Velammal Institute of Technology: Border Intruder Detection System Using Mobile Sensor/Robotic Network
Velammal Institute of Technology: Border Intruder Detection System Using Mobile Sensor/Robotic Network
SOFTWARE REQUIREMENTS:
KEIL IDE
EMBEDDED C
MATLAB
HARDWARE REQUIREMENTS
AT89S52 MICROCONTROLLER:
Ultrasonic sensors (also known as transceivers when they both send and receive) work on a
principle similar to Radar or Sonar which evaluate attributes of a target by interpreting the
echoes from radio or sound waves respectively. Ultrasonic sensors generate high frequency
sound waves and evaluate the echo which is received back by the sensor. Sensors calculate the
time interval between sending the signal and receiving the echo to determine the distance to an
object.
An ultrasonic transducer is a device that converts energy into Ultrasound, or sound waves
above the normal range of human hearing. While technically a dog whistle is an ultrasonic
transducer that converts mechanical energy in the form of air pressure into ultrasonic sound
waves, the term is more apt to be used to refer to piezo-electric transducer that convert
electrical energy into sound.
PIN DEFINITION:
PIR SENSOR:
PIR is a pyro electric sensor module which developed for human body detection. A PIR
detector combined with a Fresnel lens are mounted on a compact size PCB together
with an analog IC, SB0061, and limited components to form the module. High level
output of variable width is provided.
PIR ( passive infra-red ) controller , using analog mixing digital design technique and
manufactures by CMOS Process which can either drive TRIAC or RELAY depending
on user’s choice. With special noise immunity technique , M7612 is the most stable
PIR controller you can find on the market
PIN DEFINITIONS:
VIBRATION SENSOR:
WSN is a specification for a suite of high level communication protocols using small,
low-power digital radios based on the IEEE 802.15.4-2003 standard for Low-Rate
Wireless Personal Area Networks (LR-WPANs), such as wireless light switches with
lamps, electrical meters with in-home-displays, consumer electronics equipment via
short-range radio needing low rates of data transfer.
WSN is a low-cost, low-power, wireless mesh networking standard. First, the low cost
allows the technology to be widely deployed in wireless control and monitoring
applications. Second, the low power-usage allows longer life with smaller batteries.
Third, the mesh networking provides high reliability and more extensive range
UART:
A universal asynchronous receiver/transmitter is a type of "asynchronous
receiver/transmitter", a piece of computer hardware that translates data between parallel
and serial forms. UARTs are commonly used in conjunction with other communication
standards such as EIA RS-232.
A UART is usually an individual (or part of an) integrated circuit used for serial
communications over a computer or peripheral device serial port. UARTs are now
commonly included in microcontrollers. A dual UART or DUART combines two UARTs
into a single chip. Many modern ICs now come with a UART that can also communicate
synchronously; these devices are called USARTs.
SOFTWARE REQUIREMENTS:
MATLAB SECTION:
FEATURE EXTRACTION:
In machine learning and pattern recognition and in image processing, feature
extraction starts from an initial set of measured data and builds derived values
(features) intended to be informative, non redundant, facilitating the subsequent
learning and generalization steps, in some cases leading to better human interpretations.
Feature extraction is related to dimensionality reduction.
When the input data to an algorithm is too large to be processed and it is suspected to
be redundant (e.g. the same measurement in both feet and meters, or the repetitiveness
of images presented as pixels), then it can be transformed into a reduced set of features
(also named features vector). This process is called feature extraction.
Feature extraction involves reducing the amount of resources required to describe a
large set of data. When performing analysis of complex data one of the major problems
stems from the number of variables involved. Analysis with a large number of variables
generally requires a large amount of memory and computation power or a classification
algorithm which over fits the training sample and generalizes poorly to new samples.
Feature extraction is a general term for methods of constructing combinations of the
variables to get around these problems while still describing the data with sufficient
accuracy.
EDGE DETECTION:
Edge detection is the name for a set of mathematical methods which aim at identifying points in a
digital image at which the image brightness changes sharply or, more formally, has
discontinuities. The points at which image brightness changes sharply are typically organized into a
set of curved line segments termed edges. The same problem of finding discontinuities in 1D
signals is known as step detection and the problem of finding signal discontinuities over time is
known as change detection. Edge detection is a fundamental tool in image processing, machine
vision and computer vision, particularly in the areas of feature detection and feature extraction.
HISTOGRAMS:
An image histogram is a type of histogram that acts as a graphical representation of the total
distribution in a digital image. It plots the number of pixels for each tonal value. By looking at the
histogram for a specific image a viewer will be able to judge the entire tonal distribution at a
glance.
Image histograms are present on many modern digital cameras. Photographers can use them as an
aid to show the distribution of tones captured, and whether image detail has been lost to blown-out
highlights or blacked-out shadows. This is less useful when using a raw image format, as the
dynamic range of the displayed image may only be an approximation to that in the raw file.
CONCLUSION:
The main aim of this project is to monitor the border and prevent any intrusion thus
providing security and promote legitimate transfer of goods and service. In this paper we
implemented a design robot to monitor the border and prevent any intrusion thus providing
security and promote legitimate transfer of goods and service. The sensor networks are
programmed with various user interfaces suitable for users of varying ability and for expert users
such that the system can be maintained easily and interacted very simply. For the future work, we
will consider the intruder that is able to make channel attack or other kinds of attacks to damage
the wireless sensor network. The intruders do not behave as they have intelligence that they can
make smart moves (e.g., avoid robot patrols, group together, move to positions that have been
patrolled, destroy the robots, etc.) in this paper. A more realistic opponent model that also affects
which group size performs better would be proposed in the future work.
THANK YOU