0% found this document useful (0 votes)
8 views

FINAL CONTENT AND FORMAT FOR CAPSULE PROJECT

Capsule Research Reference

Uploaded by

Rima Ubos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

FINAL CONTENT AND FORMAT FOR CAPSULE PROJECT

Capsule Research Reference

Uploaded by

Rima Ubos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Colegio de Montalban

Kasiglahan Village, San Jose, Montalban, Rizal

INSTITUTE OF COMPUTER STUDIES

COMPUTER ENGINEERING DEPARTMENT

Contact # 8-296-8667 [email protected]

GUARDIANFACE: AUTOMATED DEFENSE SYSTEM WITH INTEGRATED


FACIAL RECOGNITION AND FIRING
MECHANISM USING ARDUINO-BASED MICROCONTROLLER AND OPEN-CV

A Project Requirement

Presented to the faculty of Institute of Computer Studies, Computer Engineering Department


In Partial Fulfillment of The Requirements for The Course Realtime Embedded System and
Fundamentals of Mixed Signals and Sensors

Researchers
Last Name, First Name, Middle Initial
Last Name, First Name, Middle Initial
Last Name, First Name, Middle Initial
Last Name, First Name, Middle Initial
Last Name, First Name, Middle Initial
Last Name, First Name, Middle Initial
Last Name, First Name, Middle Initial

Instructor
Engr. Emerson M. Facelo
Colegio de Montalban
Kasiglahan Village, San Jose, Montalban, Rizal

INSTITUTE OF COMPUTER STUDIES

COMPUTER ENGINEERING DEPARTMENT

Contact # 8-296-8667 [email protected]

1.0 INTRODUCTION

1.1 Background of the Study

Various high-security locations, such as critical infrastructures, warehouses, military bases,


and banks, require robust protection measures to ensure their safety and security. To ensure
the safety and security of these places, security personnel had to be employed. However,
these personnel are not infallible, and have flaws, for example, they are prone of getting tired,
especially during night shifts and during patrols, in which they have to move around.

Advances in safeguarding places has been made, such as the Closed-Circuit Televisions
(CCTV), in which one can just install cameras in critical places. Advances are also made in
this field, such as the Wireless CCTV, in which the cameras can upload the video feed into
the cloud, in which the user can track anytime, anywhere [1][2], and can alarm the user of
intruders [3], and a system where it can track movement [4]. However, these systems can still
have flaws in which are mainly compromised of human errors. This calls of a requirement of
a system that automatically detects an intruder, tracks their movements, and apprehends them
whenever necessary.

The Internet-of-Things (IoT) is a technology in which it can enable communication between


other devices. IoT extends the capabilities of Internet to enable machine-to-machine
communication (M2M). IoT can be used in establishing communication among everyone and
everything. IoT enables us to embed some sort of intelligence in the objects that are or can be
connected to the Internet in order to exchange information, in which can communicate to
other devices and can be used to fit the user’s preferences and goals. [5]

This study aims to create and document the creation of a system that is able to track and
apprehend intruders in order to keep these critical places safe and secure. The main feature of
this project is that, it will scan the surroundings if threat is detect and the defense system will
act accordingly. It is powered by Arduino with the help of the OpenCV library.
Colegio de Montalban
Kasiglahan Village, San Jose, Montalban, Rizal

INSTITUTE OF COMPUTER STUDIES

COMPUTER ENGINEERING DEPARTMENT

Contact # 8-296-8667 [email protected]

1.2 Objectives of the study

1.2.1 General Objectives


The general objective of this study was to develop an automated defense system using an
embedded Arduino-based microcontroller that will track an unidentified intruder, and then
apprehends said intruder whenever necessary.

1.2.2 Specific Objectives


1. To develop a program that detects face in the camera’s field of view.
2. To display the camera feed and to also mark the objects detected by the camera.
3. To integrate a firing mechanism to the system that can automatically fire its weapons once
the face has been detected.

1.3 Conceptual Framework


Figure 1 displays the framework of the system. The input is the live image of the space
displayed by the camera. The processes are the image processing using the connected
personal computer and the Ultrasonic sensor made to detect the distance between the system
and the subject. Apprehending the intruder is also part of the process. Its ideal output is the
intruder being apprehended.

INPUT PROCESS OUTPUT

 Image Processing
 Checks whether a
subject exists
 Image of space faced  Detect id subject is an  Automated System
by the camera intruder Defense
 Detect distance from
intruder
 Firing Mechanism

Figure 1 – Conceptual Framework


Colegio de Montalban
Kasiglahan Village, San Jose, Montalban, Rizal

INSTITUTE OF COMPUTER STUDIES

COMPUTER ENGINEERING DEPARTMENT

Contact # 8-296-8667 [email protected]

2.0 METHODOLOGY
This section contains the research design, research model, 3D model, Block Diagram,
Schematic and Circuit Diagram, Flowchart, and Materials used.

2.1 Research Design


This study is developmental research where the researchers manipulate one or more
variables, and then measures any changes in other variables. The framework below describes
the research design.

2.2 Research Model


The research model describes the workflow of our project, in which the researchers
determine the goals that have been broken down, after which decide on that to prioritize first.
The advantage of Scrum is that ongoing feedback occurs during the Sprint, allowing for
inspection and adaptation of the process and what will be delivered. [6]

Figure 2 – Research Model


Colegio de Montalban
Kasiglahan Village, San Jose, Montalban, Rizal

INSTITUTE OF COMPUTER STUDIES

COMPUTER ENGINEERING DEPARTMENT

Contact # 8-296-8667 [email protected]

2.3 3D Model
The system is composed of several building blocks, namely, the tracking system, the weapons
system, and the microcontroller. The tracking system uses a webcam connected to a PC in
order to do image processing, making it able to detect and track intruders. Using the HC-
SR04 connected to the tracking system, it determines the distance between the system and the
intruder. If the intruder comes too close to the set distance of the system, it will
activate its weapons system to the intruder.

Figure 3 – The front, side, and isometric views of the system

2.4 Block Diagram


Figure 2.3 shows the block diagram of the system. Its input is the image feed of the webcam,
and then processed by the computer to detect if an intruder exists. If it does, it communicates
to the microcontroller to move the servos to track the intruder. If the intruder detected to be
too near by the HC-SR90, it would activate its weapon systems to shoot the subject.

Figure 4 – Block Diagram


Colegio de Montalban
Kasiglahan Village, San Jose, Montalban, Rizal

INSTITUTE OF COMPUTER STUDIES

COMPUTER ENGINEERING DEPARTMENT

Contact # 8-296-8667 [email protected]

2.5 Schematic Diagram

Figure 5 – Schematic diagram of the System

2.6 Circuit Diagram

Figure 6 – Circuit Diagram of the system

2.7 System Flowchart


Colegio de Montalban
Kasiglahan Village, San Jose, Montalban, Rizal

INSTITUTE OF COMPUTER STUDIES

COMPUTER ENGINEERING DEPARTMENT

Contact # 8-296-8667 [email protected]

Figure 7 – Flowchart of the systems

2.8 Materials/Components
Colegio de Montalban
Kasiglahan Village, San Jose, Montalban, Rizal

INSTITUTE OF COMPUTER STUDIES

COMPUTER ENGINEERING DEPARTMENT

Contact # 8-296-8667 [email protected]

IMAGE NAME FUNCTION

Microcontroller board that


Arduino UNO coordinates the system's
components and operations.

SG-90 Servo Motors (3) Provides precise rotational


control for the pan-tilt
mechanism.

HC-SR04 Ultrasonic sensor Detects the presence and


distance of intruders.

Pan-Tilt Servo Kit for SG-90 Enables horizontal and vertical


Servo Motor movement of the camera and
shooter.
Colegio de Montalban
Kasiglahan Village, San Jose, Montalban, Rizal

INSTITUTE OF COMPUTER STUDIES

COMPUTER ENGINEERING DEPARTMENT

Contact # 8-296-8667 [email protected]

720p Webcam Captures video feed for facial


recognition and tracking.

6-Shot Disc Shooter Automatically fires discs at


detected intruders.

Controls the firing mechanism


Servo motor linear actuator with precise linear motion.

Table 1. System Materials


Colegio de Montalban
Kasiglahan Village, San Jose, Montalban, Rizal

INSTITUTE OF COMPUTER STUDIES

COMPUTER ENGINEERING DEPARTMENT

Contact # 8-296-8667 [email protected]

3.0 RESULTS, CONCLUSION, AND RECOMMENDATIONS

3.1 Program or Software


The program is based on Python and uses the OpenCV library to detect the face of the
subject. The program also uses the Pyserial Library to communicate with the Arduino Uno
Board it is connected into.

Figure 8 - The camera feed displayed by the program.


3.2 Display
The camera feed displays the input of the camera, alongside with objects that it can detect. In
this program, it is set that the program only marks face visible in the camera feed.

Figure 9 - The camera feed displayed by the program, along with a subject
3.3 Firing Mechanism
Colegio de Montalban
Kasiglahan Village, San Jose, Montalban, Rizal

INSTITUTE OF COMPUTER STUDIES

COMPUTER ENGINEERING DEPARTMENT

Contact # 8-296-8667 [email protected]

The firing mechanism consists of two parts: the firing mechanism itself, and the mechanism
that pulls the trigger. When the mechanism detects an object within 10
centimeters, It will activate its automatic mechanism that pulls the trigger. Said mechanism
has two parts: A servo, and an actuator. The servo communicates the firing mechanism, and
the actuator translates the rotational force emitted by the servo into reciprocating motion.

Figure 10 – The weapon with an automated firing mechanism attached.


Colegio de Montalban
Kasiglahan Village, San Jose, Montalban, Rizal

INSTITUTE OF COMPUTER STUDIES

COMPUTER ENGINEERING DEPARTMENT

Contact # 8-296-8667 [email protected]

3.4 Conclusion
Automatic defense system project successfully implemented hybrid technologies for threat
detection and response using OpenCV and Arduino. Results shown potential in identifying
threats for it follow where the object is located at. The discussion highlighted the system and
its potential application in urban security and future directions for improvement, including
enhanced integration and broader application in defense system frameworks. The objectives
are met successfully, and it has potential to apply in military.

3.5 Recommendations
Based on the successful implementation of our automatic defense system utilizing hybrid
technologies such as OpenCV and Arduino, future researchers are encouraged to explore the
following areas for further enhancement and application:
 Investigate deeper integration with advanced AI algorithms and IoT devices to
improve the system's accuracy and responsiveness in real-time threat detection and
response scenarios.
 Conduct studies on the scalability of the system to handle larger and more complex
environments and enhance its robustness to ensure consistent performance under
various
conditions.
 Develop a more user-friendly interface for easier control and monitoring, making the
system accessible to non-technical users and ensuring widespread adoption.

These recommendations aim to build upon our findings and pave the way for innovative
advancements in the field of automated defense systems.
Colegio de Montalban
Kasiglahan Village, San Jose, Montalban, Rizal

INSTITUTE OF COMPUTER STUDIES

COMPUTER ENGINEERING DEPARTMENT

Contact # 8-296-8667 [email protected]

Bibliography

[1] E. Rohadi et al., "Internet of Things: CCTV Monitoring by Using Raspberry Pi,"
2018
International Conference on Applied Science and Technology (iCAST), Manado, Indonesia,
2018, pp. 454-457, doi: 10.1109/iCAST1.2018.8751612
[2] Kumar, J., Kumar, S., Kumar, A., & Behera, B. (2019). Real-Time Monitoring
Security System integrated with Raspberry Pi and e-mail communication link. In
2019 9th
International Conference on Cloud Computing, Data Science & Engineering
(Confluence). 2019 9th International Conference on Cloud Computing, Data Science &
Engineering (Confluence). IEEE. https://doi.org/10.1109/confluence.2019.8776971
[3] Venkatesan, S., Jawahar, A., Varsha, S., & Roshne, N. (2017). Design and
implementation of an automated security system using Twilio messaging service.
2017 International
Conference on Smart Cities, Automation & Intelligent Computing Systems (ICON-SONICS).
doi:10.1109/icon-sonics.2017.8267822
[4] Kumar, K. N. K., Natraj, H., & Jacob, T. P. (2017). Motion activated security camera
using raspberry Pi. 2017 International Conference on Communication and Signal
Processing (ICCSP). doi:10.1109/iccsp.2017.8286658
[5] Chopra, K., Gupta, K., & Lambora, A. (2019). Future Internet: The Internet of
Things-A Literature Review. In 2019 International Conference on Machine
Learning, Big Data, Cloud and Parallel Computing (COMITCon). 2019
International Conference on Machine Learning, Big Data, Cloud and Parallel
Computing (COMITCon). IEEE.
https://doi.org/10.1109/comitcon.2019.8862269
[6] What is Scrum? | Scrum.org. Scrum.org. Retrieved May 14, 2024, from
https://www.scrum.org/resources/what-scrum-module

You might also like