1. INTRODUCTION
The definition of security is simply to be protected from any outside intrusion. Therefore, the idea is to come up with a security system that is easy to set up and place anywhere you want, from an office to a school room, and this system is called the Security Camera.
The PIR (Passive Infrared Detector) motion sensor is a device that takes the physical measurement of quantities and alters it to signals, which can be read by a measuring device. This project aims to study this sensor.
2. THEORETICAL CONCEPT
The experiment is performed to the project circuit and it is set in a room, and it has three main parts, which are PIR (Passive Infrared Detector), Computer and Webcam. The PIR (Passive Infrared Detector) and the webcam are placed in a specific position in the room while the computer is set it up in order to monitor the room.
The PIR (Motion Sensor) functions as an Input. Accordingly, when it detects motion it sends a signal to the computer and the web camera via a parallel port.
A parallel port is a type of interface for connecting various peripherals. It is also known as a printer port or Centroids port. The IEEE 1284 standard defines the bi-directional version of the port, which allows the transmission and reception of data bits at the same time
The computer inputs the information ‘the signal’ received from the PIR and processes it depending on the MATLAB programming. MATLAB program is a mathematical computing and a-generation programming language that has common ground with programs written in other languages, including C, C++, and FORTRAN. In addition, the Program will require from the user, his email and the user email password.
Consequently, the computer sends the data to activate the camera. Subsequently, the data is sent from the computer to the web camera. After that, the web camera activates the signal and takes a picture of the moving object. The camera takes the picture, and then it is saved in the computer. After that, the saved picture is sent to the user as an Email with a picture attached of the intruder. Then, the user acts depending on the picture of the intruder which was sent to the user Email.
This video illustrates how it is done:
ليست هناك تعليقات:
إرسال تعليق