0% found this document useful (0 votes)
4 views73 pages

Final Report1

The document outlines a project focused on developing an IoT-based surveillance robot utilizing a Raspberry Pi for real-time video streaming and control. It details the system's objectives, methodologies, and feasibility studies, emphasizing the robot's ability to monitor and detect intruders in sensitive areas, particularly at international borders. The project aims to enhance security measures while reducing reliance on traditional CCTV systems, offering a more flexible and cost-effective solution.

Uploaded by

chuthya8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views73 pages

Final Report1

The document outlines a project focused on developing an IoT-based surveillance robot utilizing a Raspberry Pi for real-time video streaming and control. It details the system's objectives, methodologies, and feasibility studies, emphasizing the robot's ability to monitor and detect intruders in sensitive areas, particularly at international borders. The project aims to enhance security measures while reducing reliance on traditional CCTV systems, offering a more flexible and cost-effective solution.

Uploaded by

chuthya8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 73

1

CONTENTS P.no’s

1. Introduction 7

1.1 Abstract 8

1.2 Methodology 9

2. Objectives 10

3. System Analysis

3.1 Identification of the Need 11 - 12

3.2 Preliminary Investigation 13

3.3 Gantt Chart 14

3.4 Existing System 15

3.5 Requirement Analysis 16

3.6 Feasibility Study

a. Technical Feasibility 17

b. Economical Feasibility 17

c. Operational Feasibility 17

4. SDLC (Software Development Life Cycle) 18 -20

5. SRS (Software Requirement Specification) 21 - 22

6. Components Description 23 -34

2
7. Module Description 35 - 38

8. Project Implementation 39

9. Design

a. DFD 40 - 41

b. Architecture Diagram 42 - 43

c. Snap Shots 44

10. Coding 45 - 54

11. Testing 55 - 58

12. Data Validation checks 59 - 62

13. Implementation 63 – 64

14. Security Measures Taken 65 - 67

15. Maintenance 68 - 69

16. Limitation and future enhancement 70 – 75

17. Bibliography 76

3
1. INTRODUCTION

Robots have found a growing, incremental query in a remote range of applications in our life.
Their usefulness in defense has been crescive day by age. Our newspaper ends one such
instance of how a robot can be used for the human race in general. In today’s earth, robots find
use in various employment be it to detect buried bombs or in business applications or even
robotic components application in children’s toys. In this plan we use internet to enact
communication between the user and a robotic vehicle. This is an unfailing connection and a
continued video audio feedback is present to rule the robotic vehicle. Due to the application of
the internet, there is no measurement on range or ceremoniousness between the use and the
robotic vehicle. Internet robotics has opened up a fully new row of real - earth applications
namely tele - manufacturing, tele - drilling, tele - orthopedy, healthcare, track exploration,
disaster rescue etc.

Almost all systems are wired, but we have tried the same with the application of the internet.
The proposed robot summon will be controlled by DC motors and motor driving IC. Our notes
illustrate an access to control a robotic vehicle internet as communication average between use
and robotic vehicle. Conventionally wireless robots have the drawbacks of confined operation
roam, bounded commonness order and bounded govern, but internet can overcome these
limitations with the help of Raspberry Pi programmable board that can control the direction of
the robotic vehicle according to input addicted by the user.

Video surveillance is an important research area in the commercial area as well. Security
cameras are already prevalent in commercial establishments, with camera output being
recorded, to tapes that are either rewritten periodically or stored in video archives.In this
implementation of a robotic vehicle, the web camera connected to the robot keeps on capturing
what is going on there at the host place and saves it into the computer. And the user can control
the robot vehicle using this video stream .The camera used here is a night vision camera .Thus
the system is more flexible to monitor even during night.

4
1.1 ABSTRACT

Remote surveillance and monitoring of our frontier has seen a growing need in emerging
times. Currently the surveillance of International border areas is a strenuous task for soldiers.
As every field is opting for robotics in order to improve the existing systems , Our aim is to
implement robotics in military security systems for at most security .Here, surveillance robot
which is capable of surveilling and detecting intruders in regions of international borders
,Therefore the surveillance robot is designed in such a way that it would automatically detect
the invader in the borders and alert the nearby security personnel as a helping hand by alerting
him through video streaming over Internet Of Things . The heart of the robot is a powerful
Raspberry Pi B+ model which is used as the ultimate controller for the entire operation of the
robot.

In this robot we have used a PIR sensor which is interfaced with the raspberry pi in order to
rotate the camera for video streaming and it would be enabled when an intruder is detected. An
Infrared sensor is used for detecting the obstacles in order to avoid collisions. For capturing
and streaming the video the raspberry pi camera is attached to the microcontroller which
actively monitors the area and sends a notification when any obstacle is detected. The
transmission part of the surveillance robot is carried out using Internet of Things by enabling
WiFi. . The live streaming ability of the Raspberry Pi allows the camera feed to be analyzed
from any location using the internet. The IOT module eliminates the need of transmitter and
receiver modules thus it makes the node compact, cost effective and easy to use. Thus the
Raspbian operating system based surveillance robot is designed to achieve this.

KEYWORDS:
Surveillance robot, wireless camera, IOT, video streaming, Raspberry pi

5
1.2 METHODOLOGY

The webcam will capture live data with regards to its surroundings and then send it to a desired
device through the internet. The user will be observing this data on the monitor at the user end.
According to the desired movement, the user will control the robotic vehicle through the
webpage available at the user end. The input given through the webpage is then sent through
the internet and the desired movement occurs at the robot end.

The first part is construction of the robotic vehicle. With the help of programs an internet
connection is established between the robotic vehicle and the user. Then the robot captures the
images using a webcam and stores them into the memory. The next task is to capture and send
live images using the internet. Raspberry Pi 3 B+ is used for video processing and sending the
processed video to the user PC with the help of the Internet. The user will have videos on the
web browser and also will be able to control the robotic movement. DC motors are being used
for the movement of robot.

1. Requirements: Identify the surveillance objectives and specific requirements


for the project.

2. Design: Create a system design that outlines the components and interactions
of the surveillance robot.

3. Sensor Integration: Integrate relevant sensors into the robot for data collection
and perception.

4. Communication: Establish wireless communication for real-time data


transmission and remote control.

5. Software Development: Develop software for tasks such as object detection


and motion tracking.

6. Testing: Conduct rigorous testing to ensure the robot's performance meets


the requirements.

6
2. OBJECTIVE

 This is the internet of things (IoT) based project, where we are particularly using the
Raspberry Pi 3B+, Pi camera and two DC motor with Robot chassis to build this Robot
setup.
 Goals :-
We aim to build a small, land based robot that
o Can be used to view a live feed of a room the robot is in.
o Can maps its environment (if the user chooses) and patrol the area
o Can be managed and controlled using the keys.
 Features
o Control via Website to move the robot forward or backward, and rotate it left
or right .
o Low quality, live feed from camera to Android device through Wi-Fi
connection.

 Benefits

o Is much cheaper than many other surveillance robots on the market


o Allows use of commands for controlling the robot, rather than a large,
standalone base station
o Allows autonomous surveillance with little input from the user.

 Functions
o Manual mode where the robot maps its environment, and, after it
determines it’s explored enough of the environment.
o When stationary, the robot will show the video recording through the website
o When the battery is low, the robot will send a notification to the user’s
indicating. recharging is needed

7
3. System analysis

3.1 Identification of the Need

Currently, most of the dangerous areas that should be monitored regularly often use the

Closed-Circuit Television (CCTV) system as the medium of monitoring operations. However,

this CCTV used a static camera where it is difficult to transmit the image-on -site effectively

because of single viewing angle for each CCTV installed. Due to this Problem, manpower is

used to gives a direct view to get the desired image which is indirectly endanger to the safety of

human being. Dangerous environment such as radiation, high temperature, flammable ,etc….

will risk the human life. Their safety is not guaranteed if they are directly used to execute the

monitoring task.

Here, surveillance robot which is capable of surveilling and detecting intruders in regions of

international borders ,Therefore the surveillance robot is designed in such a way that it would

automatically detect the invader in the borders and alert the nearby security personnel as a

helping hand by alerting him through video streaming over Internet Of Things . The heart of

the robot is a powerful Raspberry Pi B+ model which is used as the ultimate controller for the

entire operation of the robot.

8
9
3.2 Preliminary Investigation

Raspberry Pi 3B+ is a card sized computer. It functions almost same as a computer. There are
different types of surveillance systems available such as camera, CCTV etc., In these types of
surveillance systems, the person who is stationary and is located in that particular area can only
able to view what is happening in that place. Whereas, here, even if the user is moving from
one place to another, he/she can keep track of what is happening in that particular place at
exact time. Also, another advantage is that it offers privacy on both sides since it is being
viewed by only one person. The other big advantage is that, it is a easy and simple circuit for
understanding and designing. The operating system used here is Raspbian OS. Raspbian OS
has to be installed so that the image can be transmitted to the laptop website Closed circuit
television monitoring system has now become an indispensable device in today’s society.
Robots have found an drastically increasing demand for different range of work in our life.
Their use in army and other security sector increases day by day. Our project includes one such
instance of how a robot can be of use to human race in general. In this project, we use the
internet to establish communication between the user and a robotic vehicle. This is a
dependable connection and a continuous video feedback is available to control the robotic
vehicle. Due to the use of the web, there is no limitation on range or distance between the user
and the robotic vehicle. It is proposed to address the lower side at cost, efficient , high-speed
processing & control hardware for the self-navigating robotics application. Design and
Implementation of a Robotic Vehicle with Real – Time Video Feedback Control via
Internet/web page illustrate on an approach to control a robotic vehicle using the internet as
the communication medium between the user and robotic vehicle.

Raspbian OS has to be installed so that the image and videos can be seen throughwebpage

directly. Closed circuit television monitoring system has now become an indispensable device

in today’s society. There are in different places such as school, supermarkets, society security

where we are having their own CCTV system for 24/7 monitoring.

10
3.3 Gantt Chart
A Gantt chart is a graphical representation of the duration of tasks against the
progression of time. A Gantt chart is a popular type of bar chart that aims to show
the timing of tasks or activities as they occur over a period of time. Although the Gantt
chart did not initially indicate the relationship between activities this become has
become more common in current usage as both timing and interdependences can be
identified.

In this project a Gantt chart can show when the project terminal elements start and
finish, summary elements (shown) or terminal element dependences (not shown). A
terminal element is defined as the smallest task tracked as part of the project effort.

Since the initial introduction of Gantt charts, they have become an industry standard as a
key project management tool for representing the phases, tasks and activities that are
scheduled as a part of a Project Work Breakdown Structure or timeline of activities.

11
3.4 EXISTING SYSTEM

In the existing system we have seen wall mounted CCTV(Closed-circuit television) cameras
which consume more power, are costly to set up and require a standalone DVR to store the
CCTV footage which ultimately ends up in an increased cost. Another main limitation of
installing a CCTV camera is that, once fitted in a direction they can only monitor a specific
area.These CCTV cameras need wired connection which increases the cost of setting up the
surveillance cameras.

While Recording a CCTV Footage a Single CCTV camera can create video data which can
result in GB’s.The Output from the CCTV Footage was Visible only from a single Monitor.If
there is a electricity - cutoff the CCTV cameras won’t work and hence won’t give 100% video
footage guarantee.

12
3.5 REQUIREMENT ANALYSIS

 Requirements Determination

The requirement determination involved the collection of information about how the
AR(Augmented Reality) Furniture Application should operate. The requirements
determination activity was the most difficult part of system analysis. It involved
gatherings and documenting of the true and real requirements for the system being
developed.

 Requirement Analysis

The primary goal of this phase was to create a detailed functional specification
defining the full set of system capabilities to be implemented, along with
accompanying data and process model. Illustrating the information to be managed and
the processes to be supported by the new system. It involved xamination of the
collected data. Models such as Data Flow Diagrams (DFD) and Entity Relationship
(ERD’s) were used to model individual processes and data respectively. Under there
requirements were classified as functional and nonfunctional requirements, the
determination and analysis of requirements helped to achieve this project.

13
3.6 Feasibility Study
Feasibility studies to check the visibility of the project under the consideration the
theoretical project various types of feasibility are conducted but below are
important represent explain

a) Technical Feasibility
Technical Feasibility determines whether the work for the project can be
done with the existing equipment’s software technology and available
personals technical feasibility is concerned with the specified equipment
and software that will satisfy the user requirement this project is feasible
on technical remark also as the proposed system is beneficiary in term of
having a sound proof system with new technical equipment’s install on the
system that proposed system can run on any machine supporting window
and work on the best software and hardware that had been used while
designing the system so it would be visible in all technical term of
feasibility.

b) Economical Feasibility
With manual system the operation cost of this system is about 60 lacks for
annual this cost comprises salary of Swiss 25 people’s stationary, building
rent , electricity, water, telephone etc. but with a new system this offering
cost comes out to be about 20 lacks for renewal and the new system is
economically feasible.

b) Operational Feasibility
The new solution is possible in all sense but operationally is not the new
system demands the explosion of at least 15 people from the company it
creates an environment of joblessness and fear among the employees it can
lead to indefinite Strike in the company also, so the management must take
corrective action prior in advance to start further proceeding.

14
4. SDLC(Software Development Life Cycle)

Software Development Life Cycle (SDLC) is a process used by the software industry to design,
develop and test high quality software’s. The Software Development Life Cycle (SDLC) aims
to produce a high – quality software that meets or exceeds customer expectations, reaches
completion within times and cost estimates.

98The SDLC helps schedule planning, building, testing, and maintaining an application.
However, it is hard to implement the software development life cycle wisely and adequately
without a good understanding of its phases.

15
Planning and Requirement Analysis stage

Requirement Analysis is the most important and necessary stage in SDLC. The senior members
of the team perform it with inputs from all the stakeholders and domain experts or SMEs in the
industry. Planning for the quality assurance requirements and identifications of the associated
with the projects is also done at this stage. Business analyst and Project organizer set up
meeting with the client to gather all the data like what the customer wants to build, who will be
the end user, what is the objective of the product. Before creating a product, a core
understanding knowledge of the product is very necessary. Once the required function is done,
an analysis is complete with auditing the feasibility of the growth of a product. In case of any
ambiguity,signal is set up for further discussion.Once the requirement is understood, the SRS
(Software Requirement Specification) document is created. The developers should thoroughly
follow this document and also should be reviewed by the customer for future reference.

Analysis and defining requirements

Once the requirement analysis is done, the next stage is to certainly represent and document
the software requirements and get them accepted from the project stakeholders. This is
accomplished through "SRS"- Software Requirement Specification document which contains
all the product requirements to be constructed and developed during the project life cycle.

Design

The next phase is about to bring down all the knowledge of requirements, analysis, and design
of the software project. This phase is the product of the last two, like inputs from the customer
and requirement gathering.

16
Implementation and Coding

In this phase of SDLC, the actual development begins, and the programming is built. The
implementation of design begins concerning writing code. Developers have to follow the
coding guidelines described by their management and programming tools like compilers,
interpreters, debuggers, etc. are used to develop and implement the code.

Testing

After the code is generated, it is tested against the requirements to make sure that the products
are solving the needs addressed and gathered during the requirements stage. During this stage,
unit testing, integration testing, system testing, acceptance testing are done.

Deployment

Once the software is certified, and no bugs or errors are stated, then it is deployed. Then based
on the assessment, the software may be released as it is or with suggested enhancement in the
object segment. After the software is deployed, then its maintenance begins.

Maintenance

Once when the client starts using the developed systems, then the real issues come up and
requirements to be solved from time to time .This procedure where the care is taken for the
developed product is known as maintenance.

17
5. SRS (Software Requirement Specification)

A Software requirement specification (SRS) is a document what the software will do and how
it will be expected to perform. It is also describes the functionality the product needs to fulfill
all stakeholders (business, users) needs.

 VIDEO PROCESSING FRAMEWORK (OPEN CV)


 Language :- PYTHON IDE 3 , Linux (terminal commands)
 Operating System :- Raspbian OS
 Library :- ADA Fruit , MQTT ,RPI.GPIO , etc

OPEN CV (Open Source Computer Vision ) :-

It is an open source computer vision and machine learning software library. OpenCV was
built to provide a common infrastructure for computer vision applications and to accelerate the
use of machine perception in the commercial products.
o Automation of Human Visual System
o High-level understanding to computer from Digital Images and Videos.
o Object Detection and Video Processing.
o Allows us to perform Image Processing and Computer Vision Tasks.

PYTHON IDE 3

An IDE (or Integrated Development Environment) is a program dedicated to software


development .As the name implies, IDEs integrate several tools specifically designed for
software development . These tools usually include : An editor designed to handle code.
o PyCharm is a widely used Python IDE.
o Visual Studio Code is an open source IDE created by Microsoft

18
RASPBIAN OS :-

Raspberry PI OS is a Unix like operating system based on the Debian Linux Distribution for
the Raspberry Pi family of Compact single –board computers.

ADA FRUIT :-

It is an open source hardware software. It is simple Circuit Python Libraries for a large number Of
Modules, including displays, sensors, actuators and many more.

pip3 install adafruit

RPI.GPIO :-

GPIO stands for General Purpose Input Output. The Raspberry Pi has two rows of GPIO pins,
which are connections between the Raspberry Pi, and the real world. Output pins are like
switches that the Raspberry Pi can turn on or off. It is another Python – only library. It provides
basic interactions with the GPIO pins, but no implementation of any connection protocol yet.
sudo apt-get install rpi.gpio

19
6. COMPONENTS DESCRIPTION

COMPONENTS USED:-
o SD Card
o Raspberry Pi 3B+ board
o USB Camera
o Power Supply
o L239D Motor Drive
o 60RPM Motors
o Jumper Wires
o 9V Batteries
o Display
o Robot Chassis
o USB Cable Connector

20
1) SD CARD

The SD card is a key part of Raspberry Pi; it provides the initial storage for the Operating System
and files. Storage can be extended through many types of USB connected peripherals.
Raspberry Pi 3 B+ uses a micro SD card for storage (OS, libraries and user Programs). You
need at least 8 GB storage on your micro SD card . If you do, place your micro SD card into
the full sized SD card adapter and stick it into the SD card reader (built-in or attached to your
computer).

The Micro SD card slot on the Raspberry Pi 3 is located just below the Display Serial Adapter
on the other side. Insert the Micro SD card which was loaded with NOOBS in the slot and
plug in power supply.

If you have an SD card that doesn’t have the Raspberry Pi OS operating system on it yet, or if
you want to reset your Raspberry Pi, you can easily install Raspberry Pi OS yourself. To do
so, you need a computer that has an SD card port — most laptop and desktop computers have
one. Using the Raspberry Pi Imager is the easiest way to install Raspberry Pi OS on your SD
card.

21
2) Raspberry PI 3B+

The Raspberry Pi 3 Model B+ is a versatile single-board computer with a 1.4 GHz quad-
core processor, 1GB RAM, built-in Wi-Fi and Bluetooth, Ethernet port, four USB ports,
HDMI and audio ports, micro SD card slot, and 40 GPIO pins. It supports various
operating systems, making it suitable for a wide range of projects. With its powerful
performance, wireless connectivity options, expandability through GPIO pins, and
compatibility with a vast array of accessories, the Raspberry Pi 3B+ is an ideal choice for
projects requiring computing power, connectivity, and customization.

The Raspberry Pi is a versatile single-board computer known for its powerful performance
and wide range of applications. With its robust processing capabilities, ample connectivity
options, and expandability through GPIO pins, the Raspberry Pi is ideal for projects in
home automation, media centers, gaming consoles, robotics, and IoT. Its compatibility
with various operating systems and a thriving community of enthusiasts further enhances
its potential for innovative and creative projects.

22
3) USB CAMERA

A USB camera is a compact imaging device that can be connected to a computer or other
devices via a USB port. It captures still images and videos and is commonly used for
applications such as video conferencing, live streaming, security surveillance, and
computer vision. USB cameras are easy to set up and compatible with various operating
systems. They can be connected to a Raspberry Pi to enable image and video capture
capabilities. The Raspberry Pi can host a local web server to display the camera feed on a
website, allowing for remote access and sharing of the captured content. USB cameras
provide a flexible and accessible imaging solution for Raspberry Pi projects.

USB cameras offer plug-and-play functionality, making them easy to integrate with
Raspberry Pi projects. With their compact size and compatibility, USB cameras provide a
convenient solution for capturing and displaying images or videos in various applications.

23
4) Power Supply

The power supply for the Raspberry Pi is an essential component that provides the
necessary electrical power to operate the board. It typically requires a 5V micro USB
power supply, which can be connected to a power source such as a wall outlet or a power
bank. The power supply ensures a stable and reliable power input for the Raspberry Pi,
allowing it to function properly and perform tasks efficiently. It is important to use a
power supply with appropriate voltage and current ratings to meet the power requirements
of the Raspberry Pi and prevent any potential damage or instability.The power supply for
the Raspberry Pi is crucial for its optimal performance and reliability, supplying the
necessary voltage and current to meet its power requirements. It is recommended to use a
high-quality power supply to ensure stable operation and prevent potential issues such as
under powering or voltage fluctuations. Additionally, choosing a power supply with
adequate current output is essential when connecting power- hungry peripherals or
running resource-intensive applications on the Raspberry Pi.

24
5) L239D Motor Driver

The L239D motor driver is a popular integrated circuit used for controlling the speed and
direction of DC motors. It is commonly utilized in robotics and automation projects.
The L239D motor driver can handle high current and voltage, making it suitable for
driving motors with different power requirements. With its built-in protection features, it
ensures the safe operation of motors by preventing overheating and short circuits. The
L239D motor driver offers a compact and efficient solution for motor control in a variety
of applications.

The L239D motor driver is widely used for its ability to control and drive DC motors
with precision and reliability. Its dual H-bridge configuration allows independent control
of two motors, enabling versatile motor control capabilities. With its simple interface and
compatibility with microcontrollers, the L239D motor driver offers an efficient and
convenient solution for motor control in robotic systems, electric vehicles, and other
projects requiring precise motor movements.

25
6) 60 RPM Motors

60 RPM motors are DC motors that rotate at a speed of 60 revolutions per minute. They
are commonly used in robotics, automation, and hobbyist projects that require
controlled and precise rotational movement. These motors provide a moderate
rotational speed, making them suitable for applications where a balance between speed
and torque is required. With their compact size and compatibility with motor drivers,
60 RPM motors offer an efficient and reliable solution for various projects
requiring controlled motion at a moderate speed.

60 RPM motors are popular choices for applications that require a moderate rotational
speed, such as robotic arms, conveyor systems, and camera gimbals. Their relatively
slower speed compared to higher RPM motors allows for more precise control and
smoother operation. These motors are commonly used in prototyping and educational
projects due to their affordability and ease of integration. With their versatility and
availability in different sizes and voltage options, 60 RPM motors provide a flexible
solution for a wide range of projects requiring controlled rotational motion.

26
7) Jumper Wires

Jumper wires are essential components used for creating electrical connections between
different components in electronic projects. They are typically made of flexible insulated
wires with connectors on each end, allowing for easy and convenient connection
between various electronic modules, sensors, actuators, and microcontrollers. Jumper
wires eliminate the need for soldering and provide a quick and temporary method for
prototyping and testing circuits. They come in different lengths and colors to aid in
organization and circuit readability. Jumper wires are widely used in breadboard-based
projects, making them a fundamental toolfor electronic experimentation and rapid
prototyping.

Jumper wires offer a flexible and hassle-free solution for creating temporary connections
in electronics projects, allowing for easy modification and troubleshooting. With their
versatility and compatibility with various prototyping platforms like breadboards and
Arduino boards, jumper wires are a staple in the toolbox of electronics enthusiasts,
hobbyists, and professionals alike.

27
8) 9V BATTERY

A 9V battery is a compact and portable power source commonly used in electronic


projects. It provides a steady 9 volts of direct current (DC) power, making it suitable for
low-power devices such as microcontrollers, sensors, and small electronic circuits. With
its standard form factor and snap-on connectors, the 9V battery offers convenience and
easy replacement. It is commonly used in applications where portability and simplicity
are desired, providing a reliable power solution for a wide range of small-scale projects.

The 9V battery is widely available and affordable, making it a popular choice for powering
small electronic devices and prototypes. Its compact size allows for easy integration into
projects with limited space constraints, providing a convenient and portable power solution
for on-the-go applications.

28
9)DISPLAY

A display is a visual output device used to present information or data in electronic


projects. It allows users to view and interpret the output of their project in a human-
readable format. Displays come in various types, such as LCD, OLED, and LED,
offering different sizes, resolutions, and interfaces. By connecting a display to their
project, users can monitor real-time data, view sensor readings, display user interfaces, or
showcase visual feedback. Displays provide a convenient and interactive means of
presenting information and enhancing the user experience in a wide range of electronic
projects.

Displays provide a visual interface for projects, allowing users to interact with and
interpret project output with ease. Whether it's displaying text, numbers, graphics, or user
interfaces, a display enhances the overall functionality and user experience of electronic
projects, making them more intuitive and engaging. With their versatility and
compatibility with various microcontrollers and development boards, displays are a
valuable tool for presenting information and adding a visual element to
electronic projects.

29
10) Robot Chassis

A robot chassis is the physical framework or body of a robot that provides structural
support and housing for the various components. It serves as the foundation on which the
robot is built and determines its size, shape, and mobility capabilities.Robot chassis come
in different materials and designs, such as metal or plastic frames with wheels or tracks.
They provide mounting points for motors, sensors, microcontrollers, and other electronic
components. The choice of robot chassis depends on the specific project requirements,
including the desired size, weight, maneuverability, and terrain compatibility of the robot.

Robot chassis are designed to offer flexibility and customization options, allowing users to
adapt and modify the robot's capabilities based on project needs. They provide a sturdy
and reliable structure for housing and protecting sensitive electronic components, ensuring
the overall stability and longevity of the robot. With their modular nature, robot chassis
enable easy upgrades and modifications, making them an essential component for building
and experimenting with various types of robots.

30
11) USB Cable Connector

A USB cable connector is a standard interface used for connecting electronic devices to a
computer or power source. It consists of a male connector, which plugs into the device,
and a female connector, which accepts the male connector. USB cable connectors come in
different types, such as USB Type-A, USB Type-B, and USB Type-C, each with specific
features and compatibility. They provide a reliable and versatile means of data transfer,
power supply, and device connectivity in various electronic projects. USB cable
connectors are widely used in consumer electronics, computer peripherals, and embedded
systems, offering a convenient and standardized connection solution.

USB cable connectors offer a universal and convenient method for connecting devices,
enabling data transfer and power supply in electronic projects.

31
7. MODULE DESCRIPTION

7.1 MOTOR MODULE

The motor module in a surveillance robot is responsible for controlling the robot's
movements and locomotion.

1. Motor Selection: Choose appropriate motors based on the project requirements,


considering factors such as torque, speed, and power consumption. Common options
include DC motors or stepper motors.

2. Motor Control: Implement motor control mechanisms to regulate the speed and direction
of the motors. This can be achieved using motor drivers or H-bridge circuits to interface
with the microcontroller or control system.

3. Wheel Configuration: Configure the motor module with wheels to enable the robot's
movement. Depending on the design, it can include two or more wheels, with differential or
omnidirectional configurations for enhanced maneuverability.

4. Power Supply: Provide a suitable power supply to the motor module, ensuring sufficient
voltage and current capacity to drive the motors effectively. This may involve utilizing
batteries or external power sources.

5. Integration and Wiring: Connect the motor module to the control system, ensuring proper
wiring and connections. Follow the specifications and guidelines provided by the motor
manufacturer to ensure safe and efficient operation.

6. Calibration and Testing: Calibrate the motor module to achieve desired performance
characteristics such as speed and responsiveness. Test the motor module extensively to
verify its functionality and ensure smooth and reliable movement of the surveillance robot.

32
7. Safety Considerations: Implement safety measures to prevent motor overheating,
voltage spikes, or other potential risks. This may include incorporating motor
protection circuits, thermal monitoring, or implementing fail-safe mechanisms to
ensure the safe operation of the surveillance robot.

8. Maintenance and Servicing: Outline maintenance procedures for the motor module,
such as regular cleaning, lubrication, and inspection for wear and tear. Additionally,
highlight the need for periodic servicing or replacement of motors and motor
components to ensure optimal performance and longevity of the surveillance robot.

33
7.2 CAMERA MODULE

The camera module in a surveillance robot is responsible for capturing visual information and
enabling real-time monitoring.

1. Camera Selection: Choose a suitable camera module based on the project requirements,
considering factors such as resolution, field of view, low-light performance, and
compatibility with the control system. Options may include USB cameras, Raspberry Pi
cameras, or specialized surveillance cameras.

2. Camera Mounting: Properly mount the camera module on the robot chassis to ensure
stability and optimal viewing angles. Consider factors such as camera position,
orientation, and the need for adjustable mounts to capture desired perspectives.

3. Image Processing: Develop software algorithms or utilize existing libraries to process and
analyze the captured images. This may involve tasks such as object detection, motion
tracking, or image enhancement to enhance surveillance capabilities.

4. Video Transmission: Establish a reliable method for video transmission from the camera
module to the control center or user interface. This can involve wired or wireless
communication protocols such as Wi-Fi, Ethernet, or streaming technologies to ensure
real- time video feed delivery.

5. Integration and Control: Integrate the camera module with the control system or
microcontroller of the surveillance robot. Establish mechanisms to control camera settings,
such as focus, zoom, and exposure, programmatically or through user commands.

6. Power Supply: Provide a stable and adequate power supply to the camera module, ensuring
uninterrupted operation. This may involve incorporating voltage regulators or dedicated
power sources to maintain consistent performance.

34
7. Image Storage and Retrieval: Implement mechanisms to store captured images or video
footage from the camera module. This can involve local storage on the robot or cloud-
based storage solutions, enabling easy access, retrieval, and analysis of recorded
surveillance data.

8. Camera Calibration and Maintenance: Perform camera calibration to ensure accurate and
distortion-free image capture. Regularly inspect and clean the camera module to maintain
image quality and prevent dust or debris from obstructing the lens. Additionally, establish
a maintenance schedule for the camera module, including periodic checks for proper
functioning and addressing any issues that may arise.

35
8. Project Implementation

1. Install the Raspbian OS into the SD card, and boot the Raspberry Pi.

2. Connect the Raspberry Pi to a Wi-Fi network and check for the IP address of the Pi.

3. Connect the Pi camera and enable the camera option in the settings.

4. Write a python program to capture images, view live streaming, and also record the video
from your smart phone.

5. In order to view the live streaming of the surveillance camera you need to do port
forwarding of your network.

6. Use App inventor and create an android app or you can use website , that helps you to
control your robot and also to view live streaming, capture image and record remotely.

36
9. DESIGN

a. DFD
A data flow diagram (DFD) maps out the flow of information for any process or
system. It uses defined symbols like rectangles, circles and arrows, plus short text
labels, to show data inputs, outputs, storage points and the routes between each
destination.

There are four basic elements of a data flow diagram : processes, data stores, external
entities, and data flows.

The surveillance robot consists of four main components:

1. Sensors: These include various sensors such as cameras, infrared sensors, and
motion detectors that capture data related to the environment and potential threats.

2. Controller: The controller processes the data received from the sensors, analyzes it,
and makes decisions regarding the robot's movement, camera orientation, and
other actions based on predefined rules or user instructions.

37
3. Motor Driver: The motor driver component controls the movement of the robot
by providing appropriate signals to the motors based on the instructions received from
the controller.

4. Motors: The motors drive the physical movement of the robot, allowing it to navigate
the environment and respond to detected threats or changes.

38
b. Architecture Diagram

The architecture diagram provides a visual representation of the structure and components
of a system or project. It illustrates the various elements, their relationships, and how
they interact with each other to achieve the desired functionality. The diagram helps
stakeholders understand the overall design and organization of the system, making it
easier to communicate and analyze
the project's architecture.

1. Surveillance Robot: Represents the physical robot platform equipped with sensors,
cameras, actuators, and other necessary hardware components. It serves as the main
agent responsible for capturing video footage, collecting sensor data, and
performing surveillance tasks.

2. Controller Unit: This component acts as the brain of the surveillance robot, controlling
its movements, sensor readings, and data processing. It consists of microcontrollers,
processors, or single-board computers such as Raspberry Pi, which handle the robot's logic and
decision-making capabilities.

39
3. Sensor Suite: Includes various sensors integrated into the surveillance robot for
environment monitoring and perception. This may include cameras for visual surveillance,
infrared sensors for detecting heat signatures, ultrasonic sensors for proximity detection, or any other
relevant sensors depending on the
project requirements.

4. Communication Module: Facilitates communication between the surveillance robot and


the control center or user interface. It can use wireless technologies such as Wi-Fi,
Bluetooth, or cellular networks to transmit video feeds, sensor data, and control commands in real-time.

5. Control Center/User Interface: This component represents the interface used by the
operator or user to monitor and control the surveillance robot. It can be a web-based
dashboard, mobile application, or a dedicated control unit that allows the user to view live video
feeds, send commands to the robot, and access recorded footage.

6. Power Supply: Provides the necessary power source for the surveillance robot and its
components. It can include batteries, power management systems, or external power adapters, ensuring
uninterrupted operation of the robot.

7. Cloud or Local Storage: Represents the storage infrastructure for storing recorded video
footage or collected data. It can be cloud-based storage services or local storage devices,
depending on the project requirements and data management preferences..

The architecture diagram illustrates how these components work together to enable the
surveillance robot to capture and transmit video footage, process sensor data, and provide
real-time monitoring and control capabilities.

40
c. Snap Shots

41
10. CODING

a. Running Code for Moving Robot

import RPi.GPIO as GPIO


from time import sleep

GPIO.setmode(GPIO.BOARD)

#Assign GPIO pins for both motors


lm_ena = 33
lm_pos = 35
lm_neg = 37

rm_ena = 36
rm_pos = 38
rm_neg = 40

#Set pins in the output mode


GPIO.setup(lm_ena,GPIO.OUT)
GPIO.setup(lm_pos,GPIO.OUT)
GPIO.setup(lm_neg,GPIO.OUT)

GPIO.setup(rm_ena,GPIO.OUT)
GPIO.setup(rm_pos,GPIO.OUT)
GPIO.setup(rm_neg,GPIO.OUT)

42
def moveRobot(direction)
: if(direction ==
“f”)
print(“Forward”)

#Left Motor Forward


GPIO.output(lm_ena ,GPIO.HIGH)
GPIO.output(lm_pos ,GPIO.HIGH)
GPIO.output(lm_neg,GPIO.LOW)

#Right Motor Forward


GPIO.output(rm_ena ,GPIO.HIGH)
GPIO.output(rm_pos ,GPIO.HIGH)
GPIO.output(rm_neg,GPIO.LOW)

if(direction == “b”)
print(“Backward”)

#Left Motor Backward


GPIO.output(lm_ena ,GPIO.HIGH)
GPIO.output(lm_pos ,GPIO.LOW)
GPIO.output(lm_neg,GPIO.HIGH)

#Right Motor Backward


GPIO.output(rm_ena ,GPIO.HIGH)
GPIO.output(rm_pos ,GPIO.LOW)
GPIO.output(rm_neg,GPIO.LOW)

if(direction == “r”)
print(“Right”)

43
#Left Motor Forward
GPIO.output(lm_ena ,GPIO.HIGH)
GPIO.output(lm_pos ,GPIO.HIGH)
GPIO.output(lm_neg,GPIO.LOW)

#Right Motor Backward


GPIO.output(rm_ena ,GPIO.HIGH)
GPIO.output(rm_pos ,GPIO.LOW)
GPIO.output(rm_neg,GPIO.HIGH)

if(direction == “l”)
print(“Left”)

#Left Motor Backward


GPIO.output(lm_ena ,GPIO.HIGH)
GPIO.output(lm_pos ,GPIO.LOW)
GPIO.output(lm_neg,GPIO.HIGH)

#Right Motor Forward


GPIO.output(rm_ena ,GPIO.HIGH)
GPIO.output(rm_pos ,GPIO.HIGH)
GPIO.output(rm_neg,GPIO.LOW)

if(direction == “s”)
print(“Stop”)

#Left Motor Stop


GPIO.output(lm_ena ,GPIO.HIGH)
GPIO.output(lm_pos ,GPIO.LOW)

44
GPIO.output(lm_neg,GPIO.LOW)
#Right Motor Stop
GPIO.output(rm_ena ,GPIO.HIGH)
GPIO.output(rm_pos ,GPIO.LOW)
GPIO.output(rm_neg,GPIO.LOW)

for i in range(0,5) :
moveRobot(“f”)
sleep(1)
moveRobot(“b”)
sleep(1)
moveRobot(“r”)
sleep(1)
moveRobot(“l”)
sleep(1)
moveRobot(“s”)
sleep(1)

GPIO.cleanup()

b. Streaming Video Using Open CV

import threading import Thread


import cv2

class WebcamVideo :
def init (self, src = 0) :
self.stream = cv2.VideoCapture(src)

45
(self.grabbed, self.frame) = self.stream.read()
self.stopped = False
def start(self) :
Thread(target = self.update, args = () ).start ()
return self

def update(self) :
while True :
if.self.stopped :
return

(self.grabbed, self.frame) = self.stream.read()

def read(self) :
return self.frame
def stop(self) :
self.stopped = True
cam = WebCamVideo(src = 0).start()

while (1) :
frame = cam.read()
cv2.imshow(“frame”, frame)
key = cv2.waitKey(1)
if key == 27 :
break

cv2.destroyAllWindows()
cam.stop()

46
c. Final Code

import RPi.GPIO as GPIO


from time import sleep
import threading import Thread
import cv2
import numpy as np

class WebcamVideo :
def init (self, src = 0) :
self.stream = cv2.VideoCapture(src)
(self.grabbed, self.frame) = self.stream.read()

self.stopped = False

def start(self) :
Thread(target = self.update, args = () ).start ()
return self

def update(self) :
while True :
if.self.stopped :
return

(self.grabbed, self.frame) = self.stream.read()

def read(self) :
return self.frame

47
def stop(self) :
self.stopped = True

GPIO.setmode(GPIO.BOARD)

#Assign GPIO pins for both motors


lm_ena = 33
lm_pos = 35
lm_neg = 37

rm_ena = 36
rm_pos = 38
rm_neg = 40

#Set pins in the output mode


GPIO.setup(lm_ena,GPIO.OUT)
GPIO.setup(lm_pos,GPIO.OUT)
GPIO.setup(lm_neg,GPIO.OUT)

GPIO.setup(rm_ena,GPIO.OUT)
GPIO.setup(rm_pos,GPIO.OUT)
GPIO.setup(rm_neg,GPIO.OUT)

def moveRobot(direction) :
if(direction == “f”)
print(“Forward”)

48
#Left Motor Forward
GPIO.output(lm_ena ,GPIO.HIGH)
GPIO.output(lm_pos ,GPIO.HIGH)
GPIO.output(lm_neg,GPIO.LOW)

#Right Motor Forward


GPIO.output(rm_ena ,GPIO.HIGH)
GPIO.output(rm_pos ,GPIO.HIGH)
GPIO.output(rm_neg,GPIO.LOW)

if(direction == “b”)
print(“Backward”)

#Left Motor Backward


GPIO.output(lm_ena ,GPIO.HIGH)
GPIO.output(lm_pos ,GPIO.LOW)
GPIO.output(lm_neg,GPIO.HIGH)

#Right Motor Backward


GPIO.output(rm_ena ,GPIO.HIGH)
GPIO.output(rm_pos ,GPIO.LOW)
GPIO.output(rm_neg,GPIO.LOW)

if(direction == “r”)
print(“Right”)

#Left Motor Forward


GPIO.output(lm_ena ,GPIO.HIGH)
GPIO.output(lm_pos ,GPIO.HIGH)

49
GPIO.output(lm_neg,GPIO.LOW)

#Right Motor Backward


GPIO.output(rm_ena ,GPIO.HIGH)
GPIO.output(rm_pos ,GPIO.LOW)
GPIO.output(rm_neg,GPIO.HIGH)

if(direction == “l”)
print(“Left”)

#Left Motor Backward


GPIO.output(lm_ena ,GPIO.HIGH)
GPIO.output(lm_pos ,GPIO.LOW)
GPIO.output(lm_neg,GPIO.HIGH)

#Right Motor Forward


GPIO.output(rm_ena ,GPIO.HIGH)
GPIO.output(rm_pos ,GPIO.HIGH)
GPIO.output(rm_neg,GPIO.LOW)

if(direction == “s”)
print(“Stop”)

#Left Motor Stop


GPIO.output(lm_ena ,GPIO.HIGH)
GPIO.output(lm_pos ,GPIO.LOW)
GPIO.output(lm_neg,GPIO.LOW)

50
#Right Motor Stop
GPIO.output(rm_ena ,GPIO.HIGH)
GPIO.output(rm_pos ,GPIO.LOW)
GPIO.output(rm_neg,GPIO.LOW)

cam = WebCamVideo(src = 0).start()

while (True) :

frame = cam.read()

key = cv2.waitKey(10)

if key == ord(‘w’) :
moveRobot(‘f’)
if key == ord(‘a’) :
moveRobot(‘l’)
if key == ord(‘s’) :
moveRobot(‘b’)
if key == ord(‘d’) :
moveRobot(‘r’)
if key == 32 :
moveRobot(‘s’)
if key == 27 :
break
cv2.imshow(“frame”, frame)

cam.stop()
cv2.destroyAllWindows()
GPIO.cleanup()

51
11. TESTING

Testing is the process of detecting errors. Testing performs a very crucial role for
quality assurance and for ensuring the reliability of software. The results of testing are
used later on during maintenance also.

Psychology of Testing : The aim of testing is often to demonstrate that a program works
by showing that it has no errors. The basic purpose of testing phase is to detect the
errors that may be present in the program. Hence one should not start testing with the
intent of showing that the program works, but the intent should be to show that a
program doesn’t work. Testing is the process of executing a program with the intent of
finding the errors.

Testing Objective : The main objective of testing is to uncover a host of errors,


systematically and with minimum effort and time.

Stating formally, we can say Testing is a process of executing a program with the Intent
of finding an error. A successful test is one that uncovers an as yet undiscovered error.
A good test case is one that has a high probability of finding errors, if it exists. The test
are inadequate to detect possibly present errors. The software more or less confirms the
quality and reliable standards.

Testing can include various types, such as unit testing, integration testing, system
testing, and user acceptance testing. Each type focuses on different aspects of the
project and is conducted at different stages of the development lifecycle.

Testing methodologies, tools, and frameworks are employed to design and execute test
cases, track test results, and document any issues encountered. This helps ensure
consistency, repeatability, and traceability throughout the testing process.

52
Effective testing contributes to higher quality, increased user satisfaction, and
improved project success by minimizing the risk of functional or performance
issues and enhancing the overall reliability and robustness of the project.

1. Unit Testing: This level focuses on testing individual components or units of code in
isolation. It verifies that each unit functions correctly according to its specifications. Unit
testing is typically automated and forms the foundation of the testing pyramid.

2. Integration Testing: Integration testing involves testing the interaction and integration
between different components or modules of the system. It ensures that these components
work together as expected and validates their combined functionality.

3. System Testing: System testing evaluates the entire system as a whole. It verifies that all
components, modules, and subsystems work together properly and meet the specified
requirements. System testing covers functional, performance, and compatibility testing aspects.

53
4. User Acceptance Testing (UAT): UAT focuses on validating the system from the end
user's perspective. It ensures that the system meets user requirements, is usable, and
delivers a satisfactory user experience. UAT is usually performed by users or stakeholders.

These levels represent a hierarchical approach to testing, where each level builds upon the
previous one. Unit testing forms the foundation, followed by integration testing to validate
component interactions. System testing verifies the overall system behavior, and UAT ensures
user satisfaction.

The testing pyramid emphasizes the importance of early detection and prevention of defects at the
unit level, reducing the likelihood of issues propagating to higher levels.
It also promotes efficient and effective testing by allocating more testing effort to the lower levels
and fewer efforts at higher levels.

54
55
12. DATA VALIDATION CHECK

The main aim of testing is to verify that the software components does what it was
designed for.

Data validation is an essential aspect of a surveillance robot project to ensure the


accuracy, integrity, and reliability of the data collected and processed. Here are some key
data validation checks that can be implemented :

1. Data Type Validation: Verify that the data received from sensors, cameras, or other
sources is of the expected data type. This helps prevent errors and ensure compatibility
with subsequent data processing steps.

2. Range and Boundary Validation: Check if the data values fall within the expected range
or boundaries. For example, validate that sensor readings are within acceptable limits or
that coordinates are within the defined area of operation.

3. Format and Structure Validation: Ensure that the data follows the expected format or
structure. Validate timestamps, data formats, or specific data patterns, depending on the
requirements of the project.

4. Cross-Field Validation: Validate the consistency and logical relationships between


different data fields. For example, check that the timestamp of a captured image matches
the associated sensor readings.

5. Data Completeness Validation: Verify that all required data fields are present and
populated. This ensures that essential information is not missing and can prevent errors
in subsequent data analysis or processing.

56
6. Data Duplication Detection: Identify and handle any duplicate or redundant data entries
to maintain data integrity and avoid misleading or inaccurate results.

7. Real-time Data Validation: Perform validation in real-time, especially for time-sensitive


applications, to promptly identify and address any issues or anomalies in the data stream.

8. Error Handling and Logging: Implement mechanisms to handle and log validation errors
or anomalies. This helps track and troubleshoot issues, ensuring the data quality is
maintained.

By implementing these data validation checks, the surveillance robot project can ensure the
reliability and accuracy of the data collected, enhancing the effectiveness and
trustworthiness of the overall system.

57
58
59
13. IMPLEMENTATION

The implementation of a surveillance robot involves several key components and steps.

1. Hardware Setup: Assemble the necessary hardware components, including a Raspberry


Pi or similar microcontroller, motors, camera module, power supply, motor driver, and
other required sensors.

2. Software Development: Develop the software for controlling the surveillance robot. This
typically involves programming in languages such as Python or C/C++ and utilizing
libraries or frameworks compatible with the chosen hardware platform.

3. Motor Control: Implement code to control the motors and enable the robot's movement.
This includes functions for forward, backward, left turn, right turn, and stopping the
robot.

4. Camera Integration: Integrate the camera module with the robot and develop code to
capture images or record videos. Implement functionalities such as image processing,
motion detection, or object recognition as per project requirements.

5. Remote Control: Create mechanisms for remote control, allowing users to operate the
robot wirelessly using methods such as a mobile app, web interface, or joystick
controller.

6. Communication Setup: Establish communication protocols between the robot and the
remote control interface, enabling real-time data transmission, command execution, and
video streaming if required.

60
7. Power Management: Implement power management features to optimize battery usage
and ensure safe operation of the surveillance robot. This may involve implementing sleep
modes, low-power consumption strategies, or battery monitoring functionalities.

8. Testing and Refinement: Conduct extensive testing to ensure the proper functioning of the
surveillance robot. Test individual components, integration of hardware and software, data
transmission, and overall system performance. Refine and debug the code as necessary.

9. Deployment and Maintenance: Once the surveillance robot is fully functional, deploy it in
the intended environment and ensure ongoing maintenance, including periodic updates, bug
fixes, and hardware maintenance.

10.Live Streaming: Enable live streaming of video or images captured by the robot's camera
to a remote control interface or web platform. This allows real-time monitoring and
surveillance from a remote location.

11.Remote Access and Control: Implement secure remote access capabilities, allowing
authorized users to remotely control and monitor the surveillance robot from anywhere
with an internet connection. This could involve setting up secure protocols such as SSH
(Secure Shell) or VPN (Virtual Private Network).

12.Environmental Adaptability: Consider the environmental conditions in which the


surveillance robot will operate and make necessary adaptations. This could include
weatherproofing the robot, adding night vision capabilities, or integrating sensors to
detect environmental parameters like temperature or humidity.

61
14. SECURITY MEASURES TAKEN

Security in IOT is the act of securing Internet devices and the networks they’re connected to
from threats and breaches by protecting, identifying, and monitoring risks all while
helping fix vulnerabilities from a range of devices that can pose security risks all while
helping fix vulnerabilities from a range of devices that can pose security risks to your
business.

Devices are often remote, constrained , and isolated making them inherently Vulnerable and
expensive to service; Organizations must pragmatically adopt security in a way that does
not adversely affect the solution and/or operational costs.

Here are some key security measures :-

1. Secure Communication: Implement secure communication protocols to protect the


transmission of data between the surveillance robot and the remote control interface. This
can include using encryption techniques like Secure Sockets Layer (SSL) or Transport
Layer Security (TLS).

2. User Authentication and Access Control: Implement user authentication mechanisms to


ensure that only authorized individuals can access and control the surveillance robot. This
can involve username/password authentication, two-factor authentication, or biometric
authentication.

3. Data Encryption: Encrypt sensitive data stored on the surveillance robot or transmitted
over networks to prevent unauthorized access. Encryption algorithms such as Advanced
Encryption Standard (AES) can be employed to safeguard data confidentiality.

62
4. Firewall and Network Security: Configure firewalls and network security measures to
protect the surveillance robot from unauthorized access or external attacks. This includes
setting up network segmentation, disabling unnecessary services, and implementing
intrusion detection systems.

5. Firmware and Software Updates: Keep the firmware and software of the surveillance robot
up to date with the latest security patches and updates. Regularly check for vulnerabilities
and apply patches to address any identified security issues.

6. Physical Security: Implement physical security measures to protect the surveillance robot
from theft or tampering. This may include securing the robot in a locked enclosure, using
tamper-resistant hardware, or implementing GPS tracking mechanisms.

7. Data Privacy: Ensure compliance with data privacy regulations and guidelines by
implementing appropriate data anonymization and protection measures. Consider the
privacy implications of the collected data and establish policies for its proper handling and
storage.

8. Audit Logs and Monitoring: Implement logging and monitoring mechanisms to track
system activities, user actions, and potential security incidents. Regularly review audit logs
to detect any suspicious activities or unauthorized access attempts.

9. Penetration Testing: Conduct regular penetration testing or security assessments to identify


vulnerabilities in the surveillance robot system. This can help uncover potential security
weaknesses and allow for proactive security improvements.

63
10.Training and Awareness: Educate users and stakeholders about security best practices,
including password hygiene, safe network connections, and recognizing social engineering
attempts. Promote a security-conscious culture to minimize risks.

11.Secure Firmware and Software Development: Follow secure coding practices and conduct
thorough code reviews to identify and mitigate potential vulnerabilities in the firmware
and software of the surveillance robot. Use secure
development frameworks and libraries to minimize security risks.

12.Secure Storage and Data Handling: Employ secure storage mechanisms for sensitive data
collected by the surveillance robot. Encrypt data at rest to protect it from unauthorized
access in case of physical theft or tampering. Implement secure protocols for data
transmission and ensure secure handling of data during processing and storage.

13.Role-Based Access Control: Implement role-based access control (RBAC) to restrict


access privileges based on user roles. Assign specific permissions and access levels to
different user roles to limit unauthorized access and protect sensitive functionalities and
data.

14.Remote Monitoring and Alerts: Set up monitoring systems to continuously monitor the
operation and behavior of the surveillance robot. Implement mechanisms to generate
alerts and notifications in case of suspicious activities, system failures,
or unauthorized access attempts.

15.Physical Tampering Detection: Incorporate tamper detection mechanisms to detect any


physical tampering with the surveillance robot. This can include sensors or switches that
trigger an alert if the robot is moved or tampered with without authorization.

64
15. MAINTENANCE

IoT-based predictive maintenance enables you to monitor, maintain, and optimizes assests
for better availability, utilization and performance. You can gain better visibility into
assets via real-time monitoring, allowing you to predict machine and failure and identify
parts that need replacement.

1. Hardware Components: Summarize the costs of essential hardware components such as


Raspberry Pi or microcontroller board, camera module, motors,
motor driver, chassis, USB cables, jumper wires, power supply, display, and other
sensors or peripherals required for the project.

2. Software Development: If you're developing custom software for the surveillance robot,
mention any associated costs such as software development tools, licenses, or
frameworks utilized in the development process.

3. Additional Modules and Accessories: Include the costs of any additional modules or
accessories incorporated into the surveillance robot project, such as GPS modules,
wireless communication modules, infrared sensors, or other
specialized components.

4. Prototype Development and Testing: Consider the costs associated with prototyping and
testing, including any expenses related to 3D printing, fabrication of custom parts, or
purchasing materials for prototyping and testing iterations.

5. Tools and Equipment: Account for the costs of tools and equipment needed for
assembly, soldering, and testing, such as screwdrivers, pliers, soldering iron, multimeter,
and other relevant tools.

65
6. Documentation and Reporting: Allocate a portion of the cost estimation for documenting
the project, including expenses for writing project reports, printing materials, and any
necessary illustrations or diagrams.

7. Training and Workshops: If any external training or workshops were conducted to


enhance skills or knowledge related to the surveillance robot project, include the
associated costs in the estimation.

8. Contingency: It's advisable to set aside a portion of the budget as contingency to account
for unforeseen expenses or changes during the project implementation phase.

9. Miscellaneous Costs: Consider any miscellaneous expenses related to shipping or


delivery charges for components, taxes, or any other relevant costs not mentioned above..

66
16. LIMITATIONS AND FUTURE ENHANCEMENT

16.1 LIMITATIONS

1. Environmental Constraints: Surveillance robots may have limitations in


certain environmental conditions.Factors such as extreme temperatures,
excessive humidity, low light conditions, or uneven terrain can affect the robot's
performance and limit its usability in certain scenarios.

2. Limited Battery Life: Surveillance robots typically rely on battery power, which may
have limited operating time. Depending on the battery capacity and the power
requirements of the robot's components, the operational duration may be restricted,
requiring frequent recharging or battery replacements.

3. Restricted Mobility: Surveillance robots may have limitations in terms of mobility. For
example, they may face difficulties navigating obstacles, stairs, or rough terrains. The
design of the robot and the type of locomotion mechanism used can impact its mobility
and restrict its access to certain areas.

4. Limited Field of View: The camera or sensor system of a surveillance robot may have
limitations in terms of the field of view. This can impact the robot's ability to capture a
comprehensive view of the environment, leading to blind spots or limited coverage
areas.

5. Communication Range: Surveillance robots that rely on wireless communication may


have limitations in terms of the range and signal strength. The robot's ability to transmit
data or receive commands may be constrained by the distance from the control center or
the presence of physical barriers that obstruct the signal.

67
6. Data Processing and Storage Capacity: Depending on the onboard processing capabilities
and storage capacity of the robot, there may be limitations in terms of data processing and
storage. High-resolution video footage or extensive data collection may exceed the robot's
capabilities, requiring data offloading or compression.

7. Reliance on Stable Network Infrastructure: Surveillance robots often rely on a stable


network infrastructure for communication and remote control. Any disruptions or failures
in the network can affect the robot's functionality and real-time monitoring capabilities.

8. Human Intervention Requirements: Surveillance robots may require human intervention


for certain tasks such as maintenance, recharging batteries, or handling technical issues.
This reliance on human involvement can limit the robot's autonomy and scalability.

9. Cost and Affordability: Surveillance robot projects may face limitations in terms of cost
and affordability. The acquisition, development, and maintenance costs of the robot, along
with the associated infrastructure and software, can impose financial constraints on the
project's scalability and implementation.

10. Legal and Ethical Considerations: Surveillance robots must comply with legal and
ethical considerations, including privacy laws and regulations. Limitations may arise in
terms of data collection, storage, and usage to ensure compliance with privacy rights and
regulations.

11.Vulnerability to Manipulation or Hacking: Surveillance robots, like any IoT device, may
be vulnerable to manipulation or hacking attempts. Insufficient security measures or
vulnerabilities in the robot's software, communication protocols, can pose risks of
unauthorized access, malicious control over the robot's operations.

68
16.2 FUTURE ENHANCEMENT

1. Artificial Intelligence Integration: Incorporate advanced artificial intelligence (AI)


techniques, such as machine learning and computer vision algorithms, to
enhance the robot's perception and decision-making capabilities. This can enable the robot
to autonomously identify and track objects, recognize specific patterns or behaviors, and
provide more intelligent surveillance capabilities.

2. Enhanced Sensor Integration: Explore the integration of additional sensors, such as


thermal imaging cameras, gas sensors, or lidar systems, to expand the robot's sensing
capabilities. This can enable the robot to detect and respond to a wider range of
environmental conditions or potential security threats.

3. Swarm Robotics: Investigate the concept of swarm robotics, where multiple surveillance
robots can collaborate and coordinate their actions to cover larger areas or perform
complex surveillance tasks collectively. Implementing swarm intelligence algorithms
can optimize the efficiency and effectiveness of the surveillance robot system.

4. Edge Computing and Analytics: Implement edge computing capabilities on the


surveillance robot to enable real-time data processing and analysis. By performing data
analytics on the robot itself, it can provide immediate insights and alerts without relying
heavily on cloud-based processing, reducing latency and improving responsiveness.

5. Integration with Smart Home Systems: Integrate the surveillance robot with existing
smart home systems and devices to enhance home security and automation. This could
include integration with door/window sensors, smart locks, or alarm systems, allowing
the robot to respond to security events and provide comprehensive surveillance
coverage.

69
6. Autonomous Charging and Docking Stations: Develop autonomous charging and
docking stations where the surveillance robot can automatically navigate and dock itself
for recharging. This eliminates the need for manual intervention and ensures the robot
remains operational without interruption.

7. Improved Battery Technology: Keep an eye on advancements in battery technology to


benefit from longer-lasting and more efficient power sources. Incorporate improved
battery technologies, such as higher-capacity batteries or fast-charging solutions, to
extend the surveillance robot's operational time and reduce downtime.

8. Cloud Integration and Data Management: Explore the integration of cloud-based storage
and data management solutions to efficiently store and manage the vast amounts of data
collected by the surveillance robot. Cloud integration can also facilitate remote access to
surveillance footage and enable centralized data analysis and reporting.

9. User Interface and Control Enhancements: Enhance the user interface and control
mechanisms of the surveillance robot to make it more user-friendly and intuitive. This
could include developing mobile apps or web-based interfaces for easy monitoring,
control, and customization of surveillance settings.

10.Miniaturization and Form Factor Optimization: Continuously explore miniaturization


and form factor optimization to make the surveillance robot more compact, lightweight,
and inconspicuous. This enables the robot to navigate tight spaces, blend into the
environment, and operate with minimal interference.

70
ADVANTAGES

1. Enhanced Security: Surveillance robots provide an added layer of security by monitoring


and capturing video footage of the surrounding environment. They can be deployed in
various settings, such as homes, offices, or public spaces, to deter potential intruders and
provide a sense of safety.

2. Remote Monitoring: Surveillance robots enable remote monitoring of the surveillance


area, allowing users to access real-time video feeds and control the robot's movements
from a central location. This offers convenience and flexibility in monitoring
and surveillance operations.

3. Versatility and Adaptability: Surveillance robots can be designed and configured to adapt
to different environments and requirements. They can navigate both indoor and outdoor
spaces, handle various terrains, and be equipped with different sensors and cameras to suit
specific surveillance needs.

4. Cost-Effective Solution: Compared to traditional surveillance systems that require fixed


infrastructure and multiple cameras, surveillance robots can be a cost-effective solution.
They offer mobility and flexibility in coverage, reducing the need for installing and
maintaining multiple static cameras.

5. Quick Response and Intervention: In situations where immediate response or intervention


is required, surveillance robots can provide a rapid assessment of the situation and relay
critical information in real-time. This allows security personnel or authorities to take
prompt actions based on the robot's observations.

71
6. Non-Intrusive Monitoring: Surveillance robots can monitor areas without being obtrusive or
invasive, making them suitable for situations where discreet surveillance is necessary. They
can navigate through spaces without causing disturbances or infringing upon privacy rights.

7. Scalability and Expandability: Surveillance robot projects can be easily scaled up or


expanded to cover larger areas or accommodate additional robots. This scalability allows
for seamless integration into existing security systems or the deployment of multiple robots
to enhance surveillance capabilities.

8. Accessibility and Mobility: Surveillance robots can access areas that may be challenging or
hazardous for humans, such as narrow corridors, restricted zones, or areas with potential
risks. Their mobility enables them to reach places where fixed cameras cannot, ensuring
comprehensive surveillance coverage.

9. Real-Time Alerts and Notifications: Surveillance robots can be equipped with sensors to
detect specific events or anomalies, such as motion detection or intrusion alerts. When such
events occur, the robot can generate real-time notifications or alarms, enabling swift
responses to potential security breaches.

10.Documentation and Evidence: Surveillance robots provide documented evidence in the


form of video footage, which can be valuable for investigation, analysis, or legal purposes.
The recorded data can serve as a reliable source of evidence in identifying
suspects, verifying incidents, or resolving disputes.

72
17. BIBLIOGRAPHY

The following were referred to during the analysis and execution phase of the project.

WEBSITES :

 Robotic Security Guards" by The Verge :-


https://www.youtube.com/watch?v=ZiKf_n8QXrE

 The K5 Autonomous Data Machine: Security Robot


:- https://www.youtube.com/watch?v=H2QxFM9y0tY

 Introducing Spot" by Boston Dynamics :-


https://www.youtube.com/watch?v=wXRNjB-9XX4

 Georgia Tech Institute for Robotics and Intelligent Machines :-


https://www.robotics.gatech.edu/

 IEEE Robotics and Automation Society :


- https://www.ieee-ras.org/

https://www.skifilabs.com

https://www.google.com

73

You might also like