Home > Computer science essays > security & surveillance system

Essay: security & surveillance system

Essay details and download:

  • Subject area(s): Computer science essays
  • Reading time: 16 minutes
  • Price: Free download
  • Published: 13 December 2015*
  • Last Modified: 2 September 2024
  • File format: Text
  • Words: 4,531 (approx)
  • Number of pages: 19 (approx)

Text preview of this essay:

This page of the essay has 4,531 words.

With the rapid development of security awareness and embedded system society have a higher demand for security & surveillances. The majority of scientific research institute & manufacturers have attached more importance to the design of intelligent security & surveillance system for improving monitoring capabilities and securities of the office & remote places.
Closed-circuit television monitoring system has now become an indispensable device in today’s society. Supermarkets, factories, hospitals, hotels, schools, and companies are having their own CCTV system for 24/7monitoring. It gives real-time monitoring, provides surveillance footage, and allows the authorities have evidences against illegal activities. It is believe that CCTV can deter crimes. Although surveillance camera records video and helps the authorities to identify the cause of an incident such as crime or accident, it is just a passive monitoring device.
Here we have designed an active surveillance camera that has the capability of identifying the context of the scene being monitored and able to give notification or alarm as the event happens rather than passive recording 24/7.
Also fire is an undesirable event that could bring a great loss of social wealth and human life. To prevent fire losses, various protection and alarm systems have been developed such as smoke detectors, temperature sensor based systems etc. As technologies evolved and instruments such as temperature sensors, camera etc becomes affordable, various automated fire alarm systems are now available. In conjunction with the cheaper instruments, there is a possibility that automated fire alarm system give false signal to the fire controlling authority. To avoid the false signaling here we have designed system that will give the alarm and real time scenario of the incident place to the user then by analyzing scenario user can take the necessary actions.
The availability of cheap , small size, single board computer such as the Raspberry Pi has enabled the creation of numerous automated, monitoring & surveillances system that has low power consumption, faster processing ability at a lower cost. The security & surveillance system proposed here will integrate the use of affordable instruments, connectivity and wireless communication.
1.2 Motivation of the Dissertation
CCTV gives real-time monitoring, provides surveillance footage, and allows the authorities have evidences against illegal activities. Although surveillance camera records video and helps the authorities to identify the cause of an incident such as crime or accident, it is just a passive monitoring device. So here we have designed an active surveillance system that has the capability of identifying the context of the scene being monitored and able to give notification or alarm as the event happens rather than passive recording 24/7.
Also rapid development of embedded system various automated fire alarm systems are now available there are possibilities that automated fire alarm system give false signal to the fire fighter .To avoid the false signaling here we have designed system that will give the alarm and send the real time scenario of the incident place to the user then by analyzing scenario user can take the necessary actions.
1.3 Basic Idea
The proposed system uses the motion sensor to detect the unauthorized entry in to the premises , as the motion detect camera takes the real time image & send it to the user for analyzing further so that user can take the necessary actions.
Also the proposed system can avoid the false automated fire alarm signal to the fire-fighter by giving the alarm signal & real time image of the monitoring place to user so that by analyzing the real time image user can take required actions.
1.4 Dissertation Structure
This dissertation consists of eight chapters that are demonstrated as follows:
Chapter 1: Introduction
This chapter gives the introduction -for this research study.
Chapter 2: Literature Survey
This chapter gives the clear background knowledge for this research study area. First, it illustrates the recent research studies on segmentation of Surveillances & security and reviews some related previous work.
Chapter 3: System Architecture
This chapter gives a brief overview of Hardware & software used in proposed work.
Chapter 4: Design & Implementation
This chapter gives information about hardware implementation & software implementation of the proposed work.
Chapter 5: Result & discussion
This chapter discuss about the result obtained after testing the proposed work.
Chapter 6: Conclusion
This chapter summarizes the entire project study and exposes the system buildings. Also in this chapter the potential future work that might improve the system has been discussed.
1.5 Objective
Design of embedded system for security and surveillance Design of embedded system which gives the alerts to the user based on the events like possible intrusion; fire etc with real time image/video of the monitoring area.
1.6 Problem Statement
Surveillance camera records video and helps the authorities to identify the cause of an incident such as crime or accident; it is just a passive monitoring device. So to avoid only passive monitoring here we have designed an active surveillance camera that has the capability of identifying the context of the scene being monitored and able to give notification or alarm as the event happens rather than passive recording 24/7.
Also there is a possibility that automated fire alarm system gives false signal to the fire fighter . To avoid the false signaling here we have designed system that will give the alarm and real time scenario of the incident place to the user then by analyzing scenario user can take the necessary actions
Chapter 2. Literature Review
This chapter describes about a literature review, which means reading and reporting on what the literature in the field has to say about the topic or subject. So, the goal is to show that one has to read and understand the positions of other academics who have studied the problem/issue that we are studying and include that in the project. This is done by comparing, contrasting and simple summarization. Various research and numerous prototypes of automated Safety & surveillance system have been developed using various platforms. Recently developments in the microcontroller, Web server, Communication & GSM has led to the developments of various automated Safety & surveillance system. For Example
Jun Hou et.al [2] has proposed the system by using Zigbee to monitor locations inside a home which are important by using surveillance camera. When the sensor activate then the notification will be send through the SMS & Multimedia Message Service (MMS) to the user. The Different sensor like temperature Sensor, Gas sensor, Infrared sensor & smoke sensor were connected to the Main system board by using the Wireless Sensor Network (WSN). ZigBee technology which is used in the intelligent home monitoring having the moderate transmission range and larger network capacity to achieve rapid rate, low cost, low power & most advanced communication system WSN.
Yu Qiongfang et.al [3] has proposed a fire alarm monitoring system using fuzzy neural network. In this system it collect data from sensor & process data and calculates model of fuzzy neural network based on fire detection signal characteristics So this fire detection system has a self-learning and adaptive capacity However, it is only a study on proposing a new approach for fire detection. In order to verify the feasibility of this algorithm, simulation is done using Mat lab software.
Cao Shunxia et.al [4] has designed a wireless home alarm system with anti-theft , anti-fire, and anti-harmful gas leak feature using AT89C51 and voice chip ISDl420.Two AT89C51 were used to display the gas concentration and alarm host . The alarm signals were sent by using wireless transmission. When the sensor detects smoke after processing the sensor data a voice message will be sent to the relevant department. However, if any error occurred during the detection of smoke, a false alarm will be submitted, because this system did not include any user confirmation for submission of alarm.
Yi Gu et.al [5] has designed a UPnP based surveillance camera for home security. The UPnP-based Surveillance Camera System (USCS), which can be used to search, control, and manage those configured IP-based cameras in the home. UPnP is used in setting up the home network because its self-configuration and self-description features help ensure that various devices can join the network rapidly and conveniently as well as obtain access to each other . UPnP devices can automatically connect to a network, obtain an IP address. The OSGi platform is used to expand UPnP and provides remote control for home IP-based cameras via a network controller. The proposed system allows users to monitor the status of the home for property security, to care for the elderly or for children, and as a safeguard against accidents.
Aamir Nizam et.al [6] has designed a motion detection system by using low processing power chip. As motion is detected it sends the image or video to the cloud server. If the cloud server is not available then the data is stored locally on the raspberry pi board. This system would be an alternative for expensive security systems being used. This system does not require any special modifications to the infrastructure where installation is required and can be implemented without any hassle.
3. System Architecture
3.1. Introduction
This chapter describes the architecture of proposed system. At the beginning the block diagram of the system is described. These are the most important requirements to consider in creating the system architecture. Thereafter the hardware architecture is to describe hardware implementation of system. Finally software architecture explains the algorithm & flow chart to be implemented for system.
3.2. System Block Diagram
Fig. 3.1 Block Schematic of Proposed system
Figure 1 shows the system architecture. The structure of the security & surveillance system composed of six components, which are Raspberry Pi Model-B single-board computer, RFID Reader, gas sensor, PIR sensor, webcam and output relay. Raspberry Pi was selected due to its good technical specifications, high performance for data processing and is cheaper than other single board computers available in the market. The web cam is used to capture the image.
3.3 Functional Description:
3.3.1 Raspberry Pi:
Fig: 3.2 Raspberry Pi Model B
Raspberry Pi board development started on 2006. It is an inexpensive computer that uses Linux-based operating system. The Various functionalities components are given below,
1. SoC: BROADCOM BCM 2835 is defined as System on chip.
2. CPU core: ARM1176JZF-S, ARM11 core clocked at 700MHz; ARM VFP. The ARM11 core implements the ARMv6 Architecture.
3. GPU core: a Broadcom Video Core IV GPU providing OpenGL ES 1.1, OpenGL ES 2.0, hardware-accelerated Open VG 1.1, Open EGL, Open MAX and 1080p30 H.264 high-profile decode. There are 24 GFLOPS of general purpose compute and a bunch of texture filtering and DMA infrastructure.
4. SD Card Slot is used to install OS/booting/long term storage .The total memory of the SD card is about 8GB.
5. Micro USB Power Port provides 700mA at 5A.
6. RCA Video Out is connected to display if HDMI output is not used. It is mainly used to carry audio and video signals. They are otherwise called as A/V jacks.
7. Audio out Digital audio is obtained if HDMI is used to obtain stereo audio. Here analogue RCA connection is used.
8. Ethernet Port is used to connect to the Internet. It also plays a role in updating, getting new software easier.
9. HDMI OUT (High Definition Multimedia Interface) is used with HDTVs and monitors with HDMI input.
10. GPIO allows us to control and interact with real world.
3.3.2. USB Camera:
USB Camera captures the image and sends it to the USB port of the Raspberry Pi board. The camera model used here is USB Camera model 2.0.
Specification:
Interface Plug Type: USB
FPS/Resolution: I use 320×240 @ 30fps
Setup Distance: Ideal at about 12-24′
Viewing Angle: 54 degrees
3.3.3. RFID
Radio frequency identification technology, known as RFID. In RFID systems, an item is tagged with a tiny silicon chip and an antenna; the chip plus antenna (together called a ‘tag’) can then be scanned by mobile or stationary readers, using radio waves (the ‘RF’). The chip can be encoded with a unique identifier; allowing tagged items to be individually identified by reader (the ID’) .RFID devices have three primary elements: a chip, an antenna, and a reader. A fourth important part of any RFID system is the database where information about tagged objects is stored.
3.3.4 MQ-4 GAS SENSOR
1. High sensitivity to CH4’Natural gas
2. Normal sensitivity to alcohol, smoke
3. Fast response.
4. Stable and long life
5. Simple drive circuit
Fig: 3.3 MQ4 Sensor
Pin No. Description Material Used
1 Gas sensing layer SnO2
2 Electrodes Au
3 Electrode line Pt.
4 Heater coil Ni-Cr alloy
5 Tubular ceramic Al2O3
6 Anti-explosion network Stainless steel gauze
7 Clamp rings Copper plating Ni
8 Resin base Bakelite
9 Tube Pin Copper plating Ni
MQ-4 gas sensor used in gas leakage detecting equipments in family and industry, are suitable for detecting of CH4, Natural gas.LNG, avoid the noise of alcohol and cooking fumes and cigarette smoke.
Specification
1. Operating Voltage: 5 V ��0.1
2. Heating voltage: 5 V ��0.1
3. Heating consumption: less than 750mw
4. Operating Temperature : -10′ to 50′
5. Storage Temperature: -20′ to 70′
6. Related humidity: less than 95%Rh
7. Sensing Resistance: 10K��- 60K��
3.3.5 PIR SENSOR
Fig: 3.4 PIR Sensor
PIR sensors used to sense the motion, almost always used to detect whether a human has moved in or out of the sensors range. These are small, low-power, easy to use, inexpensive, and don’t wear out. So that reason they are mostly found in the appliances and gadgets used in homes or businesses. PIRs are basically made of a pyroelectric sensor, which can detect levels of infrared radiation. Everything emits some low level radiation, and the hotter something is, the more radiation is emitted. The sensor in a motion detector is actually split in two halves. The reason for that is that we are looking to detect motion (change) not average IR levels. The two halves are wired up so that they cancel each other out. If one half sees more or less IR radiation than the other, the output will swing high or low.
The pyroelectric sensor is made of crystalline material that generates a surface electric charge when exposed to heat in the form of infrared radiation. When the amount of radiation striking the crystal changes the amount of charges also changes and can then measured with sensitive FET device built in to the sensor. The sensor elements are sensitive to radiation over the wide range so a filter window is added to the TO5 package to limit detectable radiation to the 8 to 14 mm range which is most sensitive to human body radiation.
3.3.6 A to D Converter MCP3004/08):
The Microchip Technology Inc. MCP3004/3008devices are successive approximation 10-bit Analog to-Digital (A/D) converters with on-board sample and hold circuitry. The MCP3004 is programmable to provide two pseudo-differential input pairs or four single-ended inputs. The MCP3008 is programmable to provide four pseudo-differential input pairs or eight single-ended inputs. Differential Nonlinearity (DNL) and Integral Nonlinearity (INL) are specified at ��1 LSB. Communication with the devices is accomplished using a simple serial interface compatible with the SPI protocol.
Characteristic:
1. 10-bit resolution
2. 2 �� 1 LSB max DNL
3. �� 1 LSB max INL
4. 4 (MCP3004) or 8 (MCP3008) input channels
5. Analog inputs programmable as single-ended or pseudo-differential pairs
6. On-chip sample and hold circuit.
7. SPI serial interface (modes 0,0 and 1,1)
8. Single supply operation: 2.7V – 5.5V
9. 200 kbps max. sampling rate at VDD = 5V
10. 75 kbps max. sampling rate at VDD = 2.7V
11. Low power CMOS technology
3.3.7 Relay:
Relay is an electromagnetic device which is used to isolate two circuits electrically and connect them magnetically. They are very useful devices and allow one circuit to switch another one while they are completely separate. They are often used to interface an electronic circuit (working at a low voltage) to an electrical circuit which works at very high voltage.
A relay can be divided into two parts: input and output. The input section has a coil which generates magnetic field when a small voltage from an electronic circuit is applied to it. This voltage is called the operating voltage. The output section consists of contactors which connect or disconnect mechanically. In a basic relay there are three contactors: normally open (NO), normally closed (NC) and common (COM).
3.4 Working of Proposed System
1. Authorize user can access the system then the system works smoothly.
2. Unauthorized user tries to access the system & motion sensor detect the motion then web camera activates & send the real time image to the user of possible intrusion on web server though Wi-Fi .
3. If any fire or gas detects then gas sensor activates then the system gives the alarm signal to the user, meanwhile web camera also send the image to user to understand the real time scenario.
4. If any higher temperature detect to the temperature sensor then also system gives the alarm signal to the user & web camera gives the real time image to the user to understand the real time scenario.
3.5 Software Resources
3.5 1. Raspbian Wheezy The Raspberry Pi primarily uses Linux kernel-based operating systems it is not possible to run Windows on the Raspberry Pi. The install manager for Raspberry Pi is NOOBS. The OSs included with NOOBS are:
a. Arch Linux ARM
b. Open ELEC
c. Pidora (Fedora Remix)
d. Raspbmc and the XBMC open source digital media center
e. RISC OS ‘ The operating system of the first ARM-based computer
f. Raspbian Wheezy
Raspbian Wheezy
Maintained independently of the Foundation based on the ARM hard-float (armhf) Debian 7 ‘Wheezy’ architecture port originally designed for ARMv7 and later processors compiled for the more limited ARMv6 instruction set of the Raspberry Pi. A minimum size of 2 GB SD card is required, but a 4 GB SD card or above is recommended. There is Pi store for exchange the programs.
The Raspbian Server Edition is a stripped version with other software packages bundled as compared to the usual desktop computer oriented Raspbian. The Wayland display server protocol enable the efficient use of the GPU for hardware accelerated GUI drawing functions Raspbian for Robots – A fork of Raspbian for robotics projects with LEGO, Grove, and Arduino.
3.5.2 WINDISK 32 Utility
This is a Windows program for saving and restoring images from removable drives (USB drives, SD Memory cards, etc). It can be used to write boot images to a SD Flash device or USB flash device, making it bootable.
3.5.3 PuTTY suite 0.63:
PuTTY s a free and open-source terminal emulator, serial console and network file transfer application. It supports several network protocols, including SCP, SSH, Telnet, rlogin, and raw socket connection. It can also connect to a serial port(since version 0.59). The name “PuTTY” has no definitive meaning. PuTTY was originally written for Microsoft Windows, but it has been ported to various other operating systems. Official ports are available for some Unix-like platforms, with work-in-progress ports to Classic Mac OS and Mac OS X, and unofficial ports have been contributed to platforms such as Symbian and Windows Mobile. PuTTY was written and is maintained primarily by Simon Tatham. PuTTY supports many variations on the secure remote terminal, and provides user control over the SSH encryption key and protocol version, alternate ciphers such as 3DES, Arcfour, Blowfish, and DES, and Public-key authentication. It also can emulate control sequences from xterm, VT102 or ECMA-48 terminal emulation, and allows local, remote, or dynamic port forwarding with SSH (including X11 forwarding). The network communication layer supports IPv6, and the SSH protocol supports the delayed compression scheme. It can also be used with local serial port connections.
3.5.4 PHP:
The PHP hypertext preprocessor (PHP) is a server- side scripting language designed for web development. PHP code is integrated by a web server with a PHP processor module which generates the resulting web page. PHP is basically used for developing web based software applications and also to manage database, dynamic content, session tracking etc. PHP 5 was used in this project.
3.5.5 Python:
Python is a widely used general-purpose, high-level programming language. Its design philosophy emphasizes code readability, and its syntax allows programmers to express concepts in fewer lines of code than would be possible in languages such as C++ or Java . The language provides constructs intended to enable clear programs on both a small and large scale. Python supports multiple programming paradigms, including object-oriented, imperative and functional programming or procedural styles. It features a dynamic type system and automatic memory management and has a large and comprehensive standard library.
Python interpreters are available for installation on many operating systems, allowing Python code execution on a wide variety of systems. Using third-party tools, such as Py2exe or Py installer, Python code can be packaged into stand-alone executable programs for some of the most popular operating systems, allowing for the distribution of Python-based software for use on those environments without requiring the installation of a Python interpreter.
CPython, the reference implementation of Python, is free and open-source software and has a community-based development model, as do nearly all of its alternative implementations. CPython is managed by the non-profit Python Software Foundation.
4. Design and Implementation
The Proposed System is divided into two parts: Hardware i.e. sensor interfacing and Software programming .This chapter contains design of the application in the system. It covers the Hardware implementation i.e. Interfacing of different sensor and Software implementation i.e. Raspbian board programming.
4.1. System implementation
System implementation includes hardware implementation of proposed system, interfacing of different sensor and software implementation of proposed system
4.1 Interfacing of RFID & USB Camera:
Fig. 4.1 USB Camera & RFID Interfacing
Above figure represent the hardware implementation of system which contains the interfacing of the RFID reader, USB 2.0 camera.
4.2 Interfacing of temperature sensor & Gas Senor:
The temperature sensor LM35 & gas sensor MQ4 are connected to the channel no 1 & channel no 2 of MCP 3208 respectively. MCP 3208 convert the analog input of the sensor to the digital using inbuilt A to D converter & provides the serial data to the GPIO of Raspberry PI.
Following diagram gives the detail interfacing of the MCP 3208 to the GPIO of the Raspberry Pi.
Fig. 4.2 Interfacing of A/D IC to Raspberry Pi Board
4.3 Software Implementation:
4.3.1 STEPS TO INSTALL RASPBIAN OS
In order to install Raspbian OS, first next out of box software (NOOBS) has to be installed. We have selected Raspbian Wheezy.
1. First step is to allocate the drive for installing OS
2. SD adaptor can also be used for this purpose
3. Download WINDISK 32 utility from source forge Project which is a zip file
4. Extract and run the zip file
5. Select the file and click run as administrator
6. Select the image file which was extracted above
7. Select the drive letter of the SD card in the device box
8. Click write and wait for write process to complete
9. Exit the image and eject the SD card
Fig. 4.3 .Installed Raspbian OS.
4.3.2 Steps for PuTTY Configuration:
1. Obtain a copy of PuTTY pre-configured for use at Columbia from the PuTTY download page.
2. Save the installer file to your download directory or desktop.
3. Double-click on the file PuTTY-install.exe to begin the installation.
4. At the Choose Destination screen, Click Next to accept the recommended default destination location for installing PuTTY.
5. Click Next on the Select Program Folder screen to select PuTTY as the recommended Program Folder name (PuTTY should already be displayed in the Program Folders text box.
Click Finish on the final screen to complete the installation.
Fig. 4.3 PuTTY Configurations
4.4 Algorithm of proposed system
Step 1: Start.
Step 2: Initialize the sensor & relays PIR= IN & Relay1 = Relay 2 = Out.
Step 3: Initialize the RFID reader set communication port & baud rate @ 9600.
Step 4: Initialize the SPI driver.
Step 5: Read the temperature from temperature sensor.
Step 6: If the temperature is greater than critical level then start camera & send the temperature alert message.
Step 7: Else send temperature normal message.
Step 8: Read the gas sensor
Step 9: If the gas level is above the critical level then start the camera & send gas alert message.
Step 10: Else send gas normal message.
Step 11: read RFID reader.
Step 12: If the valid card present then stop the camera, relays (realy1 & relay 2) & send the valid user message.
Step 13: Else start the camera, scan the PIR sensor.
Step 14: If the PIR sensor detect the motion then make buzzer on & send ATM unsecure message.
Step 15: Else stop the relays (realy1 & relay 2)
Step 16 : Go to step No. 1.
4.4 Flowchart of the Python Programming in Raspberry Pi for proposed system
No
Yes
No
Yes
No
Yes
No
Yes
5. Result & Discussion
5.1. Introduction
This chapter describes results obtained during the implementation of module. Hardware results are explained
5.2 Authorize User:
as authorize user access the system then it display the message on web serve as Valid User & system is secure also temperature & Gas Sensor is normal then it gives Message GAS & temperature Normal which is shown in below image.
Fig: 5.1 Authorize entry Display Message
5.3. Unauthorized user:
As Unauthorized user tries to access the system then system activates the motion sensor . if motion detected then system gives the alerts to the user by sending message on web server along with real time image of the place on the web server. Then user can take the appropriate action by analyzing the real time image.
Fig:5.2 Web server Message for Unauthorized entry
Fig: 5.3 Web server display Image of Camera
5.4 Temperature Alert:
As the temperature above the 60 degree centigrade then the system gives the Alert message on the web server with the alarm.
Fig:5.4 Web server Message for temperature alert
5.5 Gas Alert:
As the Gas Sensor MQ4 detects the gas above the critical level then it gives the alarm with alert message on the web server.
Fig: 5.5 Web servers Message for gas alert
6. Conclusion
Thus we have designed & presented a smart surveillance system capable of recording/capturing video/image and transmitting to web server after the unauthorized entry occurs .so that user can analyze the image & take the necessary action. Future work is to locate the number of persons present exactly in that area and their position so that accurate information can be obtained on the receiver side. Also we have designed & presented fire alarm system using the Raspberry Pi. The designed system offers a feature that enabled verification that a fire actually occurred. The fire alarm system warns the user by first sending an alert and asks for confirmation before submitting a report/alert to the “Firefighter”. Thus system designed here having the low cost, with low power consumption and reliable instruments.
References
[1]. Md Saifudaullah Bin Bahrudin , Rosni Abu Kassim ‘Development of Fire Alarm System using Raspberry Pi and Arduino Uno’ 2013 International Conference on Electrical, Electronics and System Engineering.
[2]. Y. Qiongfang, Z. Dezhong, F. Yongli and D. Aihua, “Intelligent Fire Alarm System Based on Fuzzy Neural Network,” 2009 International Workshop on Intelligent Systems and Applications, p. 1, May 2009.
[3]. C. Shunxia and C. Yanda, “Design Of Wireless Intelligent Home Alarm System,” Industrial Control and Electronics Engineering (ICICEE), 2012 International Conference on, p. 1511, August 2012.
[4]. J. Hou, C. Wu, Z. Yuan, J. Tan, Q. Wang and Y. Zhou, “Research of Intelligent Home Security Surveillance System Based on ZigBee,” International Symposium on Intelligent Information Technology Application Workshops, pp. 554-557, 2008.
[5]. V. Rakesh, P. Sreesh and S. N. George, “Improved real-time surveillance system for home security system using Beagleboard SBC, Zigbee and FTP Webserver,” 2012 Annual IEEE India Conference (INDICON), pp. 1240 – 1244,2012.
[6]. V. Rakesh, P. Sreesh and S. N. George, “Improved real-time surveillance system for home security system using Beagle board SBC, Zigbee and FTP Webserver,” 2012 Annual IEEE India Conference (INDICON), pp. 1240 – 1244,2012.
[7]. Van Thanh Trung, Bui, and Nguyen Van Cuong. “Monitoring and controlling devices system by GPRS on FPGA platform.” Advanced Technologies for Communications (ATC), 2013 International Conference on. IEEE, 2013.
International Publication Forwarded:
1. Title of Paper: Design of embedded system for safety & surveillance.
Name of Journal: International Journal of Electronics, Electrical and Computational
System (IJEECS)
2. Title of Paper: Design of embedded system for safety & surveillance
Name of Journal: International Journal of Advanced Research in Electrical,
Electronics and Instrumentation Engineering
here…

About this essay:

If you use part of this page in your own work, you need to provide a citation, as follows:

Essay Sauce, security & surveillance system. Available from:<https://www.essaysauce.com/computer-science-essays/essay-security-surveillance-system/> [Accessed 19-12-24].

These Computer science essays have been submitted to us by students in order to help you with your studies.

* This essay may have been previously published on EssaySauce.com and/or Essay.uk.com at an earlier date than indicated.