working operation of invisible eye security system
#1

Working operation of invisible eye security system
Reply
#2
Introduction
In this modern era, property crimes are more predominant. This necessitates our
need to develop an advanced security system which is the INVISIBLE EYE. It is
basically a single camera based security system that can be used to protect
valuables kept in a room of a house or property.
Most existing camera based security systems involve the use of multiple cameras
placed around the room to be monitored. These cameras continuously record
video footage of the room and save it on a central monitoring station.
Instead of this, we may use a different system in which a single camera is used,
that can slew around the room and record only when it is alerted by the presence
of any intrusion. Such a system would consist of three components - sensors that
detect intrusion; the camera that slews to the point of intrusion and takes
pictures; and the keypad that is used to interface with the system which allows
any person to disable the system by entering the right password.
Objectives
To design advanced security with an affordable and less complex system
referred as “Invisible Eye”
Methodology
This system consists of the following components:
• Sensors
• Microcontroller
• Stepper motor
• Camera
• Personal Computer
Basic block diagram of the Invisible Eye security system.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: what are the queries of invisible eye seminar, invisible eye advanced security system,
Popular Searches: invisible eye, invisible eye presentation, invisible eye advantages, full seminar report of invisible eye, seminar topics in operation system, invisible eye report, what are the queries of invisible eye seminar,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  dramatically working order know-how and retention of viva voce 0 672 11-10-2019, 08:59 AM
Last Post:
  an atm with an eye documentation 0 1,186 22-02-2019, 07:04 AM
Last Post:
Information working principles of escalator 0 1,165 18-02-2019, 04:38 PM
Last Post:
  Earthquake detection alert alarm for people security ppt 0 886 06-01-2019, 09:29 AM
Last Post:
  Earthquake detection alert alarm for people security 0 803 06-01-2019, 09:25 AM
Last Post:
Wink ppt on invisible eye 0 515 25-09-2018, 07:23 PM
Last Post: Guest
  arunkumar network security vtu ece notes pdf 0 926 19-08-2018, 12:01 AM
Last Post: Guest
  invisible eye ieee paper 0 556 07-08-2018, 09:33 PM
Last Post: Guest
  invisible eye ieee paper 0 530 07-08-2018, 09:33 PM
Last Post: Guest
  kkt 10 lava mobile show dc operation failed 0 560 27-06-2018, 11:51 AM
Last Post: Guest

Forum Jump: