Você está na página 1de 29

1

CHAPTER 1
INTRODUCTION

To provide an overview of the Final Year Project. In this chapter, it will show
introduction of the project, background of the project, the objective of a project, problem
statement, project scope and project significance.
1.1 Project Background
A data center is an office that unifies an association's IT operations and supplies
and where it saves, oversees spread its data. Data center house a system's most
basic associations and are discriminating to the coherence of day by day
operations. Therefore, the security and dependability of data centers and their
data is a top necessity for associations.

With that obligation has a part as a data center supervisor who is in charge of
regulating specialized and IT issues inside the data focus. This incorporates
machine server operations, information entering, information security, physical
security and administration and provisions used for transforming information. In
a moment, numerous securities have been made to offer the safe environment in
the data center. Only, it still has vulnerabilities. Once in a while, the insider such
workers additionally a danger to the data center.

The Physical Security area addresses the dangers, exposures, and
countermeasures that could be utilized to physically secure a venture's assets and
sensible data (Harris, 2005). Dangers to physical security incorporate
interference of administrations, fittings robbery, physical harm, unapproved
divulgence and misfortune of framework honesty. Today, Surveillance security
framework turns into the best determination to overcome more criminal cases in
our rustic zone and additionally for the data center interruption issue, with the
2

continuous checking it will be a powerful security association. As we know,
there are numerous sorts reconnaissance, security framework has today, which is
excessively unreasonable and hard to utilize, for example, for Closed-circuit TV
(CCTV) observation framework, with their concentrated transforming in pressure
and recording structural planning together with a basic multi-screen visualization
of the crude feature streams bear a few impairments and restrictions. This project
tries to find out the problem with the surveillance system in competitively priced
appliance designed. This surveillance system is one of effective security systems
in protecting any suspicious occur and also as a safeguard at data centre.
At present, the task is to develop a Surveillance Camera Image Capturing Bases
On Motion Detection. This task will use using Passive Infrared (PIR) sensor as
motion sensor and surveillance camera to monitor and capture image those
people that enter into the data centre. That device becomes the main factor in
controlling the whole organisation.
This security scheme which will be prepared based on Arduino as a
microcontroller to work with PIR sensor and camera. That sensor can detect
movement from human from about 20 feet out. That sensor will activate the
camera to capture those people in that range of the sensor. That captured image
will save on hard disk in the computer.
1.2 Problem Statement
Right away, data centers have gotten prime focuses for assaults to take
information and harm registering foundation to bargain accessibility. However,
physical insurance of data centres has been named as one the most missed
aspects of data center security (Higgins, 2006). Albeit, physical avoidance and
discovery instruments are made, however physical ruptures and insider dangers
have kept happening (Blau, 2009; Partner & Muir, 2007).
To protect data centres against physical attacks, many physical prevention and
detection mechanisms have used today, such as security locks, surveillance
camera, security safeguards and others (Heare, 2001). Sometimes can occur
3

when one of the employees enters in data centres with one access card, but other
unrecognized people like outsider also follow into data centres. That is ace of the
restrictions of physical protection of information centres.

The human risk that data centers ought to stress is a physical assailant who can
accomplish physical access to the servers. In addition, from securing data against
infections and framework breakdown because of hacking, there is a need to
secure information administration frameworks from calamities like flames and
damage (Hummitsch, 2001). Since the server in data centers keep the
information and data of the organization, it is imperative that get to data centers
must restricted to perceived and approved individuals. Individuals that can enter
to the data center if needed by their employment obligations. The association
ought to stay up to date with "least privilage" that limits access to the data center
by need and employment capacity. In the event that the outcast, for example,
professional access to the data center must be escorted and dependably be
checked their work (Blau, 2009). It can be that outsider is one of the threats to
data center. Protecting information from illegal access keeping its confidentiality
is an important obligation for any organisation.

Nowadays, the security industry receives a great improvement in ability to amass
surveillance information. Although, with the great increase in expenditure of
surveillance cameras, in no way diminished fraud, larceny and other criminal
offences. Conventional surveillance systems do not make people watch all videos
quickly and realize the contents and get the significant data.
Some of surveillance camera equipment is also expensive for data centre and not
worthy for many positions. The Security Gap between what we gather and
what we can analyse is at the root the most important problems in surveillance
system today.

To fill that gap, Surveillance Camera Capture Image Based On Motion Detection
is developed to prevent any crime that happens in a data centre with an
4

automated capturing image. This security system has a motion detector to detect
any motion in sensor range.

1.3 Aim
To build a security system using motion detector in data center. If any
movement is detected, the sensor will active and triggered camera to capturing
image.

1.4 Objective
To achieve the aim of this project, the project is carried out for the following
objectives:

a) To develop a automated surveillance camera system with motion detector.
b) To test that surveillance system in data center.

1.5 Project Scope
To make sure this project running smoothly a few scope has been made as a
guide to make sure the objectives of project accomplish. There are three scopes
are listed here:
Electronic parts: Arduino board, PIR sensor and camera.
Programming part: Use C/C++ to program the Arduino board to make it
function.

1.6 Project Significance
There are some significance produce from this project and those are:

To track the people that enters the data center.
Automate the camera to capturing image.
To recognize between authorized and unauthorized people that enters
the data center.
5

1.7 Conclusion
In this researcher was discuss and come out with the objective of this project,
significance, project scope and also the problem statement.




























6


CHAPTER 2
LITERATURE REVIEW

2.1 Overview
This chapter examines activities and paper works identified with this
undertaking. These related works have been assessed precisely to enhance the
quality and dependability of this project. By dissecting the project did by
different analysts, there is a plausibility to comprehend what gimmicks are
needing in their undertakings. They likewise will propose some future works
that might be possible to enhance the same undertaking. Also, there are some
helpful plans that might be actualized in this venture from other comparable
undertakings. Consequently, writing audit procedure expanded right from the
begin until the end of the project.
The purpose of this chapter is to give an overview of state of information on
the surveillance security system. It will introduce the further detail of motion
sensor, surveillance camera, types of security system and example of existing
implementation of security system have used.
For further information about this project including the component and
concept that will be used explain in this chapter.

2.2 Surveillance System
Surveillance is the observing of the conduct exercises, or the evolving data,
typically of individuals for the reasons of impacting, overseeing, coordinating
or securing. Surveillance is exceptionally valuable to governments and law
implementation to keep up social control, perceive and screen dangers and
forestall or examine criminal action. The saying surveillance is usually used to
7

depict perception from a separation by method for electronic gear, for example,
CCTV cameras or capture attempt of electronically transmitted data, for
example, web movement.

2.3 Surveillance Camera
A surveillance camera is a camera which is utilized to screen a territory for
security purposes. That feature recorded feature can audit ceaselessly to look at
afterward in the trusts of getting an impression of a criminal or a circumstance.
Surveillance camera is just simply a static camera and mounted in plain sight.
Surveillance camera also has that can be remotely to highlight areas for further
information, and some are hidden so that people are not aware of their presence.
The camera might be additionally checked of suspicious conduct or recordings
that could be assessed after the burglary to figure out all the more about the
wrongdoer. Data center is one of secure facilities that implement of surveillance
camera. In this case, the camera is often monitored staff for signs of problem or
breach.

2.4 Conventional Surveillance System
We can discover the accepted surveillance security framework at wherever, for
example, office, retail stores, banks and even private premises. Individuals
watch feature inputs on the multi vision screen from different cameras and when
suspicious circumstances happen, they manage it. Individuals can't generally sit
before the screen for quite a while and along these lines they may miss the
hazardous circumstances. With reliable structures, it is not easy to handle
creating cases instantly show up when it happens. Ordinary surveillance
framework additionally accompanies high cost and at some point not suitable
any circumstance. Figure 2.1 will show conventional security system at urban
subway system.
8


Figure 2.1: Conventional surveillance security system installed at urban transit
(Park, K. Y., et. al., 2012)

2.5 Surveillance System with Motion Detector
To fill the gap of conventional surveillance system, it integrates the motion
detector to make it more intelligent. So it will capture images when detect the
motion in sensor range. For this surveillance system it will use the passive
infrared sensor (PIR) as motion sensor and camera to develop it. In the next topic
will tell about motion sensor, details of PIR sensor Ultrasonic sensor and
Through-the-lens (TTL) camera.

2.5.1 Motion Sensor
In security system, motion detectors are widely used. Typically, it contains
either a motion sensor included with or connected to other devices that warn
users. It normally situated close outside entryways or windows of building to
screen the region around it. An electronic movement sensor holds a sensor
that converts the identification of movement into an electric indicator.
9

Microcontroller can translate an electric indicator from a sensor which can
send the sign to Polaroid to trigger it to catch picture (Nusaibah, 2009).

2.5.1.1 Passive Infrared Sensor (PIR)
For the most part of Passive infrared sensor made of pyroelectric sensor to
produce the electric sign because of warm radiation evolving. Each living
body emanates some level radiations and the more sweltering the body, the
increasingly is emitted radiation. It can't be seen however it can locate.
Objects that create warm likewise produce infrared radiation and those objects
incorporate a human body. PIR motion sensor is the most frequently used in
commercial security system. Figure 2.2 is example of PIR sensor.

Figure 2.2: Passive Infrared Sensor (Noori, Anvardeen, 2008).

Usually, infrared sensor are using for alarm theft system and visitor presence
monitoring. Movement is distinguished when one temperature, for example,
human body is passes before an alternate source of temperature, for example,
divider. The yield unit will stay high if movement is still discovered.
Everything discharges some low level radiation, and the more sweltering
something is, the more radiation is emitted. The sensor in a movement finder
is really part in two parts. That explanation behind that will be that we are
looking to discover movement not normal IR levels. Figure 2.3 show the
sensor discovering range, high temperature source development and yield
indicator from sensor. Aloof infrared sensor is picked in light of :

1. lower costs and easy to get (Varghese S. S., Premi M. G., 2013)
10

2. sensitivity to the human body radiation (8~14 m) ( Lang S. B., 2005)
3. reactiveness to angular speeds of a warm target running from 0.1 rad/s
to 3 rad/s, in a separation short of what 15 m (Qi, H. et al., 2009).
4. high reactiveness to the change of temperature on other than itself
temperature (Qi, H., Fei, H., & Yang, X., 2009).
5. large pyroelectric sensor and stable (Kang S. J., Samoilov, & Yoon
Y.S., 1998)



Figure 2.3: A representation of movement identification by the PIR
sensor
(Hao Q. et al., 2005).

That is the reason the lens focuses on the sensor are not steady in light of
the fact that each other one focuses to an alternate a large portion of the
PIR sensing component (Tong, L. et al., 2010) . Figure 2.4 (a) and (b)
show the top view of PIR sensing element and rear view of PIR sensing
element.


11




Figure 2.4 :(a) Top view PIR sensing element, (b) Rear view PIR sensing
element (Tong, L. et al., 2010)


2.5.1.2 Ultrasonic Sensor
Ultrasonic sensor proposed for basically extends use with modern
execution. At the point when a ultrasonic beat is reflected by an article, it
will transmitted at the time 0. The sensor gets this signal and converts it
to an electric indicator. The output pin will give a 38ms elevated amount
sign when there is no object is located. Figure 2.5 will show the example
of ultrasonic sensor.


12


Figure 2.5: Ultrasonic Sensor (Ying W. B., et. al., 2011).

2.5.2 Through-the-lens (TTL) Camera
The microcontroller projects that take a photograph or control a feature stream
are suitable to utilize this camera. These modules have a various aspects, for
example, the capacity to change the brilliance of pictures, auto-differentiation
and auto-shine alteration. The serial port commands can ask for that the
module solidify the feature and afterward download a JPEG color picture. So
for instance, regularly its simply showing feature to a security screen. The
maximum image size it can take is 640x480 pixels. Furthermore, it is delicate
to infrared light, which changes the shade form to some degree. In Figure 2.6
will show example of TTL serial camera. In Figure 2.7:(a) and (b) will show
the quality of image captured by TTL serial camera, one of outside during
cloudy day and one inside on a sunny day .

13


Figure 2.6: Through-the-lens (TTL) Camera (Adafruit, 2012).




Figure 2.7: (a) Image during cloudy day, (b) Image during on a sunny day
(Adafruit, 2012).

2.6 Microcontroller
The microcontroller is one of the most important electronic devices on which
modern technology is based on. Microcontroller uses are endless; from toys to
microwaves, ovens, TV sets, computers, printers, cars and so on. Digital circuits
become larger and larger as more functions need to be executed. In modern
digital world, most individual digital circuit components are sold in a single chip.
Those individual chips need power and space to operate. When the circuit
becomes huge, the traditional logic design approach is not the best option and
microcontrollers become convenient. Microcontrollers are basically sequential
14

machines because their operation depends on their current status and its inputs.
Their power lies in the fact that the hardwire configuration allows its operation to
be changed depending on programming. It is not required to use additional logic
circuits if the operation is changed.

2.6.1 Arduino Uno Board
Arduino is one of an incredible instrument for develop items, taking inputs
from an assortment of switches or sensors and controlling a mixture of lights,
engines and different outputs. There are serial correspondences APIs on most
programming languages so interfacing Arduino with a product system
running on the machine (Arduino, 2012). The Arduino board is a
microcontroller board, which is a little circuit that holds an entire machine on
a little chip. The Arduino Uno board has a 16 Mhz ceramic resonator, a USB
association, a force jack, an ICSP header, a reset catch, 6 simple inputs and
14 advanced information/yield pins (of which 6 could be utilized as PWM
yields). It utilizes the Atmega16u2 customized as a USB-to serial converter
rather than FTDI USB-to-serial driver chip which was utilized within all the
previous boards. The board up has 32 KB streak memory of which 0.5 KB is
utilized by bootloader, 2 KB of SRAM, 1 KB of EEPROM and 16 Mhz clock
speed (Arduino, 2012). In Figure 2.7 will show the Arduino Uno board.


Figure 2.8: Arduino Uno Board (Luitel, 2013)


15

2.7 Arduino Communication with PC
The Arduino can transmit and accept information by means of USB/Serial
link. You can either utilize the Arduino fundamental serial port or you can
leave that channel committed to programming and utilize two different pins
for an additional serial connection devoted to outer gadget. Arduino activities
could be set alone or they might be associated with a workstation utilizing
USB for the information force to capacity.

2.7.1 Arduino IDE
The Arduino board comes complete with an IDE and libraries which have
been intended for convenience and in minutes of introducing these you
could be flickering LED. This holds all the product which will run a
machine to program and correspond with an Arduino board.

The Arduino IDE holds a manager which we can use to compose draws
in a basic programming dialect displayed after the Processing language.
Utilizing the IDE the system we composed is changed over to C language
and afterward accumulated utilizing avr-gcc (Arduino, 2012). At the
point when rhe Arduino board is associated with a machine utilizing the
USB/Serial link, by utilizing the IDE we can arrange and transfer to
board the system.In Figure 2.8 will show the interface of Arduino IDE.
16


Figure 2.9: Arduino IDE (Raj, 2012)

2.8 Related Research
2.8.1 Design and Implementation of a Home Embedded Surveillance
System with Ultra-Low Alert Power (Ying W. B., et. al, 2011)
Outline and Implementation of a Home Embedded Surveillance System with
Ultra-Low Alert Power configuration utilizing PIR sensor and weight sensor
as the alarm gather in windows and entryways where a gatecrasher must pass
through. These low-power caution sensors awaken Micro Controller Unit
(MCU) which has power administration for the ultrasonic sensors and PIR
sensors inside. This state move technique spares an extensive number of
sensors needed for the alarm power. This test shows that can diminishing the
frameworks power consumption.in Figure 2.9 show the framework structural
planning of Home Embedded Surveillance System with Ultra-Low Alert
Power.
17


Figure 2.10: The home embedded surveillance system with ultra-low alert power
(Ying W. B., et. al.., 2011).

2.8.2 Room Monitoring System using Radio Frequency (RF)
Technology and Passive Infrared Sensor (PIR) (Noori, Anvarden,
2008).
Room Monitoring System utilizing Radio Frequency (RF) Technology and
Passive Infrared Sensor (PIR) This undertaking is answer for the power
wastage. PIR sensor utilized as a part of this task on the grounds that this
gadget is still new in business sector and not broadly investigated by peoples.
This gadget demonstration as a programmed switch, the light will
consequently on when there is vicinity of intruders in checked territory.
Monitoring framework likewise joined together to this task where, an
indicator will be send to observing room to demonstrate the vicinity of
individual in observed territory. The signals send to the observing room
utilizing Radio Frequency and turn on the sign for checked zone.

18

2.8.3 Surveillance System using AVR ATMEGA16 (Yusfaizal, 2009).
Surveillance System utilizing AVR Atmega16 task will expect to make the
interface between CMOS camera C3088 with the AVR Atmega16
microcontroller. The correspondence for the AVR and the workstation is
through serial port while the correspondence between AVR microcontrollers
is utilizing Ic protocol. Hyperterminal were utilized to send and get serial
information to and from workstation. Microcontroller will transform the
summon from the machine and focused around these on these order,
microcontroller will send proper information to camera and ask the camera to
catch and send back image to the computer.

2.9 Conclusion
The understanding on the elements of the systems involved for this project
which are surveillance system, motion sensor, communication and
microcontroller, is needed before proceed for the design and development
process. This is important to ensure the project done according to the main
idea of each part discuss in this chapter.














19

CHAPTER 3
METHODOLOGY
3.1 Introduction
To accomplish an objective and intend to achieve this extend, a philosophy is paramount
to focus the undertaking will effectively or not. All arrangements are incorporated in this
undertaking technique will characterize every strategy to create as it help to verify the
venture running easily as per the task course of events. This venture will utilize a few
stages as a part of planning a Passive Infrared (PIR) Sensor and Ultrasonic Sensor with
surveillance camera for data center security framework. In this project will use the
concept of the waterfall as a methodology. This research methodology has a five stage to
complete the project and it was a Problem definition, Information gathering, identify
project requirement, development and the last stage is the result and finding. With the
suitable research methodology, it will guide us as researcher to complete the project
phase by phase and do not mix up everything at the same time. Below in Figure 3.1 will
show the phases of the methodology in this project.

20

Figure 3.1: Phases of research project
3.2 Information Gathering
At this stage, is very important and first phase to conduct a project because researchers
can get lots of information can be used in this project. Moreover, the researcher is
collecting the all informations that was similar to the project by reading journal, article
and previous related project. For this project, required to comprehend the learning about
the electrical structure for the equipment improvement for the configuration circuit
methodology of movement sensor and surveillance camera framework.
3.3 Identify Project Requirement

After done with information gathering phase, move to identify the project
requirement phase. This phase will determine all devices and software that need to
complete this project. This project has two processes of development, that is
hardware and software development. With the reading from previous project that
have been developed, its really helping the researcher to identify the device and
software that can implement in this project. Other than that, this phase can help the
researcher to identify the amount of budget that need in this project and overall
budget for this project is approximately RM550.00. In the next subtopic will show
the lists of device and software requirement for this project.

3.3.1 Hardware Requirement

The hardware improvement was partitioned into two stages as demonstrated
in the block diagram underneath. The info phase of this framework was the
PIR and ultrasonic sensors. The second stage was the controller unit, which
was the Arduino microcontroller. The purpose of using this microcontroller
was to control the whole operation system by sending images to PC that
captured by surveillance cameras.

21

i. Passive Infrared Sensor (PIR)
In this project, PIR is used to detect movement that passes
through within sensor range using infrared radiation. The
maximum distance that can sense by PIR sensor is 290 cm and not
able to detect any movement when the human movement is more
than 290 cm apart from it (Ab-Rahman, et al., 2013).

ii. Ultrasonic Sensor
Ultrasonic is used to detect any object motion that passes through
within sensor range. The maximum distance that this sensor can
sense and detect is approximately 295 cm and not able to detect
any movement that is more than 295 cm apart from it (Ab-
Rahman, et al., 2013).

iii. Microcontroller Circuit (Arduino Uno)
Microcontroller will start function when it receives signals from
PIR and ultrasonic sensor. When the both sensors detect any
movement in sensing range, the microcontroller will trigger the
camera to capture. The microcontroller will connect to PC using
the USB / Serial cable to activate the camera. The using of
Arduino Uno as microcontroller because is a widely used used on
controlling devices due to its flexibility.

iv. Surveillance Camera
Through-the-lens (TTL) camera will be used in this project acts as
a surveillance camera. The maximum image size it can take is
640x480 pixels. And it is sensitive to infrared light, which
changes the colour version somewhat Camera will need to test to
make sure it is working correctly. Other than that, this testing to
make sure that the camera will function correctly when there is an
interface process between microcontroller and PC.
22


The list below shows are summarized that all the hardware required
specification and also the additional tools that will be used in this project.
1. Laptop
(a) Operating System (OS): Windows 7
(b) Microsoft Office 2010
2. Arduino Uno microcontroller board
3. PIR sensor
4. Ultrasonic sensor
5. TTL camera
6. USB/Serial cable
7. Breadboard
8. Jumper Cable

3.3.2 Software Requirement

i. Arduino IDE
In this project, the researcher will use the Arduino IDE that for the
programming the Arduino Uno microcontroller board. The
Arduino IDE holds a editor which we can use to compose draws
in a basic programming language displayed after the Processing
language. Using the IDE the program we wrote is converted to C
language and then compiled using avr-gcc (Arduino, 2012).
Arduino IDE is software used to write the coding for controlling
the process that will be running to receive signal from PIR and
ultrasonic sensor to activate the camera. This programming will
kept and embedded in microcontroller which is the
microcontroller is the main part of this project.



23

3.4 Development

3.4.1 Hardware Development

In the development phase has two segments of development. Firstly, the
researcher must wait until finish the hardware development before to
program it software to make it function. Below in Figure 3.2 will show the
two segments of development in this project.


Figure 3.2 : Division of development


3.4.2 Project Flow Diagram
This project is to develop a surveillance system with motion detector. By the
Figure 3.3 show below that the step involve from the beginning of the
process until the camera start to capture and send that image to the PC. If the
both sensors are not detect any movement in sensor range, the surveillance
camera will be in idle state and when the both sensor decet any movement in
sensor range, it will trigger the surveillance camera to start capturing the
image and send that image to PC storage.
24


Figure 3.3 : Flow chart of the process

3.4.3 Project Architecture
The diagram below show the architecture of this project. The main elements
that involve in this project are the microcontroller, PIR sensor, ultrasonic
sensor, and surveillance camera.
25


Figure 3.4 : Block diagram of the project

3.5 Testing
The last part to make sure the project is functional and working properly, is the
full testing. It means the hardware will interface with software to make it
function. This project will be successful when the sensor can detect human
movement and it can trigger the surveillance camera to start capturing. The image
will be stored in the PC storage.

3.6 Conclusion
This chapter of methodology is about the step that the researcher to follow to
complete this project successfully. With this methodology, it will make the flow
of the project will complete a task phase by phase without mix up everything at
the same time.



26

REFERENCES
1. Abros Noori , Anvardeen (2008) Room monitoring system using radio frequency
(RF) technology and passive infrared sensor (PIR). Undergraduates Project Report
(PSM) thesis, Universiti Malaysia Pahang.
2. Abd. Rani , Mior Mohammad Hafiizh (2007) Active infrared motion detector for
house security system. Undergraduates Project Report (PSM) thesis, Universiti
Malaysia
3. Ab-Rahman, M. S., Asmir, A. H., & Jumari, K. (2013). Development of camera and
GSM interfacing system for home security surveillance. Scientific Research and
Essays, 8(38), 1858-1871.
4. Bai, Y.-W., Xie, Z.-L., & Li, Z.-H. (2011). Design and implementation of a home
embedded surveillance system with ultra-low alert power. IEEE Trans. on Consum.
Electron., 57(1), 153-159. doi: 10.1109/tce.2011.5735496
5. Koay, Su Yeong (2003) Web Camera Application For Motion Detection. Masters
thesis, Universiti Putra Malaysia.
6. Park, K. Y., Jeon, J. H., & Park, G. M. Integrated Surveillance System and Field
Test in Urban Transit System.
7. Q. Hao, D. J. Brady, B. D. Guenther, J. Burchett, M. Shankar, and S. Feller,
Human tracking with wireless distributed radial pyroelectric sensors, IEEE
Sensors Journal, submitted, 2005.
8. Tong, L., Yaqi, C., Jun, L., Min, L., & Guoli, W. (2010, 7-9 July 2010). Distributed
infrared biometric sensing for lightweight human identification systems. Paper presented
at the Intelligent Control and Automation (WCICA), 2010 8th World Congress on.
9. Qi, H., Fei, H., & Yang, X. (2009). Multiple Human Tracking and Identification
With Wireless Distributed Pyroelectric Sensor Systems. Systems Journal, IEEE, 3(4),
428-439. doi: 10.1109/JSYST.2009.2035734
27

10. Varesano, F. (2011). Using arduino for tangible human computer interaction
(Doctoral dissertation, Doctoral dissertation, Masters thesis, University of Torino).
11. S. B. Lang, Pyroelectricity: from ancient curiosity to modern imaging tool,
Physics Today, vol. 58, no. 8, pp. 31-35, Aug. 2005.
12. S. J. Kang, V. B. Samoilov, and Y. S. Yoon, Low-frequency response of
pyroelectric sensors, IEEE Trans. Ultrason., Ferroelect., Freq. Contr.,
vol. 45, no. 5, pp. 1255-1260, Sept. 1998.
13. Subash Luitel (2013).Design and Implementation of a Smart Home System
14. Varghese, S. S., & Premi, M. G. User-Controlled Low Power Home Surveillance
System.
15. Yusfaizal, Mohamed Yusof (2009) Surveillance system using AVR
ATMEGA16. Undergraduates Project Report (PSM) thesis, Universiti Malaysia Pahang.
16. Zin, T. T., Tin, P., Hama, H., & Toriu, T. (2014, March). An integrated framework
for detecting suspicious behaviors in video surveillance. In IS&T/SPIE Electronic
Imaging (pp. 902614-902614). International Society for Optics and Photonics.











28

APPENDICES
APPENDIX A: Gantt chart to Complete Chapter 1 until Chapter 3





29

Você também pode gostar