFT LCD)
Supports multiple screen size
o Typical actual screen size: 640x480, 320x240, 160x160, and others.
o Maximum frame buffer size is 4Mbytes.
o Maximum virtual screen size in 64K color
o mode: 2048x1024, and others

UART
3-channel UART with DMA-based or interrupt based operation
Supports 5-bit, 6-bit, 7-bit, or 8-bit serial data transmit/receive (Tx/Rx)
Supports external clocks for the UART operation (UEXTCLK)
Programmable baud rate
Supports IrDA 1.0
Loopback mode for testing
Each channel has internal 64-byte Tx FIFO and 64-byte Rx FIFO.

A/D CONVERTER & TOUCH SCREEN INTERFACE


8-ch multiplexed ADC
Max. 500KSPS and 10-bit Resolution
Internal FET for direct Touch screen interface

WATCHDOG TIMER
16-bit Watchdog Timer
Interrupt request or system reset at time-out
3.21 IIC-BUS INTERFACE
1-ch Multi-Master IIC-Bus
Serial, 8-bit oriented and bi-directional data transfers can be made at up to 100 Kbit/s in
Standard mode or up to 400 Kbit/s in Fast mode.
3.22 IIS-BUS INTERFACE
1-ch IIS-bus for audio interface with DMA-based operation
Serial, 8-/16-bit per channel data transfers
128 Bytes (64-Byte + 64-Byte) FIFO for Tx/Rx
Supports IIS format and MSB-justified data format

AC97 AUDIO-CODEC INTERFACE


Support 16-bit samples
1-ch stereo PCM inputs/ 1-ch stereo PCM outputs 1-ch MIC input

USB HOST
2-port USB Host
Complies with OHCI Rev. 1.0
Compatible with USB Specification version 1.1

USB DEVICE
1-port USB Device
5 Endpoints for USB Device
Compatible with USB Specification version 1.1

SD HOST INTERFACE
Normal, Interrupt and DMA data transfer mode (byte, halfword, word transfer)
DMA burst4 access support (only word transfer)
Compatible with SD Memory Card Protocol version 1.0
Compatible with SDIO Card Protocol version 1.0
64 Bytes FIFO for Tx/Rx
Compatible with Multimedia Card Protocol version 2.11
3.27 SPI INTERFACE
Compatible with 2-ch Serial Peripheral Interface Protocol version 2.11
2x8 bits Shift register for Tx/Rx
DMA-based or interrupt-based operation

CAMERA INTERFACE
ITU-R BT 601/656 8-bit mode support
DZI (Digital Zoom In) capability
Programmable polarity of video sync signals
Max. 4096 x 4096 pixels input support (2048 x 2048 pixel input support for scaling)
Image mirror and rotation (X-axis mirror, Y-axis mirror, and 180 rotation)
Camera output format (RGB 16/24-bit and YCbCr 4:2:0/4:2:2 format)
Operating Voltage Range
Core: 1.20V for 300MHz
1.30V for 400MHz
Memory: 1.8V/ 2.5V/3.0V/3.3V
I/O: 3.3V

Operating Frequency
Fclk Up to 400MHz
Hclk Up to 136MHz
Pclk Up to 68MHz

4.1.2 TCRT5000-IR sensor


Description
The TCRT5000 is an IR sensor which is used to detect the presence of human
when the person in the range of IR sensor. Usually IR sensor range is about 1mm to
8mm. depending upon the accuracy concerned we can fix the range with in 1mm to
8mm using an on board potentiometer to fix the sensitivity.

When the person in the range the infrared receiver emit the radiation and some of the
radiation is emitted back to the infrared detector or a phototransistor the output go to high or
else the output remains at low condition
Fig 4.3: TCRT5000-IR sensor

Application Idea
Rainfall detecting
Liquid leakage
The electricity meter pulse data sampling
Fax machine,
Obstacle detection
Black and white line detection Module

Features
Supply Voltage is of about 3.3V~5V
Range is 1mm-8mm
Digital-output HIGH when person or an object is detected
On-board indicator LED to visible the results
On-board potentiometer to alter the sensitivity
On-board LM393 chip
TCRT 5000-IR sensor Pin number Raspberry pi 3
VCC 1 3.3
Ground 2 Ground
D0 3 GPIO 18
A0 4 -
Table 4.2: Pin connection of TCRT 5000 to a raspberry pi 3

4.1.3 Webcam
A webcam is a video camera that will continuously capture the motion near to it and it
is connect to computer. The webcam is used all over to continuously capture the motion
which is saved in PC and this can be seen when we require or can be sent to a different
stream. This use of webcam makes secure and there will be less chance of attacker or robbers
if so we can see the person movement and can be easily to find the person. Thus in all of the
home, business, hotel, and hospital use the webcam to continue track the motion. The
webcam can used for face to face discussion.

The webcam used here is Logitech C170 which connects to USB cable of raspberry pi
which is intern connected to PC. Whenever the person in the range of IR sensor or whenever
the person presses the pushbutton camera capture the image and sent to the email.

Logitech C170 webcam


The Logitech C170 -Webcam provide a VGA-quality video and a top notch sound, so
you can have clear face-to-face discussions with business partners or with far off friends and
family. A microphone incorporated with the webcam utilizes Right Sound innovation to
lessen foundation commotion, so could hear clearly. The USB association to the Logitech
C170 Webcam with Built-in Mic fitting and-play ability, making it simple to introduce and
set up. You can video-talk online with companions utilizing moment delivery person
administrations. You can likewise share recordings via web-based networking media locales.
Other than video, you can likewise catch still pictures with the Logitech C170 webcam with
resolutions of up to 5.0 megapixels. With video determination of up to 640 x 480 resolutions,
your photo on the Logitech USB Webcam is similarly as clear as your audio.
Fig 4.4: webcam-C170

Logitech Webcam VGA-Quality Video with Built-In Mic C170:


o Built-in microphone with Right Sound innovation lessens undesirable foundation
commotion for clear discussions
o USB availability empowers basic plug and-play setup (link included)
o Chat online with prevalent instant message services and additionally share recordings
and photographs on Facebook, YouTube, Twitter and more.
o picture resolution up to 5.0 megapixels with programming upgrade (1.3MP without)
for extreme lucidity
o Video catch up to 640 x 480 resolution at up to 15 fps guarantees sharp detail and
motions
o VGA picture sensor conveys prominent image quality
Specification
Resolution 640 x 480
Display Resolution 1024 x 768
System Requirements Windows, Mac
Operating System Windows, Mac
Model 960-000880
Brand Logitech
Focus Type Fixed-Focus
Compatible Devices Desktop Computers
Material Multi
Features In-built Mic, USB connectivity provide
a plug-and-play setup (cable included),
VGA image sensor delivers striking
picture quality, Compatible with the
vast majority of instant messaging
applications

Table 4.3: specification of C170 webcam

4.1.4 Push-button

Fig 4.5: push button

Push button is a switch for controlling some part of the device. This are made up of a
hard material, normally plastic or a metal. Usually surface of the pushbutton is on level,
formed to suit the human figure or hand to provide an effortless push and generally push
button are of one sided switches, unbiased button still it need a spring to come back to its
normal unpushed state. Here in our project push button is used as a doorbell which is connected to raspberry pi
Push button Pin number Raspberry pi 3 Pin number
VCC 1 3.3 v 1
Digital output 2 GPIO 7
Ground 3 Ground 9

Table 4.4 Pin connection of push button to raspberry pi 3

4.1.5 DC motor
DC motor is a class of rotatory electrical machine which convert electrical energy to
mechanical energy. All the DC motor have some internal mechanism either electromechanical
or electronic signal. Small DC-motors are useful in toys, tool and appliances and large DC
motor is used in vehicles, elevator. In many of the application DC motor has replaced AC
motor.

Here the motor can be run by using L293D and is connected to GPIO pin raspberry pi
3. The Dc motor used her is used to close and open the door. Here the motor operate when
owner send the command GRANTED message then the direct current is flown in the motor
which will convert electrical signal to mechanical to access the door or else the motor will
not rotate.

Fig 4.6: DC motor


4.1.6 Piezo buzzer:
A piezoelectric buzzer creates sound utilizing the piezoelectric impact. Piezoelectric is
a ability of materials to create electric charge because of connected mechanical anxiety. It
resembles an amplifier. Piezo ringer contains a Piezo disc and an oscillator inside.
Piezomaterial utilized is Lead Zirconate Titanate. The oscillator creates a recurrence of
around 2-4 kHz at whatever point the bell is empowered and in light of this the Piezo
component vibrates and produces the sound. Piezo signal's utilitarian voltage is in the scope
of 3 12 volts DC.

Fig.4.7: Piezo buzzer

Buzzer Pin number raspberry pi 3 Pin number


-ve Ground ground 20
+ve VCC GPIO 17

Table 4.5: pin connection of buzzer to raspberry pi

Piezo buzzer is used in this project to know whenever the person is in the range of IR
sensor and when the person press the pushbutton the Piezo buzzer will make sound

4.1.7 L293D-motor driver

Fig4.8: L293D
L293D is a dual H bridge motor driver which work has a current amplifier it will take
a low current signal and give a high current signal which is used to driver the DC motor. By
using L293D we can drive 2 DC motor in reverse and forward direction of rotation. The
operation of 2 DC motor can be operated by using the input pin 2 an 7 and output pin 10 and
15.

Here in our project L293D is used to drive one DC motor to open and close the door.

Fig4.9: pin diagram of L293D

4.2 SOFTWARE
4.2.1 Raspbian OS
Raspbian Jessie adaptation is utilized as a part of this project. It depends on Debian
Linux and diverse renditions of OS are named from toy story film characters. This OS is
completely modified for the raspberry Pi's equipment. Alterations were made to upgrade
framework forms execution. It runs LXDE (Lightweight X11 Desktop Environment) as the
desktop condition.

How to install Raspbian on raspberry pi
SD card setup

The Raspberry Pi won't begin without a legitimately organized SD Card, containing


the bootloader and a reasonable working framework. Numerous issues will booting the
Raspberry Pi if we are not formatted the SD card properly. This will ensure you that you must
embed the card before controlling on the Raspberry Pi and that you must shutdown the
Raspberry Pi before you remove the card. In the event that you do have issues booting the
Raspberry Pi.

You will likewise need to pick dispersion. Accessible dispersions are appeared here;
you will require the Raspberry Pi bootloader to dispatch your appropriation, so you require
one for the Raspberry Pi and can't download a PC based circulation and utilize that. Take note
of that you can have a few SD Cards with a different dispersion on every, at that point control
off, swap cards and restart the Raspberry Pi to utilize that card.

Some Raspberry Pi kit will accompany a prepared to-run card with the distributive
pre-installed, or these can be purchased independently. There is more on this underneath.

In the event that you don't have a pre-installed card you should set up your own.
Ensure you get a sensible quality card as opposed to a modest one. Caution! When you
compose the Raspberry Pi picture to your SD card you will lose all information that was on
the card. Official images are accessible from http://www.raspberrypi.org/downloads.
Raspberry Pi Images

There are a few kinds of crude Raspberry PI pictures (e.g., Raspbian, Pidora, Risc OS,
RaspBMC, Arch, and OpenElec) which you can download from Raspberry PI's authentic
webpage. Every one of these images is good with both model A and B.

The RaspBMC and OpenElec pictures are for the most part utilized for mixed media
purposes. With either image installed, Raspberry Pi can be transformed into a little sight and
sound focus. You can play motion picture documents, sound records, watch online TV, and so
forth.

The Raspbian, Pidora and Risc OS pictures resemble customary working frameworks
for ARM processors. You can introduce any application or administration on these working
frameworks, for example, web server, document server, get to point, and so forth.
The NOOBS picture gives the least demanding and most advantageous path for you to
compose Raspberry Pi working frameworks without stressing over physically blazing a
image into a SD Card. It contains more than one Raspberry Pi working frameworks. Upon
first boot, NOOBS consequently organizes a SD card, and requests that you pick an OS to
introduce from a rundown.

Here we are using Raspbian

Formatting SD card

We will begin with designing your SD card. This progression is not entirely important,
but rather it helps wipe off your card. Sometimes if something has turned out badly this will
help tidy up the mess instead of bringing the mess to you

Continuously be watchful while doing this, it will delete everything on your card, so
ensure you are OK losing everything on the card.

To start with a downloading and introducing SD card for formatting. You must embed
the SD card into the SD card reader and after that configure the SD card with a SD formatter.
Arranging choices dont make a difference, as the organizer record the framework will be
overwritten amid the consequent image composing step. The motivation behind why we
organize the SD card is to make the card recognize by the working framework.

Fig 4.10: formatting SD card


Next, download and install win32diskimager application which can flash an SD Card.
Get ready for Burning Raspbian Image to a SD Card

For burning a Raspbian images, it is prescribed to use with least 4 GB card. Before
beginning the procedure, first download the Raspbian images from the authority download
page. The picture comes as a compress document. Unzip the document to separate the
Raspbian images file. in our project we utilized 16GB
Flashing the SD card utilizing windows

Utilizing the Win32DiskImager program

1) Download the conveyance by a raspberrypi.org downloads page which will ensure a


conveyance for the Raspberry Pi, as others won't work. Generally these are compressed
(packed) which will be in the form of .zip or .gz .
2) Obtain the image record from the downloaded .zip document, and check for the file name
in .img.
3) Download the Win32DiskImager utility which will also in the form of Zip file and run it .

Fig4.11: flashing SD card

4) Extract the executable from the compress record and run the Win32DiskImager utility;
you may need to run the utility as Administrator! Right-tap on the document, and select
'Keep running as Administrator'
5) Put the SD card into your SD card and check in which drive a file was assigned and select
it to flash the SD card
6) Click Write and wait for the write to finish.
7) Exit the imager and discharge the SD card.
8) You are presently prepared to connect the card to your Raspberry Pi. See
RPi_Hardware_Basic_Setup for alternate things you require.
Chapter 5

RESULTS AND DISCUSSION

This paper aims to design for security purposes. when bell rings at the door or When
there is a motion detection near the IR sensor, it will trigger a camera and the camera will
capture the image of the person standing in front of the door, that will be sent to the registered
user (email) who is away from home and then he will identify the person and through the
email itself he can control the door close and open.

Fig 5.1: capturing the image of the person

The figure 5.1 shows that when the person near the range of IR sensor or when
the person press the push button camera is activated and capture the image
Fig 5.2: email notification

Figure 5.2 shows the email notification of the person image near the IR sensor range
or if he presses the doorbell by the webcam. If the person is known send GRANTED message
by email as shown in fig 5.3 or else ALERT message is sent as shown in fig 5.4 which get
buzzer to Alert.

Fig 5.3: door access to the person by email


Fig 5.4: Alert sent by email
Chapter 6

ADVANTAGES AND APPLICATIONS

6.1 ADVANTAGES

Don't make your relatives and companions hold up outside on the grounds that you're
not at home. Through a portable you can control the entryway. This is the other
incredible advantage of utilizing smart locking framework. In this way, you don't need
to skip the available time or send another person to hand over them a key.
Clear images in the email which will let you know which person is standing at the
door to open the door remotely
Ensures You a High Security: Burglary is the basic danger for every single property
holder. Any unwelcome visitor can undoubtedly break into your home, regardless of
how more grounded your bolt is. In any case, a smart bell framework is the hard nut
to separate for them, since it is with no keys.
The advantage of brilliant door access is that they can basically make life less
demanding on those occasions when your family member or a guest swing up to your
front entryway with a hands full!
It is Convenient for Elderly and Physically Impaired People: Technologies has made
the living significantly less demanding for handicapped or elderly individuals. Since it
can be opened with cell phone or desktop, and there is no need to battle with keys to
open the door and close the door.
In inbox of the email we will be having the person images if there is a robbery issue
we can use it as evidence, which make easy for security department in order to find
that person.
Fig 6.1: advantage of using a smart bell

Thus these reasons make the home secure and help to take decision.

6.2 APPLICATION

This project is a keyless process and is convenient for the person and it will ensure
you a great security. It can be used in home, office, laboratory etc. where we have a security
issues.
Chapter 7

CONCLUSION AND FUTURE SCOPE

This design of smart bell is used for home security concerned by using an IoT which
is a give you a better security feature and is user friendly. This system is used for door close
and open using internet of things which enables you a keyless process entry and the problem
of losing the key and searching for the key will be solved. This process is convenient by
allowing the owner to close and open the door when he is not available in home through his
mobile or PC in turn increases security.

This design can be used in the places link bank, hospital, laboratory and any other
sophisticated systems, which will reduce the unauthorized entry and the evidence can be
given for the security department if there is any robbery issues occur. But the system need to
monitor always and bills of the internet must be paid in a correct time to connect with home
remotely.

The future scope would be we can use a mobile application to continue track the motion
near the home. In proposed design we need to check the email and then he will authorize the
person the guest whether to open the door or not.
REFERENCE

1. A. Alheraish, Design and Implementation of Home Automation System, IEEE


Transactions on Consumer Electronics, vol. 50, no. 4, pp.1087-1092, Nov. 2004.
Article (CrossRef Link)
2. U. Saeed, S. Syed, S.Z. Qazi, N.Khan, A.Khan, M.Babar, Multi-advantage and
security based home automation system, 2010 Fourth UKSim European Symposium
on Computer Modeling and Simulation (EMS), pp.7-11, Nov. 2010. Article (CrossRef
Link)
3. T.Venkat Narayana Rao Automatic Safety Home Bell System with Message
Enabled Features IJCSET(www.ijcset.net) | December 2016 | Vol 6, Issue 12, 410-
413
4. Smart lock: A locking system using Bluetooth technology and camera verification by
Bhalekar Pandurang1, Jamgaonkar Dhanesh2 Prof. Mrs. Shailaja Pede3, Ghangale
Akshay4 Garge Rahul5. International Journal of Technical Research and Applications
e-ISSN: 2320-8163, www.ijtra.com Volume 4, Issue 1 (January-February, 2016), PP.
136-139
5. Raspberry pi org. Forum [online] available: http://www.raspberrypi.org/phpBB3/
6. DC motor https://en.wikipedia.org/wiki/DC_moto
7. IR sensor blog.huntgang.com/2014/06/17/arduino-tcrt5000-build-ir-sensor
8. Webcam C170 https://support.logitech.com/product/webcam-c170

You might also like