• Nu S-Au Găsit Rezultate

View of Smart Security System to Detect Fire and Abnormal Human Motion Using Open CV

N/A
N/A
Protected

Academic year: 2022

Share "View of Smart Security System to Detect Fire and Abnormal Human Motion Using Open CV"

Copied!
8
0
0

Text complet

(1)

Smart Security System to Detect Fire and Abnormal Human Motion Using Open CV

Sangmesh Wadgave

1

,Likitha Rayapati

2

,Bhanu Prasad

3

,Mrs.V.Jyothi

4

1,2,3,4 Department of Electronics and Communication Engineering Vardhaman College of Engineering

Hyderabad, India-501218

1[email protected],2[email protected],3[email protected]

4[email protected]

ABSTRACT

In recent years, we've begun to employ a variety of surveillance systems to keep an eye on the targeted location. To enforce and track the area under surveillance, this necessitates a large amount of storage space as well as a large amount of human resources. This is supposed to be a time-consuming and unreliable operation. We propose an intelligent surveillance device in this paper that continues to monitor the target area and detect human, fire, and abnormal movements in each image. A notification is automatically sent to the user via email when the device detects movement in a designated area. As this method does not save everything, the available memory space is limited because it does not save the entire video but only saves it when the human motion or fire is detected. This is performed by using real-time video processing, Raspberry Pi framework and as well as the free CV i.e computer vision/machine vision technology.

Keywords

HaarCascade; BackgroundSubtractorMOG; OpenCv; Pi camera; Raspberry Pi; Python;

INTRODUCTION

In our everyday life we can see how the technology is improving rapidly from the last few decades. As the growth in the technology is increasing everyday we can notice that the man power need is decreased, we can notice human need not to have more attention or need not even need to do the work which can be taken over by the technology.

Though many of us believe that this improve in technology is making us do less work and intern making us lazy, it is not deniable that this change is for better human lifestyle.

Building management is one area we can see technology is slowly growing and it is snatching all the responsibilities of human beings. We can see now many of the building, Shops, Offices, homes are an smart automation system, which is for improving the security and other operations like power issues management, ventilation and many more.

All this places are given name as smart offices, smart homes etc. So we can notice here that surveillance is an important and more needed role in our all surroundings.

Security and surveillance plays very important role in our day to day life, It can be defined as continuous observation of electronic devices like CCTV cameras in our everyday work place or at our home doors. There is an improvement by using this kind of technologies we can observe security is increased. But still there are many holdings or can say limitations and no effective use of technology. One of the unnoticed cons of CCTV cameras is they record the videos continuously, is there any need of recording a picture where there is no human, no motion of any object, no harmful accident do we need recording of all this, It is waste of memory usage. Instead we should have a system we can be able to reduce the memory usage by recording only required pictures.

In requirement of removing all the unnecessary memory usage and to improve the security by making use of new technologies like opencv, deep learning and machine learning we came with our system. This project consists of raspberry pi 3 and pi camera as hardware component and which is of very low cost compared to current existed systems. As a simple example of use or can say an simple use of our project can be, that in any mall or any rental shops where we can see CCTV camera is always in use whole day, even at night so, the amount of storage required for storing the recording from CCTV cameras will be large and it is not efficient as even if there is no motion or no human at night the recording is still continued, so to save the recording usage memory and to improve the security we developed a system which can do both the things.

We added three main features in our system to improve the security in our surroundings or to have continuous monitoring at specific area, We are using image processing to convert our images into desired one so to apply fire

(2)

and human detection algorithms on it. And with that we are using smtp protocol to send email alert messages with the images or frames taken by our system.

The Algorithm we used in our system is HaarCascade algorithm for detection of fire and to detect human we are using BackgroundSubtractionMog2 which is inbuilt method of opencv. So, we are using opencv and deep learning algorithms.

The next things of our paper is given as Related Work, Implementation and Design, Result and Discussions, Conclusion and Future Scope, References.

LITERATURE REVIEW

All the previous papers had PIR sensors which is not very effective as it has very low sensing range of 9m at max.

And the papers which used image processing ,OpenCv to detect any kind of motion is not very secure and efficient system for security based projects. So in our paper we are trying to detect human motion and human abnormal motion

That is if any human falling down on the ground is an abnormal motion. It is the only type of abnormal motion our project detects and we are also adding fire detection feature to give an alert email in case of fire accidents.

IMPLEMENTATION AND DESIGN

A. Block Diagram

The Block diagram consists of mainly two important components the raspberry pi 3 and raspberry pi camera as hardware components and we also need a desktop monitor to see our output result. So normally as shown in Fig 1.

We have pi camera which is connected to raspberry pi 3 and raspberry pi is remotely controlled by using VNC viewer which is a virtual network computing software should be present in computer to run the program and to interact with raspberry pi without having any wired connection with it.

Fig. 1. Proposed System Block Diagram

B. Flow Chart

(3)

Fig. 2. Proposed System Flow of Execution C. Hardware Implementation

I. Raspberry Pi 3

Rаsрberry Pi is one of the сheарest and smallest соmрuters. Rаsрberry Pi is one of the smallest creditсаrd-size соmрuters, Which is not only famous for its size but also for its соst. Rаsрberryрihаs the inbuilt СРU аnd as well as the RАM. Rаsрberryрi is роwered by using the miсrоusbсhаrger. Rаsрberryрiсоnsistsоf 40 generаl inputs аndоutрutрins which аre used to соnneсt with the рi. Tоlоаd the орerаting system in the Rаsрberryрi, usesmiсrо SD memory

.

Fig. 3. Raspberry Pi 3

(4)

II. Pi camera

The Raspberry Pi Camera Module v2 is a high-resolution 8-megapixel camera that uses a Sony IMX219 image sensor to produce HD video and still images. It's a Raspberry Pi add-on board with a fixed focus lens that's been specially designed. It connects to the Pi through one of the little ports on the board's upper surface and uses the unique interface, which was created specifically for linking with camera.

Fig. 4. Pi camera D. Software Implementation

1. Vnc (viewer)

VNC's main purpose is to allow a local computer (client) to operate a remote computer (server) while viewing the VNC server's screen content on the local monitor. Any operating system installed on the server or client computer can be used with a VNC session. Users using VNC Viewer see the same thing as if they were sitting in front of the computer. This is either the presently logged in user's desktop or the login screen. VNC Viewer transforms your phone into a remote desktop, allowing you to connect to your Mac, Windows, or Linux computer from anywhere on the planet.

E. Related Algorithms 1. Haarcascade Algorithm

Haarcascade algorithm is one of the machine learning algorithm which is used to detect objects depending upon the program trained. In our system we are trying to find fire, so we trained our program with positive and negative images, here positive means the pictures where we can find fire in them and negative pictures means where we cannot find fires, so providing this pictures and training the program then we get a trained xml file which we can say a cascaded file which is used to detect fire in our input video.

2. BackgroundSubtractormog2

BackgroundSubtractormog2 is one of the class of OpenCV. We are using this class to detect human motion and human abnormal activity. Using this we can easily try to differentiate what is normal and abnormal activity of human, here abnormal activity is a person falling down is treated as an abnormal activity. So first we try to remove the unnecessary background in the picture and try to convert the picture into white grey picture which will be having only white and black color present in the picture, so after converting into white and black we are then finding the area of the object shape and try to figure out if the shape is of human or not. So in this way this built-in feature of OpenCV is used to detect human motion and human abnormal motion.

F.

Algorithm

 Start (run the program).

 Opens the live stream either from Pi camera or Computer Camera.

 Checks for Human and fire in the stream frame.

 Program uses HaarCascade algorithm to detect fire in the input video.

(5)

 If the fire is detected then an email is sent to the system user as an alert message.

 Program uses BackgroundSubtractorMog2 which is used to find human motion and abnormal motion.

 If the shape area height is less than width than we detect it as falling body and it will be a abnormal motion.

 Email is sent after detecting abnormal motion or activity.

 Even if human is detect as an normal behavior the frame is saved.

 Video is recorded only with fire or human detection frames.

 Stop.

G.

Model of our work

Fig. 5 shows the proposed system model.

RESULT

Fig. 6 Human motion is detected(Normal behaviour) Fig. 7 Fire is detected by the System.

(6)

Fig. 8 human falling down unconscious (as abnormal activity)Fig. 9 email alert for abnormal activity

CONCLUSION AND FUTURE ENHANCEMENT

The project's main goal, which is to design and construct a human motion, fire, and abnormal motion sense based security system that sends the user an email with an image as an attachment and captures the videos for later reference if human motion and fire is detected, has been accomplished. The system can be utilised in a variety of settings and for a variety of purposes.

Houses, banks, hospitals, labs, and other automated systems are examples of sites where unlawful entry is significantly reduced. However, the system must be constantly monitored to ensure that internet costs and mobile phone bills are paid on time in order to stay connected and offer information to users about what is happening in the monitoring region by sending notifications to an email server. The system primarily enhances the security of the environment in which it is installed. It improves the system's memory efficiency by storing fewer videos than a traditional system and only when motion is detected.

LIMITATIONS AND FUTURE STUDIES

More powerful processors that can complete operations quickly and improve system performance

can be used to improve the system. Motion and fire detection can be improved with more

powerful algorithms. Other object recognition and facial recognition methods can be used to

boost security performance. They can be programmed to ignore specific things and people. They

can be used to notify adjacent security offices in the event of a major incident. Finally, this

system can give a higher level of security than current conventional systems.

(7)

REFERENCES

[1] M. Pugh, J. Brewer, and J. Kvam, "Sensor fusion for intrusion detection under false alarm constraints," in 2015 IEEE Sensors Applications Symposium (SAS), (2015), Barnhart, R. K.

(Ed.). (1988). Chambers dictionary of etymology. New York, NY: The H. W. Wilson Company.

[2] R. Sampson, "False burglar alarms," in Problem-Oriented Guides for Police: Problem- Specific Guides Series No. 5, U. S. D. o. J. Office of Community Oriented Policing Services, Ed., 2 ed, (2007). Porter, M., Omar, M., Campus, C., & Edinburgh, S. (2008, January).

Marketing to the bottom of the pyramid: Opportunities in emerging market. Paper presented at the 7th International Congress Marketing Trends, Venice, Italy.

[3] P. Vigneswari, V. Indhu, R. Narmatha, A. Sathinisha, and J. Subashini, "Automated security system using surveillance," International journal of current engineering and technology, vol.

5, no. 2, 882-884, (2015). Tingley, M. W., Monahan, W. B., Beissinger, S. R., & Moritz, C.

(2009). Birds track their Grinnellian nice through a century of climate change. Proceedings of the National Academy of Science, USA, 106,19637-19643.

[4] S. Suresh, J. Bhavya, S. Sakshi, K. Varun, and G. Debarshi, "Home monitoring and security system," in 2016 International Conference on ICT in Business Industry & Government (ICTBIG, 2016), British Learning Association (2005).

[5] H. U. Zaman, T. E. Tabassum, T. Islam, and N. Mohammad, "Low cost multi-level home security system for developing countries," in 2017 International Conference on Intelligent Computing and Control Systems (ICICCS, 2017), 549-554.

[6] S. Sruthy and S. N. George, "WiFi enabled home security surveillance system using Raspberry Pi and IoT module," in 2017 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES, 2017).

[7] R. R. Ragade, "Embedded home surveillance system with pyroelectric infrared sensor using GSM," in 2017 1st International Conference on Intelligent Systems and Information Management (ICISIM, 2017).

[8] S. Prasad, P. Mahalakshmi, A. J. C. Sunder, and R. Swathi, "Smart surveillance monitoring system using Raspberry Pi and PIR sensor," in International Journal of Computer Science and Information Technologies, vol. 5, no. 6, 7107-7109, (2014).

[9] B. Kaur, P. K. Pateriya, and M. K. Rai, "An illustration of making a home automation system using raspberry Pi and PIR sensor," in 2018 International Conference on Intelligent Circuits and Systems (ICICS), 2018, pp. 439-444.

[10] G. Bradski and A. Kaehler, Learning OpenCV: Computer vision with the OpenCV library. O'Reilly Media, Inc.", (2008).

[11] ] T. Agarwal. (2017, 5 May 2018). PIR Sensor Circuit and Module Working. Available:

https://www.elprocus.com/pir-sensor-circuit-with-working/ 20013-10.

[12] C. Zamshed Iqbal, I. Masudul Haider, A. Muhammad Moinul, S. Mst. RumanaAktar, and

N. NafisaShahera, "Design and implementation of Pyroelectric Infrared sensor based

security system using microcontroller," in IEEE Technology Students' Symposium (2011).

(8)

[13] A. Raza, A. A. Ikram, A. Amin, and A. J. Ikram, "A review of low cost and power efficient development boards for IoT applications," in 2016 Future Technologies Conference (FTC) (2016).

[14] Prathaban, T., Thean, W., &Sazali, M. I. S. M. (2019). A vision-based home security system using OpenCV on Raspberry Pi 3. ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING: FROM THEORY TO APPLICATIONS (SERIES 2):

Proceedings of the International Conference of Electrical and Electronic Engineering (ICon3E 2019).

[15] ]. Smys, S., and Jennifer S. Raj. "Assessment of Fire Risk and Forest Fires in Rural Areas Using Long Range Technology." Journal of Electronics 2, no. 01 (2020).

[16] Sungheetha, Akey, and Rajesh Sharma. "Real Time Monitoring and Fire Detection using

Internetof Things and Cloud based Drones." Journal of Soft Computing Paradigm (JSCP) 2,

no. 03 (2020).

Referințe

DOCUMENTE SIMILARE

However, any language with functionality that can be expressed in terms of a valid class file can be hosted by the Java Virtual Machine..

An operating system virtualization is the key to implementing a virtual laboratory, because each workstation can use a new operating system along with all the

Paulsen, Representation of function algebras, abstract operator spaces and Banach space geometry, J.. Pisier, Operator spaces and similarity problems, Documenta

This demands to introduce an adequate topology on a family of subsets of the range; a point-to-set mapping can be regarded as a function having values in that family of subsets,

Rather than hard-coding the data type and precision of a variable, you can use the %TYPE attribute to declare a variable according to another previously declared variable

Aims: We aimed to obtain the maximum transverse diameters (widths) of ultrasonographically detectable ureteral stones in children and to evaluate the effect of widths on the rate

Doppler indices, such as AREDF, can be predictors of IVH or perinatal death, and an absent or reversed “a” wave in the ductus venosus and the hypoxic index can be

Clinical types of psoriasis can be classified according to phenotype-based classification that intended for use in both clinical practice and researches: plaque