Cloud Controlled Intrusion Detection and Burglary Prevention Stratagems in Home Automation Systems
-
Upload
rajashree-shree -
Category
Education
-
view
102 -
download
2
Transcript of Cloud Controlled Intrusion Detection and Burglary Prevention Stratagems in Home Automation Systems
![Page 1: Cloud Controlled Intrusion Detection and Burglary Prevention Stratagems in Home Automation Systems](https://reader036.fdocuments.us/reader036/viewer/2022062513/55763e2fd8b42ac31b8b46f7/html5/thumbnails/1.jpg)
Cloud Controlled Intrusion Detection & Burglary Prevention Stratagems in
Home Automation Systems
Presented by,
RAJASHREE
![Page 2: Cloud Controlled Intrusion Detection and Burglary Prevention Stratagems in Home Automation Systems](https://reader036.fdocuments.us/reader036/viewer/2022062513/55763e2fd8b42ac31b8b46f7/html5/thumbnails/2.jpg)
IntroductionBlock diagramComponentsApplicationsPros and consApplicationsreference
CONTENTS
![Page 3: Cloud Controlled Intrusion Detection and Burglary Prevention Stratagems in Home Automation Systems](https://reader036.fdocuments.us/reader036/viewer/2022062513/55763e2fd8b42ac31b8b46f7/html5/thumbnails/3.jpg)
SECURITY SURVEILLANCE PART TAKES IN SIGNIFICANT NUMBER OF HOME AUTOMATION SYSTEMS, DEPLOYING SENSORS TO AVOID BURGLARY
INTRODUCTION
![Page 4: Cloud Controlled Intrusion Detection and Burglary Prevention Stratagems in Home Automation Systems](https://reader036.fdocuments.us/reader036/viewer/2022062513/55763e2fd8b42ac31b8b46f7/html5/thumbnails/4.jpg)
P89v51RD2
UART
MAX232
Power supply
pc
BLOCK DIAGRAM
![Page 5: Cloud Controlled Intrusion Detection and Burglary Prevention Stratagems in Home Automation Systems](https://reader036.fdocuments.us/reader036/viewer/2022062513/55763e2fd8b42ac31b8b46f7/html5/thumbnails/5.jpg)
![Page 6: Cloud Controlled Intrusion Detection and Burglary Prevention Stratagems in Home Automation Systems](https://reader036.fdocuments.us/reader036/viewer/2022062513/55763e2fd8b42ac31b8b46f7/html5/thumbnails/6.jpg)
PROJECT OVERVIEWIntrusion detected.Report intrusion to cloud server.Notify user with SMS.User seeks surveillance views.Output from surveillance cameras are streamed to cloud.User views the status of all rooms.User confirms real intrusion.Action 1: inform neighbors.Action 2: inform police.Action 3:ringing alarms bell sounds
![Page 7: Cloud Controlled Intrusion Detection and Burglary Prevention Stratagems in Home Automation Systems](https://reader036.fdocuments.us/reader036/viewer/2022062513/55763e2fd8b42ac31b8b46f7/html5/thumbnails/7.jpg)
EMBEDDED CKEIL FLASH MAGIC
SOFTWARE REQUIREMENT
![Page 8: Cloud Controlled Intrusion Detection and Burglary Prevention Stratagems in Home Automation Systems](https://reader036.fdocuments.us/reader036/viewer/2022062513/55763e2fd8b42ac31b8b46f7/html5/thumbnails/8.jpg)
HARDWARE REQUIREMENT
P89V51RD2 MICROCONTROLLERRS232 & MAX 232PIR SENSORGSMCAMERALCD DISPLAYBUZZER
![Page 9: Cloud Controlled Intrusion Detection and Burglary Prevention Stratagems in Home Automation Systems](https://reader036.fdocuments.us/reader036/viewer/2022062513/55763e2fd8b42ac31b8b46f7/html5/thumbnails/9.jpg)
FEATURES:-
P89V51RD2 MICROCONTROLLER
8 BIT PHILIPS PROCESSOR40 PIN IC16 BIT ADDRESS BUS128 BYTE ROM4K RAM1-UART2- TIMERS4-I/O PORTS6-INTERRUPTS
![Page 10: Cloud Controlled Intrusion Detection and Burglary Prevention Stratagems in Home Automation Systems](https://reader036.fdocuments.us/reader036/viewer/2022062513/55763e2fd8b42ac31b8b46f7/html5/thumbnails/10.jpg)
RS232 & MAX 232
![Page 11: Cloud Controlled Intrusion Detection and Burglary Prevention Stratagems in Home Automation Systems](https://reader036.fdocuments.us/reader036/viewer/2022062513/55763e2fd8b42ac31b8b46f7/html5/thumbnails/11.jpg)
PIR SENSOR
PIR sensors allows to sense motion.
Detects whether a human has moved In or out of the sensor range
low cost & easy to use
![Page 12: Cloud Controlled Intrusion Detection and Burglary Prevention Stratagems in Home Automation Systems](https://reader036.fdocuments.us/reader036/viewer/2022062513/55763e2fd8b42ac31b8b46f7/html5/thumbnails/12.jpg)
GSMGsm was introduced in 1991Digital cellular systemUses TDMA
![Page 13: Cloud Controlled Intrusion Detection and Burglary Prevention Stratagems in Home Automation Systems](https://reader036.fdocuments.us/reader036/viewer/2022062513/55763e2fd8b42ac31b8b46f7/html5/thumbnails/13.jpg)
WIRELESS CAMERATransmit a video and audio signal to a wireless receiver through a radio band.
Low cost
Flexible to install
![Page 14: Cloud Controlled Intrusion Detection and Burglary Prevention Stratagems in Home Automation Systems](https://reader036.fdocuments.us/reader036/viewer/2022062513/55763e2fd8b42ac31b8b46f7/html5/thumbnails/14.jpg)
LCD DISPLAYSpecial thin flat panel that can let light go through it, or can block the light.
16 characters x 2 lines LCD, Parallel Display with LED backlight.
Max input voltage is 5.3V DC
![Page 15: Cloud Controlled Intrusion Detection and Burglary Prevention Stratagems in Home Automation Systems](https://reader036.fdocuments.us/reader036/viewer/2022062513/55763e2fd8b42ac31b8b46f7/html5/thumbnails/15.jpg)
BUZZERAn electrical signaling device that
Makes a buzzing sound
![Page 16: Cloud Controlled Intrusion Detection and Burglary Prevention Stratagems in Home Automation Systems](https://reader036.fdocuments.us/reader036/viewer/2022062513/55763e2fd8b42ac31b8b46f7/html5/thumbnails/16.jpg)
ADVANTAGES
COST EFFICIENTLOCATION AWARENESSREMOTE CONTROL & MONITORINGSOCIAL INTERACTIONRESOURCE SHARING
![Page 17: Cloud Controlled Intrusion Detection and Burglary Prevention Stratagems in Home Automation Systems](https://reader036.fdocuments.us/reader036/viewer/2022062513/55763e2fd8b42ac31b8b46f7/html5/thumbnails/17.jpg)
DISADVANTAGESTECHNICAL ISSUESECURITY IN CLOUDPRONE TO ATTACK
![Page 18: Cloud Controlled Intrusion Detection and Burglary Prevention Stratagems in Home Automation Systems](https://reader036.fdocuments.us/reader036/viewer/2022062513/55763e2fd8b42ac31b8b46f7/html5/thumbnails/18.jpg)
CONCLUSIONIn this project, we present the design,
implementati on and operati on of a cloud connected wireless home automati on system with en suite intrusion detecti on and burglary preventi on stratagems Along with an improved infrared camera, each node of our home automati on system has devised intelligent algorithms for intrusion detecti on and subsequently reports any event to a locati on-aware cloud service in real-ti me.
![Page 19: Cloud Controlled Intrusion Detection and Burglary Prevention Stratagems in Home Automation Systems](https://reader036.fdocuments.us/reader036/viewer/2022062513/55763e2fd8b42ac31b8b46f7/html5/thumbnails/19.jpg)
REFERENCESwww.wikipedia.comwww.ieeexplore.comwww.yahooanswers.com
![Page 20: Cloud Controlled Intrusion Detection and Burglary Prevention Stratagems in Home Automation Systems](https://reader036.fdocuments.us/reader036/viewer/2022062513/55763e2fd8b42ac31b8b46f7/html5/thumbnails/20.jpg)
THANK YOU