Beruflich Dokumente
Kultur Dokumente
1. INTRODUCTION
1.1 PREAMBLE
System surveillance using GPRS is a motion detection application that monitors your home,
office or any premise. This application records action triggered by motion as it happens. It’s
simple as connecting IR to the PC .The System can detect the intrusion when the IR signal is
break. At that time the mobile which is connected to the PC automatically call the owners mobile
phone. That indicates the intrusion detection. Then the owner can cut the call ,at that time a
message will be sent from the mobile connected to the PC and the owner can view the live
videos from home, office or any premise by following the link in the message.
‘Security surveillance using gprs’ is a security system which detects any intrusion in our
house or office and alerts the user wherever he is. The user can also view the live videos
of the happenings in his house or office by following the link provided by the message sent
from the mobile connected to the PC.
1.3 MOTIVATION
The chief motivation behind developing this model is that usually in our daily activities
we come across many instances in which thieves have plundered our houses when we are not in
the house. The thieves cannot be caught because we have no evidence about the theft. But using
this system, we can find the thieves because the video of the intrusion is recorded. Thus we can
produce evidence for the police and for the court.
This project envisages a relief to the human beings by helping them to substitute the
manual work by the SSG. This is not only replacing the manual intervention but it will bring in
saving of time, energy as well as money. There is no need of any humans in this security system.
Once the system is started all is done by itself and thus human resource is saved. This project is
to relieve the human intervention whereby we get a uninterrupted services without any loss of
resources which is becoming a great threat to our mankind. Also we can relieve the tension of
any thieves attacking our house once we are outside. Any intrusion will be reported by the
system and we can have a live look at our home or office.
Our endeavor here is to design and develop a small-scale SSG. The installations include
IR emitter, IR sensor and a webcam to record the videos . This prototype is an optimal device
for understanding the techniques used in the security surveillance system. The chief
functionalities that must be implemented as part of this can be enumerated as follows:-
Intrusion Detection: Any intrusion after the server is started must be detected.
User Alert: The mobile connected to the PC should send a message and also make
a call to the alert number provided
1.5 CONTRIBUTIONS
We have implemented a system that is operational now. Users need to be given a user
name and password by the administrator before they can log into the system. This is done to have
authenticated information about each user. A registered user can login every time he/she wishes
to use the system. The functioning of the software is easy to understand and is user-friendly.
The administrator is responsible for blocking or updating existing users and adding new
users.
2. SYSTEM STUDY
This involves questions such as whether the firm can afford to build the system, whether
its benefits should substantially exceed its costs, and whether the project has higher priority and
profits than other projects that might use the same resources. Since the system is developed as
part of project work, there is no manual cost to spend for the proposed system. Also all the
resources are already available, it give an indication of the system is economically possible for
development.
This involves questions such as whether the firm can afford to build the system, whether
its benefits should substantially exceed its costs, and whether the project has higher priority and
profits than other projects that might use the same resources. Since the system is developed as
part of project work, there is no manual cost to spend for the proposed system. Also all the
resources are already available, it give an indication of the system is economically possible for
development.
Proposed system would be beneficial if they can be turned into information system that
will meet the organization operating requirements. One of the main problems faced during
development of a new system is getting acceptance from user. The test of operational feasibility
asks if the system will work when developed and installed. The tools selected for developing the
software are J2SE which are readily / freely available in the market. It is coded in such a way
that not much change occurs while operations are done.
Determines whether the proposed system conflicts with legal requirements, e.g. a data
processing system must comply with the local Data Protection Acts.
3.1. INTRODUCTION
System surveillance using GPRS is a motion detection application that monitors your
home, office or any premise. This application records action triggered by motion as it happens.
It’s simple as connecting IR to the PC .The System can detect the intrusion when the IR signal is
break. At that time the mobile which is connected to the PC automatically call the owners mobile
phone. That indicates the intrusion detection. Then the owner can cut the call ,at that time a
message will be sent from the mobile connected to the PC and the owner can view the live
videos from home, office or any premise by following the link in the message.
3.1.1. PURPOSE
The purpose is to give an overview of our project. It provides a complete
overview of our project and also the specific requirements, functional requirements,
non functional requirements etc. which are needed to adequately design and
implement this software product. System surveillance using GPRS is a motion
detection application that monitors your home, office or any premise
3.1.2. SCOPE
(1)The scope of our project SSG is to create a flexible system for users and it is also easy to use
and modify.
(2)Features that come under the scope of our project: Intrusion Detection, Alerting User, Live
Video Streaming
Department of IT University College Of Engineering, Kariavattom
5
SSG Main Project Report 2011
• Intrusion Detection
• User Alert
• Live Video Streaming
The intrusion system detects any intrusion into the place under surveillance. The User
Alert part alerts the intended user whenever an intrusion occurs. The Live Video
Streaming part ensures that the user can the stream the live videos of the place by
following the link in the message.
Hardware requirement denotes the minimum hardware required for the successful
development and implementation of the project.
The following list specifies the hardware requirements for the successful development
and implementation of the project named ‘Security Surveillance Using GPRS’.
RAM: 512MB
MICROCONTROLLER
peripherals. Program memory in the form of NOR flash or OTP ROM is also often included on
chip, as well as a typically small amount of RAM. Microcontrollers are designed for embedded
applications, in contrast to the microprocessors used in personal computers or other general
purpose applications.
Some microcontrollers may use four-bit words and operate at clock rate frequencies as
low as 4 kHz, for low power consumption (milliwatts or microwatts). They will generally have
the ability to retain functionality while waiting for an event such as a button press or other
interrupt; power consumption while sleeping (CPU clock and most peripherals off) may be just
nanowatts, making many of them well suited for long lasting battery applications. Other
microcontrollers may serve performance-critical roles, where they may need to act more like a
digital signal processor (DSP), with higher clock speeds and power consumption.
Based on the Intel 8051 core, the AT89 series remains very popular as general purpose
microcontrollers, due to their industry standard instruction set, and low unit cost. This allows a
great amount of legacy code to be reused without modification in new applications. While
considerably less powerful than the newer AT90 series of AVR RISC microcontrollers, new
product development has continued with the AT89 series for the aforementioned advantages.
Of more recent times, the AT89 series has been augmented with 8051-cored special
function microcontrollers, specifically in the areas of USB, I²C (two wire interface), SPI and
CAN bus controllers, MP3 decoders and hardware PWM.
AT89C51
FEATURES
PIN DESCRIPTION
PIN LAYOUT
SENSORS
IR SENSOR
WEBCAM
A webcam is a video camera which feeds its images in real time to a computer or computer
network, often via USB, Ethernet or Wi-Fi.
Their most popular use is the establishment of video links, permitting computers to act as
videophones or videoconference stations. This common use as a video camera for the World
Wide Web gave the webcam its name. Other popular uses include security surveillance and
computer vision.
Webcams are known for their low manufacturing cost and flexibility, making them the lowest
cost form of video telephony. They have also become a source of security and privacy issues, as
some built-in webcams can be remotely activated via spyware.
NOKIA N86
The Nokia N86 8MP is a Symbian Series 60 mobile phone. One of its main selling points is its
photography features
It was Nokia's first camera phone to have an 8 megapixel sensor, and features both multiple
aperture settings and a mechanical shutter (uncommon features by the standards of camera
phones), and a Carl Zeiss lens with a wide angle of view (28 mm equivalent). It also has auto
focus and a dual LED flash (3rd generation dual-LEDs), and an AF assist light. Video capture
resolution is 640 × 480 pixels (VGA) at 30 frames per second.
The N86 8MP has a toughened glass front cover and metal detailing. It is similar in specification
to the Nokia N85, with a 2.6-inch OLED display and the "dual-slider" form factor.It also has the
same kickback stand so it's possible to use as a small standalone screen, and it's possible to
configure the opening of the stand to launch applications such as the video player.
Software Specification denotes the minimum support software required for the successful
development and implementation of the project.
The following list specifies the software support required for the successful development
and implementation of the project named ‘SSG’.
Technologies Used
Windows XP
MySQL
JAVA
Java is a programming language originally developed by James Gosling at Sun
Microsystems (which is now a subsidiary of Oracle Corporation) and released in 1995 as a core
component of Sun Microsystems' Java platform. The language derives much of its syntax from C
and C++ but has a simpler object model and fewer low-level facilities. Java applications are
typically compiled to bytecode (class file) that can run on any Java Virtual Machine (JVM)
regardless of computer architecture. Java is a general-purpose, concurrent, class-based, object-
oriented language that is specifically designed to have as few implementation dependencies as
possible. It is intended to let application developers "write once, run anywhere". Java is currently
one of the most popular programming languages in use, and is widely used from application
software to web applications.
Principles
There were five primary goals in the creation of the Java language.
Java Platform
Characteristic of Java is portability, which means that computer programs written in the
Java language must run similarly on any supported hardware/operating-system platform. This is
achieved by compiling the Java language code to an intermediate representation called Java
bytecode, instead of directly to platform-specific machine code. Java bytecode instructions are
analogous to machine code, but are intended to be interpreted by a virtual machine (VM) written
specifically for the host hardware. End-users commonly use a Java Runtime Environment (JRE)
installed on their own machine for standalone Java applications, or in a Web browser for Java
applets.
MySQL
The MySQL development project has made its source code available under the terms of
the GNU General Public License, as well as under a variety of proprietary agreements. MySQL
was owned and sponsored by a single for-profit firm, the Swedish company MySQL AB, now
owned by Oracle Corporation.
The MySQL Query Analyzer helps you improve application performance by monitoring
query performance and accurately pinpointing SQL code that is causing a slow down. With the
new MySQL Connector Plug-ins, you can optimize performance for your Java and .Net
applications more efficiently by communicating directly with the Query Analyzer.
Queries are presented in an aggregated view across all MySQL servers so you can filter
for specific query problems and analyze your most expensive code. With the MySQL Query
Analyzer, you can improve the SQL code during active development, and continuously monitor
and tune the queries in production.
ASSEMBLY LANGUAGE
There are two types of assemblers based on how many passes through the source are
needed to produce the executable program.
• One-pass assemblers go through the source code once and assume that all symbols will
be defined before any instruction that references them.
• Two-pass assemblers create a table with all symbols and their values in the first pass,
then use the table in a second pass to generate code. The assembler must at least be able
to determine the length of each instruction on the first pass so that the addresses of
symbols can be calculated.
The advantage of a one-pass assembler is speed, which is not as important as it once was
with advances in computer speed and abilities. The advantage of the two-pass assembler is that
symbols can be defined anywhere in program source code. This lets programs be defined in more
logical and meaningful ways, making two-pass assembler programs easier to read and maintain.
3.3.3.1.User Interfaces
This software can access different storage devices to access the files and to save them
after processing.
Processor: Intel Pentium Pro or Processor
Processor speed: 2.67 GHz
RAM: 512 MB
Hard Disk Capacity: 80 GB
This software does not have any interface with other software.
Package Used: J2SE
Software Used: JDK 1.6, My SQL
Operating System: Windows XP
Serial port
Any intrusion after the server is started should be detected. This is done by using a IR
emitter and IR sensor. The sensor is connected to the 8051 microcontroller which sends an
interrupt to the computer to which it is connected.
The user can view the live video of the place under surveillance by following the link
provided in the message.
3.3.5.2. Reliability
The SSG system is reliable because it creates a flexible system for Users and it is easy to
use and modify.
3.3.5.3. Availability
Our system is available all times, meaning the system controls the devices around the
clock.
3.3.4.5. Maintainability
Maintainability is defined as the ease with which changes can be made to a software
system. These changes may be necessary for the correction of faults, adaptation of the system to
Department of IT University College Of Engineering, Kariavattom
16
SSG Main Project Report 2011
3.3.4.6. Portability
The system is developed using the java programming language, java is a platform
independent language, so the server portion of the system can be operate in any OS.
4.SYSTEM DESIGN
5.SYSTEM IMPLEMENTATION
Department of IT University College Of Engineering, Kariavattom
20
SSG Main Project Report 2011
Implementation is the stage of the project where the theoretical design is turned into a
working system. It can be considered to be the most crucial stage in achieving a successful new
system gaining the users confidence that the new system will work and will be effective and
accurate. It is primarily concerned with user training and documentation. Conversion usually
takes place about the same time the user is being trained or later. Implementation simply means
convening a new system design into operation, which is the process of converting a new revised
system design into an operational one.
It begins with preparing the implementation of the system. In this plan, discussion has
been made regarding the equipment, resources and how to test the activities.
The system was implemented by a different user to verify that the system works
effectively. And is giving confidence on the new system for the use that it will work efficiently
and effectively. It involves careful planning, investigation of the current system and its
constraints on implementation, design of methods to achieve the changeover, an evaluation, of
change over methods.
One of the most important development activities is the coding of programs. The system
flow charts are converted into modular programs. They have to be complied, tested and
debugged. The user requirements are achieved through building software be keeping in mind of
their requirements.
6. SYSTEM TESTING
It takes an external perspective of the test object to derive test cases. These test can be
functional or non-functional, though usually functional. The test designer selects valid and
invalid inputs and determines the correct output. There is no knowledge of the test object’s
internal structure.
Whitebox testing uses an internal perspective of the system to design test cases based on
the internal structure. It requires programming skills to identify all path through the software.
While whitebox testing is applicable at the unit, integration and system levels of the software
testing process, it is typically applied to the unit. While it normally tests paths with in a unit, it
can also test paths between units during integration and between subsystems during a system
level test. Though this method of test design can uncover an overwhelming number of test cases,
it might not detect unimplemented parts of the specification or missing requirements, but one can
be sure that all parts through the test objects are executed.
Data can be lost across the interfaces; one module can have an adverse effect on the
other; sub functions when combined, may not produce the desired major functions. The
integration testing is a systematic testing for constructing the programs structure, while at the
same time conducting tests to uncover errors associated within the interface. The objective is to
take unit tested module and build a program structure. All the modules are combined and tested
as a whole. Here correction is difficult because the vast expenses of the entire program
complicate the isolation of causes. Thus in the integration testing step, all the errors uncovered
are corrected for the next testing steps.
The testing methodology used is the unit testing and validation testing. This ensures
that all the modules are worked as per we are specified. As each program is coded, test data are
prepared and documented to ensure that all aspects of the program are properly tested. The path
of operation from origin to destination is carefully be tested, whether they are taken the right
path. Finally, we checked whether the project is user-oriented vehicle. Finally, all error handling
paths are tested. Validation is the final step in testing.
7. MAINTENANCE
Maintenance follows conversion to extend that changes are necessary to maintain
satisfactory operations relative to changes in the user’s environment. Maintenance often includes
minor enhancements or corrections to problems that surface in the system’s operation. Any
system developed should be secured and protected against possible hazards It is performed most
often to improve the existing software rather than to a crisis or risk failure as user requirements
change, software and documentation should be changed as part of the maintenance work. It is
during system maintenance that the analyst.
Writing systems that requires as little maintenance as possible is one of the primary goals
as well as one of the benefits of today’s modern methodology of software development.
8. SCREENSHOTS
8.1 LOGIN PAGE
8.2 HOMEPAGE
9. CONCLUSION
Security surveillance using GPRS is a motion detection application that monitors your
home, office or any premise. This application records action triggered by motion as it happens.
It’s simple as connecting IR to the PC .The System can detect the intrusion when the IR signal is
break. At that time the mobile which is connected to the PC automatically call the owners mobile
phone. That indicates the intrusion detection. Then the owner can cut the call ,at that time a
message will be sent from the mobile connected to the PC and the owner can view the live
videos from home, office or any premise by following the link in the message.
We are able to provide a user friendly system for the surveillance of any place which can be
used by anyone who posess basic knowledge of computers. We are able to install this system
anywhere irrespective of house or office and provide a serious security system.
10.REFERENCE
• Bunnell, D. & Brate, A. (2001). Die Cisco Story (in German). Moderne
Industrie. ISBN 3-478-35995-3.
• Bunnell, D. (2000). Making the Cisco Connection: The Story Behind the Real
Internet Superpower. Wiley. ISBN 0-471-35711-1.
• Paulson, E. (2001). Inside Cisco: The Real Story of Sustained M&A Growth.
Wiley. ISBN 0-471-41425-5.
• Slater, R. (2003). The Eye of the Storm: How John Chambers Steered Cisco
Through the Technology Collapse. HarperCollins. ISBN 0-06-018887-1.
• Stauffer, D. (2001). Nothing but Net Business the Cisco Way. Wiley. ISBN 1-
84112-087-1.
• Waters, J. K. (2002). John Chambers and the Cisco Way: Navigating Through
Volatility. Wiley. ISBN 0-471-00833-8.
• Young, J. S. (2001). Cisco Unauthorized: Inside the High-Stakes Race to Own
the Future. Prima Lifestyles. ISBN 0-7615-2775-3.