Sie sind auf Seite 1von 31

SSG Main Project Report 2011

1. INTRODUCTION

1.1 PREAMBLE

System surveillance using GPRS is a motion detection application that monitors your home,
office or any premise. This application records action triggered by motion as it happens. It’s
simple as connecting IR to the PC .The System can detect the intrusion when the IR signal is
break. At that time the mobile which is connected to the PC automatically call the owners mobile
phone. That indicates the intrusion detection. Then the owner can cut the call ,at that time a
message will be sent from the mobile connected to the PC and the owner can view the live
videos from home, office or any premise by following the link in the message.

1.2 TECHNOLOGY OVERVIEW AND APPLICATIONS

‘Security surveillance using gprs’ is a security system which detects any intrusion in our
house or office and alerts the user wherever he is. The user can also view the live videos

of the happenings in his house or office by following the link provided by the message sent
from the mobile connected to the PC.

1.3 MOTIVATION

The chief motivation behind developing this model is that usually in our daily activities
we come across many instances in which thieves have plundered our houses when we are not in
the house. The thieves cannot be caught because we have no evidence about the theft. But using
this system, we can find the thieves because the video of the intrusion is recorded. Thus we can
produce evidence for the police and for the court.

1.4 SCOPE AND OBJECTIVE

This project envisages a relief to the human beings by helping them to substitute the
manual work by the SSG. This is not only replacing the manual intervention but it will bring in

Department of IT University College Of Engineering, Kariavattom


1
SSG Main Project Report 2011

saving of time, energy as well as money. There is no need of any humans in this security system.
Once the system is started all is done by itself and thus human resource is saved. This project is
to relieve the human intervention whereby we get a uninterrupted services without any loss of
resources which is becoming a great threat to our mankind. Also we can relieve the tension of
any thieves attacking our house once we are outside. Any intrusion will be reported by the
system and we can have a live look at our home or office.

1.4 PROBLEM STATEMENT

Our endeavor here is to design and develop a small-scale SSG. The installations include
IR emitter, IR sensor and a webcam to record the videos . This prototype is an optimal device
for understanding the techniques used in the security surveillance system. The chief
functionalities that must be implemented as part of this can be enumerated as follows:-

 Intrusion Detection: Any intrusion after the server is started must be detected.

 User Alert: The mobile connected to the PC should send a message and also make
a call to the alert number provided

 Live Streaming:The Live videos of the place under surveillance should be


available by following the link provided in the message.
The above requirements must be satisfied by the software. Our problem here is to
implement a software that incorporates the foresaid requirements.

1.5 CONTRIBUTIONS

We have implemented a system that is operational now. Users need to be given a user
name and password by the administrator before they can log into the system. This is done to have
authenticated information about each user. A registered user can login every time he/she wishes
to use the system. The functioning of the software is easy to understand and is user-friendly.
The administrator is responsible for blocking or updating existing users and adding new
users.

Department of IT University College Of Engineering, Kariavattom


2
SSG Main Project Report 2011

2. SYSTEM STUDY

2.1. EXISTING TECHNIQUES


The existing system is a physical system in which humans should guard an intended
place. There is also another system in which an alarm go of when any intrusion is detected. But
this is of no use if there is nobody near the house or if it is a false alarm it might alert the
neighbors without any reason. There is also no evidence about the person who intruded into the
house.

2.2. PROPOSED SYSTEM

Security surveillance using GPRS is an application records action triggered by motion as


it happens. Whenever an intrusion occurs the system sends a signal by connecting IR to the PC.
System can detect the intrusion when the IR signal is break. At that time the mobile which is
connected to the pc automatically call the owners mobile phone. That indicates the intrusion
detection. Then the owner can disconnected the call and view live videos of intrusion
2.3. FEASIBILITY STUDY

This involves questions such as whether the firm can afford to build the system, whether
its benefits should substantially exceed its costs, and whether the project has higher priority and
profits than other projects that might use the same resources. Since the system is developed as
part of project work, there is no manual cost to spend for the proposed system. Also all the
resources are already available, it give an indication of the system is economically possible for
development.

2.3.1 ECONOMIC FEASIBILITY

Department of IT University College Of Engineering, Kariavattom


3
SSG Main Project Report 2011

This involves questions such as whether the firm can afford to build the system, whether
its benefits should substantially exceed its costs, and whether the project has higher priority and
profits than other projects that might use the same resources. Since the system is developed as
part of project work, there is no manual cost to spend for the proposed system. Also all the
resources are already available, it give an indication of the system is economically possible for
development.

2.3.2 TECHNICAL FEASIBILITY


The system is evaluated from the technical point view first. This involves questions such
as whether the technology needed for the system exists, how difficult it will be to build, and
whether the firm has enough experience using that technology. The assessment is based on an
outline design of system requirements in terms of Input, Output, Fields, Programs, and
Procedures. This can be qualified in terms of volumes of data, trends, frequency of updating, etc.
in order to give an introduction to the technical system. Security Surveillance Using GPRS is
developed using java technologies.

2.3.3 OPERATIONAL FEASIBILITY

Proposed system would be beneficial if they can be turned into information system that
will meet the organization operating requirements. One of the main problems faced during
development of a new system is getting acceptance from user. The test of operational feasibility
asks if the system will work when developed and installed. The tools selected for developing the
software are J2SE which are readily / freely available in the market. It is coded in such a way
that not much change occurs while operations are done.

2.3.4 LEGAL FEASIBILITY

Determines whether the proposed system conflicts with legal requirements, e.g. a data
processing system must comply with the local Data Protection Acts.

Department of IT University College Of Engineering, Kariavattom


4
SSG Main Project Report 2011

2. REQUIREMENT ANALYSIS & SPECIFICATION

3.1. INTRODUCTION
System surveillance using GPRS is a motion detection application that monitors your
home, office or any premise. This application records action triggered by motion as it happens.
It’s simple as connecting IR to the PC .The System can detect the intrusion when the IR signal is
break. At that time the mobile which is connected to the PC automatically call the owners mobile
phone. That indicates the intrusion detection. Then the owner can cut the call ,at that time a
message will be sent from the mobile connected to the PC and the owner can view the live
videos from home, office or any premise by following the link in the message.

3.1.1. PURPOSE
The purpose is to give an overview of our project. It provides a complete
overview of our project and also the specific requirements, functional requirements,
non functional requirements etc. which are needed to adequately design and
implement this software product. System surveillance using GPRS is a motion
detection application that monitors your home, office or any premise

3.1.2. SCOPE
(1)The scope of our project SSG is to create a flexible system for users and it is also easy to use
and modify.
(2)Features that come under the scope of our project: Intrusion Detection, Alerting User, Live
Video Streaming
Department of IT University College Of Engineering, Kariavattom
5
SSG Main Project Report 2011

3.2 GENERAL DESCRIPTION

3.2.1 PRODUCT PERSPECTIVE


In order to work this application, a computer is needed. Also a java implementing
software is needed. It also includes the possibility of expanding the system developed and the
technical guarantees of accuracy, reliability ease of access and also the data security.

3.2.2 PRODUCT FUNCTIONS


In our project SSG, we have the following modules:

• Intrusion Detection
• User Alert
• Live Video Streaming

The intrusion system detects any intrusion into the place under surveillance. The User
Alert part alerts the intended user whenever an intrusion occurs. The Live Video
Streaming part ensures that the user can the stream the live videos of the place by
following the link in the message.

3.3 .SPECIFIC REQUIREMENTS

3.3.1 HARDWARE REQUIREMENTS

Hardware requirement denotes the minimum hardware required for the successful
development and implementation of the project.

The following list specifies the hardware requirements for the successful development
and implementation of the project named ‘Security Surveillance Using GPRS’.

Processor: Pentium 4 and above

RAM: 512MB

Hard Disc: 40GB


MICROCONTROLLER: AT89C51

MICROCONTROLLER

A microcontroller (sometimes abbreviated µC, uC or MCU) is a small computer on a


single integrated circuit containing a processor core, memory, and programmable input/output

Department of IT University College Of Engineering, Kariavattom


6
SSG Main Project Report 2011

peripherals. Program memory in the form of NOR flash or OTP ROM is also often included on
chip, as well as a typically small amount of RAM. Microcontrollers are designed for embedded
applications, in contrast to the microprocessors used in personal computers or other general
purpose applications.

Microcontrollers are used in automatically controlled products and devices, such as


automobile engine control systems, implantable medical devices, remote controls, office
machines, appliances, power tools, and toys. By reducing the size and cost compared to a design
that uses a separate microprocessor, memory, and input/output devices, microcontrollers make it
economical to digitally control even more devices and processes. Mixed signal microcontrollers
are common, integrating analog components needed to control non-digital electronic systems.

Some microcontrollers may use four-bit words and operate at clock rate frequencies as
low as 4 kHz, for low power consumption (milliwatts or microwatts). They will generally have
the ability to retain functionality while waiting for an event such as a button press or other
interrupt; power consumption while sleeping (CPU clock and most peripherals off) may be just
nanowatts, making many of them well suited for long lasting battery applications. Other
microcontrollers may serve performance-critical roles, where they may need to act more like a
digital signal processor (DSP), with higher clock speeds and power consumption.

ATMEL AT89 SERIES

The Atmel AT89 series is an Intel 8051-compatible family of 8 bit microcontrollers


(µCs) manufactured by the Atmel Corporation.

Based on the Intel 8051 core, the AT89 series remains very popular as general purpose
microcontrollers, due to their industry standard instruction set, and low unit cost. This allows a
great amount of legacy code to be reused without modification in new applications. While
considerably less powerful than the newer AT90 series of AVR RISC microcontrollers, new
product development has continued with the AT89 series for the aforementioned advantages.

Of more recent times, the AT89 series has been augmented with 8051-cored special
function microcontrollers, specifically in the areas of USB, I²C (two wire interface), SPI and
CAN bus controllers, MP3 decoders and hardware PWM.

AT89C51

FEATURES

4K Bytes of In-System Reprogrammable Flash Memory


Fully Static Operation: 0 Hz to 24 MHz
Three-level Program Memory Lock
Department of IT University College Of Engineering, Kariavattom
7
SSG Main Project Report 2011

128 x 8-bit Internal RAM


32 Programmable I/O Lines
Two 16-bit Timer/Counters
Six Interrupt Sources
Programmable Serial Channel
Low-power Idle and Power-down Modes
40-pin DIP

PIN DESCRIPTION

Pin Number Description


1-8 P1.0 - P1.7 - Port 1
9 RST - Reset
10 - 17 P3.0 - P3.7 - Port 3
18 XTAL2 - Crystal
19 XTAL1 - Crystal
20 GND - Ground
21 - 28 P2.0 - P2.7 - Port 2
29 PSEN - Program Store Enable
30 ALE - Address Latch Enable
31 EA - External Access Enable
32 - 39 P0.7 - P0.1 - Port 0
40 Vcc - Positive Power Supply

Department of IT University College Of Engineering, Kariavattom


8
SSG Main Project Report 2011

PIN LAYOUT

SENSORS

IR SENSOR

Department of IT University College Of Engineering, Kariavattom


9
SSG Main Project Report 2011

WEBCAM

A webcam is a video camera which feeds its images in real time to a computer or computer
network, often via USB, Ethernet or Wi-Fi.

Their most popular use is the establishment of video links, permitting computers to act as
videophones or videoconference stations. This common use as a video camera for the World
Wide Web gave the webcam its name. Other popular uses include security surveillance and
computer vision.

Webcams are known for their low manufacturing cost and flexibility, making them the lowest
cost form of video telephony. They have also become a source of security and privacy issues, as
some built-in webcams can be remotely activated via spyware.

NOKIA N86

The Nokia N86 8MP is a Symbian Series 60 mobile phone. One of its main selling points is its
photography features

Department of IT University College Of Engineering, Kariavattom


10
SSG Main Project Report 2011

It was Nokia's first camera phone to have an 8 megapixel sensor, and features both multiple
aperture settings and a mechanical shutter (uncommon features by the standards of camera
phones), and a Carl Zeiss lens with a wide angle of view (28 mm equivalent). It also has auto
focus and a dual LED flash (3rd generation dual-LEDs), and an AF assist light. Video capture
resolution is 640 × 480 pixels (VGA) at 30 frames per second.

The N86 8MP has a toughened glass front cover and metal detailing. It is similar in specification
to the Nokia N85, with a 2.6-inch OLED display and the "dual-slider" form factor.It also has the
same kickback stand so it's possible to use as a small standalone screen, and it's possible to
configure the opening of the stand to launch applications such as the video player.

3.3.2 SOFTWARE REQUIREMENTS

Software Specification denotes the minimum support software required for the successful
development and implementation of the project.

Department of IT University College Of Engineering, Kariavattom


11
SSG Main Project Report 2011

The following list specifies the software support required for the successful development
and implementation of the project named ‘SSG’.

Technologies Used

Java 2 Standard Edition (JDK 1.6)

Windows XP

MySQL

MySQL Query Analyser

JAVA
Java is a programming language originally developed by James Gosling at Sun
Microsystems (which is now a subsidiary of Oracle Corporation) and released in 1995 as a core
component of Sun Microsystems' Java platform. The language derives much of its syntax from C
and C++ but has a simpler object model and fewer low-level facilities. Java applications are
typically compiled to bytecode (class file) that can run on any Java Virtual Machine (JVM)
regardless of computer architecture. Java is a general-purpose, concurrent, class-based, object-
oriented language that is specifically designed to have as few implementation dependencies as
possible. It is intended to let application developers "write once, run anywhere". Java is currently
one of the most popular programming languages in use, and is widely used from application
software to web applications.

Principles

There were five primary goals in the creation of the Java language.

1. It should be "simple, object oriented, and familiar".


2. It should be "robust and secure".
3. It should have "an architecture-neutral and portable environment".
4. It should execute with "high performance".
5. It should be "interpreted, threaded, and dynamic".

Java Platform

Characteristic of Java is portability, which means that computer programs written in the
Java language must run similarly on any supported hardware/operating-system platform. This is
achieved by compiling the Java language code to an intermediate representation called Java
bytecode, instead of directly to platform-specific machine code. Java bytecode instructions are

Department of IT University College Of Engineering, Kariavattom


12
SSG Main Project Report 2011

analogous to machine code, but are intended to be interpreted by a virtual machine (VM) written
specifically for the host hardware. End-users commonly use a Java Runtime Environment (JRE)
installed on their own machine for standalone Java applications, or in a Web browser for Java
applets.

Standardized libraries provide a generic way to access host-specific features such as


graphics, threading, and networking.

A major benefit of using bytecode is porting. However, the overhead of interpretation


means that interpreted programs almost always run more slowly than programs compiled to
native executables would. Just-in-Time compilers were introduced from an early stage that
compile bytecodes to machine code during runtime.

MySQL

MySQL is a relational database management system (RDBMS) that runs as a server


providing multi-user access to a number of databases. It is named after developer Michael
Widenius' daughter, My. The SQL phrase stands for Structured Query Language.

The MySQL development project has made its source code available under the terms of
the GNU General Public License, as well as under a variety of proprietary agreements. MySQL
was owned and sponsored by a single for-profit firm, the Swedish company MySQL AB, now
owned by Oracle Corporation.

Free-software-open source projects that require a full-featured database management


system often use MySQL. For commercial use, several paid editions are available, and offer
additional functionality. Some open source software project examples: Joomla, WordPress,
MyBB, phpBB, Drupal and other software built on the LAMP software stack. MySQL is also
used in many high-profile, large-scale World Wide Web products, including Wikipedia, Google
and Facebook

MySQL QUERY ANALYZER

The MySQL Query Analyzer helps you improve application performance by monitoring
query performance and accurately pinpointing SQL code that is causing a slow down. With the
new MySQL Connector Plug-ins, you can optimize performance for your Java and .Net
applications more efficiently by communicating directly with the Query Analyzer.

Queries are presented in an aggregated view across all MySQL servers so you can filter
for specific query problems and analyze your most expensive code. With the MySQL Query

Department of IT University College Of Engineering, Kariavattom


13
SSG Main Project Report 2011

Analyzer, you can improve the SQL code during active development, and continuously monitor
and tune the queries in production.

ASSEMBLY LANGUAGE

An assembly language is a low-level programming language for computers,


microprocessors, microcontrollers, and other programmable devices. It implements a symbolic
representation of the machine codes and other constants needed to program a given CPU
architecture. This representation is usually defined by the hardware manufacturer, and is based
on mnemonics that symbolize processing steps (instructions), processor registers, memory
locations, and other language features. An assembly language is thus specific to a certain
physical (or virtual) computer architecture. This is in contrast to most high-level programming
languages, which, ideally, are portable.

A utility program called an assembler is used to translate assembly language statements


into the target computer's machine code. The assembler performs a more or less isomorphic
translation (a one-to-one mapping) from mnemonic statements into machine instructions and
data. This is in contrast with high-level languages, in which a single statement generally results
in many machine instructions.

Many sophisticated assemblers offer additional mechanisms to facilitate program


development, control the assembly process, and aid debugging. In particular, most modern
assemblers include a macro facility and are called macro assemblers.

There are two types of assemblers based on how many passes through the source are
needed to produce the executable program.

• One-pass assemblers go through the source code once and assume that all symbols will
be defined before any instruction that references them.
• Two-pass assemblers create a table with all symbols and their values in the first pass,
then use the table in a second pass to generate code. The assembler must at least be able
to determine the length of each instruction on the first pass so that the addresses of
symbols can be calculated.

The advantage of a one-pass assembler is speed, which is not as important as it once was
with advances in computer speed and abilities. The advantage of the two-pass assembler is that
symbols can be defined anywhere in program source code. This lets programs be defined in more
logical and meaningful ways, making two-pass assembler programs easier to read and maintain.

3.3.3 EXTERNAL INTERFACE REQUIREMENTS


Department of IT University College Of Engineering, Kariavattom
14
SSG Main Project Report 2011

3.3.3.1.User Interfaces

-Describes how this product interfaces with the user.

-Sensors and PC.

3.3.3.2. Hardware Interface

This software can access different storage devices to access the files and to save them
after processing.
Processor: Intel Pentium Pro or Processor
Processor speed: 2.67 GHz
RAM: 512 MB
Hard Disk Capacity: 80 GB

3.3.3.3. Software Interfaces

This software does not have any interface with other software.
Package Used: J2SE
Software Used: JDK 1.6, My SQL
Operating System: Windows XP

3.3.3.4. Communications Interfaces

Serial port

3.3.4. FUNCTIONAL REQUIREMENTS


3.3.4.1. INTRUSION DETECTION

Any intrusion after the server is started should be detected. This is done by using a IR
emitter and IR sensor. The sensor is connected to the 8051 microcontroller which sends an
interrupt to the computer to which it is connected.

3.3.4.2. USER ALERT


Department of IT University College Of Engineering, Kariavattom
15
SSG Main Project Report 2011

Whenever there is an intrusion, the microcontroller sends an interrupt to the computer


system. There is an alert number that the user sets. A message showing the link of the video to be
streamed and also a call is made to the alert number.

3.3.4.3. LIVE VIDEO STREAMING

The user can view the live video of the place under surveillance by following the link
provided in the message.

3.3.5. NON-FUNCTIONAL REQUIREMENTS


3.3.5.1. Performance
The Java programming language is an object oriented programming language. Java is a
platform independent programming language developed by Sun Microsystems. In java, the code
is compiled to byte codes that are interpreted by Java virtual machines (JVM). This provides
portability to any machine for which a virtual machine has been written. The two steps of
compilation and interpretation allow for extensive code checking and improved security. Apart
from these, built-in exception handling strong type checking etc. make Java a truly robust
programming language. There are mainly three variations of it - J2SE, J2ME and J2EE. J2SE is
the standard edition of Java.

3.3.5.2. Reliability
The SSG system is reliable because it creates a flexible system for Users and it is easy to
use and modify.

3.3.5.3. Availability
Our system is available all times, meaning the system controls the devices around the
clock.

3.3.4.5. Maintainability
Maintainability is defined as the ease with which changes can be made to a software
system. These changes may be necessary for the correction of faults, adaptation of the system to
Department of IT University College Of Engineering, Kariavattom
16
SSG Main Project Report 2011

a meet a new requirement, addition of new functionality, removal of existing functionality or


corrected when errors or deficiencies occur and can be perfected, adapted or action taken to
reduce further maintenance costs.

3.3.4.6. Portability
The system is developed using the java programming language, java is a platform
independent language, so the server portion of the system can be operate in any OS.

4.SYSTEM DESIGN

Department of IT University College Of Engineering, Kariavattom


17
SSG Main Project Report 2011

Department of IT University College Of Engineering, Kariavattom


18
SSG Main Project Report 2011

4.1 DATA FLOW DIAGRAM

Department of IT University College Of Engineering, Kariavattom


19
SSG Main Project Report 2011

4.2 STATE TRANSITION DIAGRAM

5.SYSTEM IMPLEMENTATION
Department of IT University College Of Engineering, Kariavattom
20
SSG Main Project Report 2011

5.1. IMPLEMENTATION PLAN

Implementation is the stage of the project where the theoretical design is turned into a
working system. It can be considered to be the most crucial stage in achieving a successful new
system gaining the users confidence that the new system will work and will be effective and
accurate. It is primarily concerned with user training and documentation. Conversion usually
takes place about the same time the user is being trained or later. Implementation simply means
convening a new system design into operation, which is the process of converting a new revised
system design into an operational one.

5.2. TASK OF IMPLEMENTATION

It begins with preparing the implementation of the system. In this plan, discussion has
been made regarding the equipment, resources and how to test the activities.

The system was implemented by a different user to verify that the system works
effectively. And is giving confidence on the new system for the use that it will work efficiently
and effectively. It involves careful planning, investigation of the current system and its
constraints on implementation, design of methods to achieve the changeover, an evaluation, of
change over methods.

One of the most important development activities is the coding of programs. The system
flow charts are converted into modular programs. They have to be complied, tested and
debugged. The user requirements are achieved through building software be keeping in mind of
their requirements.

6. SYSTEM TESTING

Department of IT University College Of Engineering, Kariavattom


21
SSG Main Project Report 2011

6.1. BLACK BOXTESTING

It takes an external perspective of the test object to derive test cases. These test can be
functional or non-functional, though usually functional. The test designer selects valid and
invalid inputs and determines the correct output. There is no knowledge of the test object’s
internal structure.

6.2. WHITEBOX TESTING

Whitebox testing uses an internal perspective of the system to design test cases based on
the internal structure. It requires programming skills to identify all path through the software.
While whitebox testing is applicable at the unit, integration and system levels of the software
testing process, it is typically applied to the unit. While it normally tests paths with in a unit, it
can also test paths between units during integration and between subsystems during a system
level test. Though this method of test design can uncover an overwhelming number of test cases,
it might not detect unimplemented parts of the specification or missing requirements, but one can
be sure that all parts through the test objects are executed.

6.3. INTEGRATION TESTING

Data can be lost across the interfaces; one module can have an adverse effect on the
other; sub functions when combined, may not produce the desired major functions. The
integration testing is a systematic testing for constructing the programs structure, while at the
same time conducting tests to uncover errors associated within the interface. The objective is to
take unit tested module and build a program structure. All the modules are combined and tested
as a whole. Here correction is difficult because the vast expenses of the entire program
complicate the isolation of causes. Thus in the integration testing step, all the errors uncovered
are corrected for the next testing steps.

6.4. TESTING METHODOLOGY USED

The testing methodology used is the unit testing and validation testing. This ensures
that all the modules are worked as per we are specified. As each program is coded, test data are
prepared and documented to ensure that all aspects of the program are properly tested. The path
of operation from origin to destination is carefully be tested, whether they are taken the right
path. Finally, we checked whether the project is user-oriented vehicle. Finally, all error handling
paths are tested. Validation is the final step in testing.

Department of IT University College Of Engineering, Kariavattom


22
SSG Main Project Report 2011

7. MAINTENANCE
Maintenance follows conversion to extend that changes are necessary to maintain
satisfactory operations relative to changes in the user’s environment. Maintenance often includes
minor enhancements or corrections to problems that surface in the system’s operation. Any
system developed should be secured and protected against possible hazards It is performed most
often to improve the existing software rather than to a crisis or risk failure as user requirements
change, software and documentation should be changed as part of the maintenance work. It is
during system maintenance that the analyst.

• Resolves necessary changes


• Correct errors
• Enhances or modifies the system
• Assigns staff to perform maintenance activities
• Provides for scheduled maintenance

Writing systems that requires as little maintenance as possible is one of the primary goals
as well as one of the benefits of today’s modern methodology of software development.

Department of IT University College Of Engineering, Kariavattom


23
SSG Main Project Report 2011

8. SCREENSHOTS
8.1 LOGIN PAGE

Department of IT University College Of Engineering, Kariavattom


24
SSG Main Project Report 2011

8.2 HOMEPAGE

Department of IT University College Of Engineering, Kariavattom


25
SSG Main Project Report 2011

8.3 NEW USER

Department of IT University College Of Engineering, Kariavattom


26
SSG Main Project Report 2011

8.4 EXISTING USER

Department of IT University College Of Engineering, Kariavattom


27
SSG Main Project Report 2011

8.5 RECORDED VIDEO

Department of IT University College Of Engineering, Kariavattom


28
SSG Main Project Report 2011

8.6 ALERT SETTINGS

Department of IT University College Of Engineering, Kariavattom


29
SSG Main Project Report 2011

9. CONCLUSION

Security surveillance using GPRS is a motion detection application that monitors your
home, office or any premise. This application records action triggered by motion as it happens.
It’s simple as connecting IR to the PC .The System can detect the intrusion when the IR signal is
break. At that time the mobile which is connected to the PC automatically call the owners mobile
phone. That indicates the intrusion detection. Then the owner can cut the call ,at that time a
message will be sent from the mobile connected to the PC and the owner can view the live
videos from home, office or any premise by following the link in the message.

We are able to provide a user friendly system for the surveillance of any place which can be
used by anyone who posess basic knowledge of computers. We are able to install this system
anywhere irrespective of house or office and provide a serious security system.

Department of IT University College Of Engineering, Kariavattom


30
SSG Main Project Report 2011

10.REFERENCE

• Bunnell, D. & Brate, A. (2001). Die Cisco Story (in German). Moderne
Industrie. ISBN 3-478-35995-3.
• Bunnell, D. (2000). Making the Cisco Connection: The Story Behind the Real
Internet Superpower. Wiley. ISBN 0-471-35711-1.
• Paulson, E. (2001). Inside Cisco: The Real Story of Sustained M&A Growth.
Wiley. ISBN 0-471-41425-5.
• Slater, R. (2003). The Eye of the Storm: How John Chambers Steered Cisco
Through the Technology Collapse. HarperCollins. ISBN 0-06-018887-1.
• Stauffer, D. (2001). Nothing but Net Business the Cisco Way. Wiley. ISBN 1-
84112-087-1.
• Waters, J. K. (2002). John Chambers and the Cisco Way: Navigating Through
Volatility. Wiley. ISBN 0-471-00833-8.
• Young, J. S. (2001). Cisco Unauthorized: Inside the High-Stakes Race to Own
the Future. Prima Lifestyles. ISBN 0-7615-2775-3.

Department of IT University College Of Engineering, Kariavattom


31

Das könnte Ihnen auch gefallen