Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Final Part Ii

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 63

1

WOMEN PROTECTION PATROLLING ROBOT USING


RASPBERRY PI
A Project Part -II Final Report

Submitted in partial fulfillment of Requirements for the


Award of the Degree of
BACHELOR OF TECHNOLOGY
IN
ELECTRONICS AND COMMUNICATION ENGINEERING
By
M. Hemanth Kumar (198A1A04B0)
M. Charanya (198A1A0483)
T. Bhanu Priya (198A1A0499)
SK. Nagoor Basha (198A1A04B7)
S. Rajeswari (198A1A0496)

Under the Esteemed Guidance of


Dr. CH. VENUGOPAL REDDY, M.E, Ph.D.
Professor & HOD

RISE KRISHNA SAI PRAKASAM GROUP OF


INSTITUTIONS: ONGOLE

(Approved by AICTE-NEW DELHI, Affiliated to JNTUK KAKINADA)


(An ISO 9001:2015 certified Institute, NBA accredited for B.Tech. in ECE, EEE, CE, ME and CSE)
Accredited By NAAC with “A” Grade
NH-16, Valluru, -523272, Ongole, Prakasam District, A.P

2022-2023
2

RISE KRISHNA SAI PRAKASAM GROUP OF


INSTITUTIONS: ONGOLE
(Approved by AICTE-NEW DELHI, Affiliated to JNTUK KAKINADA)
(An ISO 9001:2015 certified Institute, NBA accredited for B.Tech. in ECE, EEE, CE, ME and CSE)
Accredited By NAAC with “A” Grade
NH-16, Valluru, -523272, Ongole, Prakasam District, A.P

2022-2023

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING

CERTIFICATE

This is to certify that the project work entitled “WOMEN PROTECTION

PATROLLING ROBOT USING RASPBERRY PI ”is a bonafide record of project work


done Jointly by M. Hemanth Kumar(198A1A04B0),M. Charanya(198A1A0483) ,
T.BhanuPriya(198A1A0499),SK.NagoorBasha(198A1A04B7),S.Rajeswari(188A1A0431)
under my guidance and supervision and submitted in partial fulfillment of the requirement for
the award of the Degree of Bachelor of Technology in Electronics & Communication
Engineering by Jawaharlal Nehru Technological University, Kakinada during the academic
Year 2019-2023.

PROJECT GUIDE HEAD OF THE DEPARTMENT


Dr. CH. VENUGOPAL REDDY, M.E, Ph. D. Dr. CH. VENUGOPAL REDDY, M.E, Ph. D.
Professor & HOD Professor & HOD
Department of ECE Department of ECE

EXTERNAL EXAMINER
3

ACKNOWLEDGEMENT

We would like to express our sincere gratitude to our guide Dr.CH. VENUGOPAL
REDDY, M.E, Ph.D. for providing his invaluable guidance, comments, suggestions, and
support throughout the course of the project.

We pay our profound sense of gratitude to our Head of the Department Dr.CH.
VENUGOPAL REDDY, M.E, Ph.D. for providing an excellent environment in our college
and helping us at all points for achieving our task.

We pay our profound sense of gratitude to our Principial Prof. Dr. A. V. BHASKARA
RAO for providing an excellent environment in our college and helping us at all points for
achieving our task.

We express our sincere thanks to the Management of RISE Krishna Sai Prakasam Group
of Institutions, Valluru for providing a good environment and infrastructure.

Finally, we thank all our faculty members, supporting staff of ECE Department and friends
for their kind co-operation and valuable help for the completion of the project.

Project Associates

M. Hemanth Kumar (198A1A04B0)


M. Charanya (198A1A0483)
T. Bhanu Priya (198A1A0499)
SK. Nagoor Basha (198A1A04B7)
S. Rajeswari (198A1A0496)
RISE KRISHNA SAI PRAKASAM GROUP OF INSTITUTIONS: ONGOLE
(Approved by AICTE-NEW DELHI, Affiliated to JNTUK KAKINADA)
(An ISO 9001:2015 certified Institute, NBA accredited for B.Tech. in ECE, EEE, CE, ME and CSE)
Accredited By NAAC with “A” Grade
NH-16, Valluru, -523272, Ongole, Prakasam District, A.P

2022-2023

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING

Vision of the To be a premier institution in technical education by creating


Institute professionals of global standards with ethics and social responsibility for
the development of the nation and the mankind.
Impart Outcome Based Education through well qualified and
dedicated faculty.

Provide state-of-the-art infrastructure and facilities


Mission of for application-oriented research.
the Institute Reinforce technical skills with life skills and entrepreneurship skills.

Promote cutting-edge technologies to produce


industry-ready Professionals.
Facilitate interaction with all stakeholders to foster idea
s and innovation.
Inculcate moral values, professional ethics and social
responsibility
Vision of the To become a center of excellence in Electronics and
Department Communication Engineering to meet the global,
technological and industrial requirements.

Provide modern technical knowledge, professional skills and attitude


to meet industry needs.
Mission of
Promote innovations through professional training
the and development.
Department
Develop a team with professional ethics and
social responsibility.
RISE KRISHNA SAI PRAKASAM GROUP OF INSTITUTIONS: ONGOLE

(Approved by AICTE-NEW DELHI, Affiliated to JNTUK KAKINADA)


(An ISO 9001:2015 certified Institute, NBA accredited for B.Tech. in ECE, EEE, CE, ME and CSE)
Accredited By NAAC with “A” Grade
NH-16, Valluru, -523272, Ongole, Prakasam District, A.P
2022-2023
DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING

Program Educational Objectives (PEOs):

Graduates of the program will be able to


Intensive and extensive engineering knowledge and skill to
PEO1: understand, analyze, design and create novel products and solutions
in the field of
Core Skills
Signal Processing, Communication Systems, Embedded Systems
and VLSI.
PEO2: Capability to pursue career in industry or
Problem Solving higher studies with continuous learning.
and Lifelong
Learning
PEO3: Leadership qualities, team spirit, multi-disciplinary approach,
Entrepreneurship character modeling and lifelong learning for a successful
Skills professional career.

PEO4: Professional and ethical attitude, effective communication skills,


Professionalism and sense of responsibility towards society

Program Outcomes(POs):

PO1 Engineering Knowledge: Apply the knowledge of mathematics, science, engineering


fundamentals, and an engineering specialization to the solution of complex engineering
Problems

PO2 Problem Analysis: Identify, formulate, review research literature, and analyze complex
engineering problems reaching substantiated conclusions using first principles of
mathematics, natural sciences, and engineering sciences

PO3 Design/Development of Solutions: Design solutions for complex


engineering problems and design system components or processes that meet the
specified needs with appropriate consideration for the public health and safety,
and the cultural, societal, and environmental considerations.

PO4 Conduct Investigations of Complex Problems: Use research-based


knowledge and research methods including design of experiments, analysis and
interpretation of data, and synthesis of the information.
PO5 Modern Tool Usage: Create, select, and apply appropriate techniques, resources, and
modern engineering and IT tools including prediction and modelling to complex
engineering activities with an understanding of the limitations

PO6 The Engineer and Society: Apply reasoning informed by the contextual
knowledge to assess societal, health, safety, legal and cultural issues and the
consequent responsibilities relevant to the Professional engineering practice.

PO7 Environment and Sustainability: Understand the impact of the professional


engineering solutions in societal and environmental contexts, and demonstrate the
knowledge of, and need for sustainable development.

PO8 Ethics: Apply ethical principles and commit to professional ethics and
responsibilities and norms of the engineering practice
PO9 Individual and Team Work: Function effectively as an individual, and as a
member or leader in diverse teams, and in multidisciplinary settings

PO10 Communication: Communicate effectively on complex engineering activities


with the engineering community and with society at large, such as, being able to
comprehend and write effective reports and design documentation, make effective
presentations, and give and receive clear instructions

PO11 Project Management and Finance: Demonstrate knowledge and


understanding of the engineering and management principles and apply these to
one’s own work, as a member and leader in a team, to manage projects and in
multidisciplinary environments

PO12 Life-long Learning: Recognize the need for, and have the preparation and ability
to engage in independent and life-long learning in the broadest context of
technological change.
Program Specific Outcomes (PSO’s):
A student of the Electronics and Communication Engineering Program will be able to

PSO1 Design and implementation of complex systems by applying basic concepts in


Electronics &Communication Engineering to Electronics, Communications,
Signal Processing, VLSI, Embedded Systems (Core Skills).

PSO2 Solve complex Electronics and Communication Engineering problems, using


hardware and software tools, along with analytical skills to arrive cost
effective and appropriate solutions relevant to the society (Problem-Solving
Skills).
PSO3 Quality in technical subjects for successful higher studies and employment
(Professional Career).
RISE KRISHNA SAI PRAKASAM GROUP OF
INSTITUTIONS: ONGOLE
(Approved by AICTE-NEW DELHI, Affiliated to JNTUK KAKINADA)
(An ISO 9001:2015 certified Institute, NBA accredited for B.Tech. in ECE, EEE, CE, ME and CSE)
Accredited By NAAC with “A” Grade
NH-16, Valluru, -523272, Ongole, Prakasam District, A.P
2022-2023
DEPARTMENT OF ELECTRONICS & COMMUNICATION
ENGINEERING

Name of the Course : Project Part-1 Year & Semester : IV ECE & I

Academic Year : 2022-23 Regulation : R19

After completing this course the student must be able to

Course Outcomes (COs)

C416.1 Develop applications in various areas for societal needs

C416.2 Develop skills for analysis and synthesis of practical systems

C416.3 Acquire the use of new tools effectively and creatively.

Work in team to carry out analysis and cost-effective, environmentally friendly


C416.4 designs of engineering systems.

Write Technical / Project reports and oral presentation of the work done to an
C416.5 audience. Demonstrate a product developed.
RISE KRISHNA SAI PRAKASAM GROUP OF
INSTITUTIONS: ONGOLE
(Approved by AICTE-NEW DELHI, Affiliated to JNTUK KAKINADA)
(An ISO 9001:2015 certified Institute, NBA accredited for B.Tech. in ECE, EEE, CE, ME and CSE)
Accredited By NAAC with “A” Grade
NH-16, Valluru, -523272, Ongole, Prakasam District, A.P
2022-2023

DEPARTMENT OF ELECTRONICS & COMMUNICATION

ENGINEERING

Name of the Course : Project Part-1 Year &Semester : IV Year &I


Academic Year : 2022-23 Regulation : R19

CO Vs PO Mapping

Course
Outcomes PO PO PO PO PO PO PO PO PO PO PO PO
(COs) 1 2 3 4 5 6 7 8 9 10 11 12
2 2 3 2 3 3 3 2 3 3 3 3
C416.1
C416.2 2 2 3 2 3 2 2 2 3 3 3 3
C416.3 2 2 3 2 3 3 2 3 3 3 3 3
C416.4 3 2 3 2 3 2 3 3 3 3 3 3
C416.5 2 2 3 2 3 2 2 3 3 3 3 3
C416.6 2.20 2.00 3.00 2.00 3.00 2.40 2.40 2.60 3.00 3.00 3.00 3.00

CO VS PSO Mapping

Course Outcomes (COs) PS O1 PS O2 PS O3


C416.1 3 3 2
C416.2 3 3 2
C416.3 3 3 2
C416.4 3 3 2
C416.5 3 3 2
CONTENTS

PAGE.NO

1. ABSTRACT
2. INTRODUCTION
2.1 Background 1
2.2 Problem Definition 1
2.3 Project Objectives 2
2.4 Research Methodology 2
2.5 Facilities used for the Research 2

3. LITERATURE SURVEY 3-11

4. PROPOSED SYSTEM 12

5. BLOCK DIAGRAM
5.1 Raspberry PI & Pin Configuration 13-14
5.2 Sound Sensor 15
5.3 IR Sensor 15
5.4 Night Vision Camera 16
5.5 Motor Driver 16

6. FUTURE SCOPE OF THE PROJECT


6. 1 Advantages 17
6.2 Applications 17
6.3 Language 18
6.4 Technologies 18
7. EXPECTED RESULT AND DISCUSSION
7.1 Introduction 19
7.2 Result from Hardware Design 19
8. CONCLUSION 20

9. REFERENCES 21
LIST OF FIGURES

Fig Fig Page


Figure Name
Number Number
Fig: 3.1.1 3 Block diagram of Women Safety Night Patrolling Robot

Fig: 3.2.1 5 Block diagram of Implementation of Spy Robot for A


Surveillance System Using Internet Protocol of Raspberry PI.

Fig: 3.3.1 6 Block diagram of Night Patrolling Robot

Fig: 3.4.1 8 Block diagram of A Raspberry Pi Based Smart Ring For Women

Security Across The Internet Of Things

Fig: 3.5.1 9 Block diagram of A Raspberry Pi-Based Safety System For


Women Security Using Iot

Fig: 3.6.1 11 Block diagram of Design and Implementation of Women Auspice


System by Utilizing GPS And GSM

Fig: 5 13 Block Diagram of Women Protection Patrolling Robot Using

Raspberry PI

Fig: 5.1 14 Pin Configuration of Raspberry PI

Fig: 5.2 15 Sound Sensor

Fig: 5.3 15 IR Sensor

Fig: 5.4 16 Night vision camera

Fig: 5.5 16 Driver Motor

Fig: 6.3 18 Representation of Python Language

Fig: 6.4 18 Representation of Artificial Intelligence

Fig: 7.2 19 Expected Result from Hardware Design

ABSTRACT
Women's safety has become a major concern in all parts of the world as a result of
growing violence against them. They have become common to being physically or mentally
mistreated. Harassment at work and in public places is causing individuals to leave their
passions and goals. Although the government has passed various anti-harassment laws but,
the rate of female harassment has not decreased. Existing systems use CCTV cameras to
record incidents, but this is not a preventative strategy for women's protection, whereas the
suggested patrolling robot will patrol in its assigned area and check for anonymous
behaviours. As a result, the women's community will benefit more from the night patrolling
robot.

Department of ECE
CHAPTER 1
INTRODUCTION

1.1 Background

Robotics is the study of the Design, Development, Function, and Application of Robots. Robots
eliminate dangerous jobs for human because they are capable of working in hazardous
environments and manufacturing processes. Since the world faces serious issues regarding
women’s protection it is necessary to constitute our work towards it. Even in the 21st century
where technology is rapidly growing and new gadgets are being developed but still women and
girls are facing problems. To reduce those problems, we implementing a women
protection/safety patrolling robot using raspberry pi. The Women Safety Patrolling robot is an
attempt to make use of the robots for enhancing Women’s safety. It will be a great step towards
the rise of automation and Safety. Women safety patrolling robot makes the best use of its
features to work without any problem. It is primarily due to fear of violence against them or
being physically or sexually abused. Women’s robot patrolling system is the best way to reduce
the probability of becoming a victim of violent crime is to recognize, defend and look up
resources to help you in hazardous/dangerous situations.

1.2 Problem Definition


Among the worst countries in crime, India has an abhorrent track record in all forms
of sexual exploitation. In homes, on streets, in public transports and even offices. We have
created a nation where women are learning to cope with existential anxiety and we should be
ashamed. A lot of NGOs, rehabilitation centers and helpline numbers have been made
operational in the past years but they are all cures to the harassment that has already happened
and not the ‘preventions’ that we need. There are certain pre-existing apps that do send a
message to the saved contacts but none of them is effective and quick enough and according to
a survey, the existing technology doesn’t make most women feel safe. This all above overcome
with Patrolling Robot.

Department of ECE 1
1.3 Project Objective
The objectives of this project include the following:
1. We are focusing on building an effective, fast and reliant system to make the women of
India feel safe and empowered.
2. Our platform will act as a 24/7 active help and associate for women so that they don’t ever
feel that they are alone in the middle or dangerous situation.
3. It will unite and enable the citizens of India and the police to work towards a common
problem.
4. This tool will act as eyes and ears for the police and help them in preventing crimes against
women.

1.4 Research Methodology


The main research approach employed in this project is literature reviews from
engineering - based academic databases. Also, iterative testing and Data analysis on the final
product will be conducted.

1.5 Facilities used for the research


The facilities used in undertaking this project include online academic databases,
library and lab facilities.

Department of ECE 2
CHAPTER 2
INTRODUCTION TO EMBEDDED SYSTEMS

1.1Embedded Systems

EMBEDDED
SYSTEMS

SOFTWARE HARDWARE

 ALP  PROCESSORS
C  PERIPHERALS
 VB  MEMORY

Fig 1.1: Block Diagram of Embedded System

An embedded system is a system which is going to do a predefined specified task is the


embedded system and is even defined as combination of both software and hardware. A general-
purpose definition of embedded systems is that they are devices used to control, monitor or assist the
operation of equipment, machinery or plant. "Embedded" reflects the fact that they are an integral
part of the system. At the other extreme a general-purpose computer may be used to control the
operation in some cases a microprocessor may be designed in such a way that application
software.

Department of ECE 3
All embedded systems are including computers or microprocessors. Some of these computers
are however very simple systems as compared with a personal computer.
The very simplest embedded systems are capable of performing only a single function or set of
functions to meet a single predetermined purpose. In more complex systems an application program
that enables the embedded system to be used for a particular purpose in a specific application
determines the functioning of the embedded system. The ability to have programs means that the
same embedded system can be used for a variety of different purposes. In some cases a
microprocessor may be designed in such a way that application software for a particular purpose can
be added to the basic software in a second process, after which it is not possible to make further
changes. The applications software on such processors is sometimes referred to as firmware.

The simplest devices consist of a single microprocessor (often called a "chip”), which may
itself be packaged with other chips in a hybrid system or Application Specific Integrated Circuit
(ASIC). Its input comes from a detector or sensor and its output goes to a switch or activator which
(for example) may start or stop the operation of a machine or, by operating a valve, may control the
flow of fuel to an engine. As the embedded system is the combination of both software and hardware.

Software deals with the languages like ALP, C, and VB etc., and Hardware deals with
Processors, Peripherals, and Memory.

Memory: It is used to store data or address.

Peripherals: These are the external devices connected.

Processor: It is an IC which is used to perform some task.


In some cases, a microprocessor may be designed in such a way that application software for a
particular purpose can be added to the basic software in a second process, after which it is not
possible to make further changes. The applications software on such processors is sometimes referred
to as firmware.

Department of ECE 4
1.2Types of Embedded Systems

Embedded systems can be classified into different types based on performance, functional
requirements and performance of the microcontroller.

Fig 1.2: Types of Embedded System

Embedded systems are classified into four categories based on their performance and
functional requirements:
 Standalone embedded systems
 Real time embedded systems
 Networked embedded systems
 Mobile embedded systems
 Small scale embedded systems
 Medium scale embedded systems
 Sophisticated embedded systems

Department of ECE 5
1.2.1 Stand Alone Embedded Systems
Stand Alone embedded systems do not require a host system like a computer, it works by itself.
It takes the input from the input ports either analog or digital and processes, calculates and converts
the data and gives the resulting data through the connected device-Which either controls or drives
and displays the connected devices.

Examples for the standalone embedded systems are mp3 players, digital cameras, videogame
consoles, microwave ovens and temperature measurement systems.

1.2.2 Real Time Embedded Systems


Mobile embedded systems are used in portable embedded devices like cell phones, mobiles,
digital cameras, mp3 players and personal digital assistants, etc. The basic limitation of these devices
is the other resources and limitation of memory.
1.2.3 Networked Embedded Systems
These types of embedded systems are related to a network to access the resources. The
connected network can be LAN, WAN or the internet. The connection can be any wired or
wireless. This type of embedded system is the fastest growing area in embedded system
applications. The embedded web server is a type of system wherein all embedded devices are
connected to a web server and accessed and controlled by a web browser. Example for the
LAN networked embedded system is a home security system wherein all sensors are
connected and run on the protocol TCP/IP.
1.2.4 Mobile Embedded Systems
Mobile embedded systems are used in portable embedded devices like cell phones, mobiles,
digital cameras, mp3 players and personal digital assistants, etc. The basic limitation of these devices
is the other resources and limitation of memory.
1.2.5 Small Scale Embedded Systems
These types of embedded system are designed with a single 8 or 16-bit microcontrollers that
may even be activated by a battery. For developing embedded software for small scale embedded
systems, the main programming tools are an editor, assembler, cross assembler and integrated
development environment (IDE).

Department of ECE 6
1.2.6 Medium Scale Embedded Systems
These types of embedded systems design with a single or 16- or 32-bit microcontroller,
RISCs or DSPs. These types of embedded systems have both hardware and software complexities.
For developing embedded software for medium scale embedded systems, the main programming
tools are C, C++, and JAVA, Visual C++, and RTOS, debugger, source code engineering tool,
simulator and IDE.

1.2.7 Sophisticated Embedded Systems


These types of embedded systems have enormous hardware and software complexities that
may need ASIPs, IPs, PLAs, scalable or configurable processors. They are used for cutting-edge
applications that need hardware and software Co-design and components which have to assemble
in the final system.
1.3 Overview of Embedded system Architecture
Every embedded system consists of custom-built hardware built around a Central Processing
Unit (CPU). This hardware also contains memory chips onto which the software is loaded.

Department of ECE 7
Fig 1.3: Embedded System Architecture

1.3.1 Central Processing Unit

The Central Processing Unit (processor, in short) can be any of the following:
microcontroller, microprocessor or Digital Signal Processing (DSP). A micro-controller is a
low-cost processor. Its main attraction is that on the chip itself, there will be many other
components such as memory, serial communication interface, analog-to-digital converter etc. So,
for small applications, a micro-controller is the best choice as the number of external components
required will be very less. On the other hand, microprocessors are more powerful, but you need
to use many external components with them. DSP is used mainly for applications in which
signaling is involved such as audio and video processing.

1.3.2 Memory

The memory is categorized as Random Access Memory (RAM) and Read Only Memory (ROM).
The content of the RAM will be erased if power is switch off to the chip, where ROM retains the
contents even if the power is switched off. So, the firmware is stored in the ROM. When power is
switched on, the processer reads the ROM. The basic limitation of these devices is the other
resources and limitation of memory.
The program is executed. On the other hand, microprocessors are more powerful, but you
need to use many external components with them. DSP is used mainly for applications in which
signaling is involved such as audio and video processing. authentication and verification are
embedded systems. Encryption devices are nearly 99 percent of the processors that are manufactured
end up in embedded systems.

1.3.3 Input Devices


Unlike the desktop, the input devices to an embedded system have very limited capability. There
will be no keyboard or a mouse, and hence interacting with the embedded system is no easy
task. Many embedded systems will have a small keypad- you press one key to give a specific
command. A keypad may be used to input only the digits. Many embedded systems used in process
control do not have any input device for user interaction. They take inputs from sensors or
transducers produce electrical signals that are in turn fed to other systems.

Department of ECE 8
1.3.4 Output Devices
The output devices of the embedded systems also have very limited capability. Some
embedded systems will have a few Light Emitting Diodes (LEDs) to indicate the health status
of the system modules, or for visual indication of alarms. A small Liquid Crystal Display
(LCD) may also be used to display some important parameters.
1.4 Memory Architecture

There two different type’s memory architectures there are:


1. Harvard Architecture
2. Von-Neumann Architecture
1.4.1 Harvard Architecture

Computers have separate memory areas for program instructions and data. There are two or
more internal data buses, which allow simultaneous access to both instructions and data. The CPU
fetches program instructions on the program memory bus.
The Harvard architecture is a computer architecture with physically separate storage and signal
pathways for instructions and data. The term originated from the Harvard Mark I relay-based
computer, which stored instructions on punched tape (24 bits wide) and data in electro-mechanical
counters. These early machines had limited data storage, entirely contained within the central
processing unit, and provided no access to the instruction storage as data. Programs needed to be
loaded by an operator, the processor could not boot itself.

Department of ECE 9
Fig 1.4.1: Harvard Architecture

1.4.2 Modern Uses of Harvard Architecture


The principal advantage of the pure Harvard architecture - simultaneous access to more
than one memory system - has been reduced by modified Harvard processors using modern CPU
cache systems. Relatively pure Harvard architecture machines are used mostly in applications where
tradeoffs, such as the cost and power savings from omitting caches, outweigh the programming
penalties from having distinct code and data address spaces.

Digital signal processors (DSPs) generally execute small, highly-optimized audio or video
processing algorithms. They avoid caches because their behavior must be extremely reproducible. The
difficulties of coping with multiple address spaces are of secondary concern to speed of execution.
As a result, some DSPs have multiple data memories in distinct address spaces to facilitate SIMD and
VLIW processing. Texas Instruments TMS320 C55x processors, as one example, have multiple
parallel data busses (two write, three read) and one instruction bus.
Microcontrollers are characterized by having small amounts of program (flash
memory) and data (SRAM) memory, with no cache, and take advantage of the Harvard
architecture to speed processing by concurrent instruction and data access. The separate
storage means the program and data memories can have different bit depths, for example
using 16-bit wide instructions and 8-bit wide data. They also mean that instruction pre-fetch
can be performed in parallel with other activities.
Examples include, the AVR by Atmel Corp, the PIC by Microchip Technology, Inc and
the ARM Cortex-M3 processor (not all ARM chips have Harvard architecture).
Even in these cases, it is common to have special instructions to access program memory as
data for read-only tables, or for reprogramming.

Department of ECE 10
CHAPTER 3
LITERATURE SURVEY
3.1 WOMEN SAFETY NIGHT PATROLLING ROBOT
AUTHORS: Dr.M. Sivachitra, T. NaveenRaj, V.G. Rekhasri, N. Sowmiyaa.
ABSTRACT: In these days’ women safety is the biggest issue in all parts of the world due to increased
violence against them. Getting physically or mentally abused has become a part of their daily life.
Workplace harassment and public place harassment are forcing them to quit their passion and dreams.
Even though the government has enacted several laws against women harassment, threat of women
harassment has not reduced. There are only few preventive measurements to reduce the probability of
women harassment. The best way to reduce the violence (robbery, sexual assault, domestic violence,
etc) against them is being amoral support. So, the night Patrolling Robot will be attempting to ensure
women safety.

3.1.1 PROPOSED SYSTEM:

Fig 3.1.1 Block Diagram of Proposed system

The suggested patrolling robot will patrol in its assigned area and check for anonymous behaviors’.
As a result, the women's community will benefit more from the night patrolling robot.

Department of ECE 11
Technologies: IoT
Hardware:
 Arduino Uno
 Motors
 L293D Drivers

Advantages: It reduces the violence like robbery, sexual assault.


Disadvantages: Short circuit occurs due to using Arduino because of less connections.

3.2 Implementation of Spy Robot for A Surveillance System using internet


protocol of Raspberry PI.
AUTHORS: Ghanem Osman El haj Abdalla.

ABSTRACT: At present the surveillance of international border areas is a difficult task. The border
guarding forces are patrolling the border seriously, but it is not possible to watch the border at each
and every moment. An essential requirement of this situation is a robot which automatically detects
trespasser in the border and report nearby board security control unit. Many of the military
departments now utilize the robots to carry out risky jobs that cannot be done by the soldiers. The spy
robot system comprises the Raspberry Pi (small single-board computer), night vision pi camera and
sensors. The information regarding the detection of living objects by PIR sensor is sent to the users
through the web server and pi camera capture the moving object which is posted inside the webpage
simultaneously. The user in control room able to access the robot with wheel drive control buttons on
the webpage. The movement of a robot is also controlled automatically through obstacle detecting
sensors to avoiding the collision. This surveillance system using spy robot can be customized for
various fields like industries, banks and shopping malls.

Department of ECE 12
3.2.1 Proposed System:

Fig 3.2.1 Block Diagram of Proposed system

Hardware:

 Raspberry PI

 Vision Sensor

 Motor Driver

 Obstacle Sensor

Technologies: IoT, AI

Advantages: It capture the images by using pi camera and here used night vision cameras

Disadvantage: The main disadvantage is the robot will control by user and sends to predefine mail
id.

Department of ECE 13
3.3 Night Patrolling Robot
AUTHORS: Farabee Khalid, Itmamul Haque Albab, Dipto Roy, Azad Prince Asif, Kawshik Shikder
ABSTRACT: Security is a necessity of every human being. With an increase in population the
demand of security has increased. But due to lack of proper resources proper security cannot be
arranged. To achieve proper security, it requires a heavy payment, which not all can afford. The aim
of the research was to provide a solution to the problem by designing a smart robot that can provide
quality security with a fraction of price, when considering long term effects. The idea was to design
and implement a rover, that takes the advantage of modern technology allowing it to roam
autonomously without the assistance of humans, scouring the area and alerting the control room
once any abnormality has been detected. The robot has built in GPS navigation for figuring out the
routes of its workplace. The robot is also equipped with a smart camera that allows for capturing of
live video and images of the intruder when the time comes.

3.3.1 Proposed System:

Department of ECE 14
Fig 3.3.1 Block Diagram of Proposed system

Hardware:
 Raspberry PI
 Motor Driver
 Motor

 GSM

Advantage: The robot has the advantage of using a smart camera, having the functionality of human
detection, tracking and night vision, which can be controlled wirelessly via an app, making it easy to
use and monitor.
Disadvantage: The main disadvantage is it is a human controlled robot by using app

3.4 A RASPBERRY PI BASED SMART RING FOR WOMEN


SECURITY ACROSS THE INTERNET OF THINGS
AUTHORS: N. R. Sogi, P. Chatterjee, U. Nethra and V. Suma.
ABSTRACT: Every day, every woman, young girls, mothers and women from all walks of life are
struggling to be safe and protect themselves from the roving gaze of the horribly insensitive men who
molest, assault and violate the dignity of women on a daily basis. The streets, public transport, public
places in particular have become the dominion of the hunters. Due to these atrocities that women are
subjected to in the present scenario, a smart security wearable device for women based on Internet of
Things is proposed. It is implemented in the form of a smart ring and comprises of Raspberry Pi Zero,
Raspberry Pi camera, buzzer and button to activate the services. This device is extremely portable and
can be activated by the victim on being assaulted just by the click of a button that will fetch her current
location and also capture the image of the attacker via Raspberry Pi camera. The location and the link of
the image captured will be sent to predefined emergency contact numbers or police via smart phone of
the victim thus preventing the use of additional hardware devices/modules and making the device
compact.

Department of ECE 15
3.4.1 Proposed System:

Fig 3.4.1 Block Diagram of Proposed system

Hardware:
 Raspberry PI
 Buzzer
 Camera
Technologies: IoT
Advantages:
 Criminal Identification
 A boon to senior citizens and people suffering from medical issues

Disadvantage: The disadvantage is any time carry the ring.

Department of ECE 16
3.5 A RASPBERRY PI-BASED SAFETY SYSTEM FOR WOMEN
SECURITY USING IOT
AUTHORS: Bhuvaneshwari Mehtre
ABSTRACT: Every day, each girl, women, and those from different backgrounds of life struggle
to be secure and rescue themselves from the quite disrespectful guy’s roving eye that abuses girl’s
dignity each day. Its miles implemented within the form of a cleaver IoT tool and include
Raspberry Pi, Heartbeat sensor, temperature sensor, GPS, Panic button, and camera. This device
is extremely compact and may be triggered utilizing the sufferer just through clicking a button
and additionally use to study human temperature and heart rate exceeds above the edge cost it
without delay ship her cutting-edge location, and seize the attacker's photograph, through the
raspberry pi camera. The location and connection of the captured picture and SMS can be sent to
the selected contact numbers or police. We additionally use voice factor when the lady is not in
that situation to press button, she uses to mention help then a message will be dispatched to the
emergency contact numbers.

3.5.1 Proposed System:

Fig 3.5.1 : Block Diagram of Proposed System


Hardware:
 Temparature sensor
Department of ECE 17
 Heartbear sensor
 LCD
 Raspberry PI

Technologies: IoT
Advantage: The raspberry pi is integrated with a temperature sensor, heart Beat sensor, GPS,
camera module. When a woman is in danger the alert will send automatically, manually to the
concerned authorities SMS alert will send to the concerned authorities.
Disadvantage: Carrying the all the sensors and boards with us is very difficult.

3.6 DESIGN AND IMPLEMENTATION OF WOMEN AUSPICE SYSTEM


BY UTILIZING GPS AND GSM
AUTHORS: Naeemul Islam, Md. Anisuzzaman, Sikder Sunbeam Islam, Mohammed Rabiul
Hossain, Abu Jafar Mohammad Obaidullah.
ABSTRACT: The aim of this work is to develop a device for the safety and protection of women
and girls. Indeed, even today, an evil break is made when ladies venture out with a niggling
apprehension in their brains about their safety. We regularly find out about rape cases that make
our blood run cold. It is a lamentable perception that there has been a significant increment in
crimes against women in the previous decade. The reason can be credited to the time gap between
the real time of the crime and its time of reporting to the ascendancy. In the event that by one way
or another the unfortunate casualties could pass on their situation progressively; the issue can be
repressed. In this project, we propose a device that sends SMS and area directions of the client to
the relatives of the client or helpline number. In this system, we have used a GPS module to
access location of user instantly. Three push buttons are implemented to define the types of an
accident victim is facing. When the user faces any hassles in any place, it can push any of these
three buttons. Then microcontroller will receive it and send an SMS to the specific phone
number. The location of the user will be continuously traced until user switch off the system
when rescued. In addition, to control the whole system we have used a PIC16F887A
microcontroller powered by four AA batteries.

Department of ECE 18
3.6.1 Proposed System:

Fig 3.6.1 : Block Diagram of Proposed System

Hardware:
 Buttons
 16x2 Display

Advantage: Device that sends SMS and area directions of the client to the relatives of the client or
helpline number. In this system, we have used a GPS module to access location of user instantly.
Disadvantage: The main disadvantage is whenver we push the button across three buttons
that time only this system will work.

Department of ECE 19
CHAPTER 4
PROPOSED SYSTEM
The idea behind this is to provide security to women. Any abnormal activity and small interaction of
sound results in the alert of the concerned authority. The Women Protection Patrolling robot is an
attempt to make use of the robots for enhancing Women’s safety. It will be a great step towards the
rise of automation and Safety. Women Protection Patrolling robot makes the best use of its features
to work without any problem. It is primarily due to fear of violence against them or being physically
or sexually abused. Women’s robot patrolling system is the best way to reduce the probability of
becoming a victim of violent crime is to recognize, defend and look up resources to help you in
hazardous/dangerous situations. Then robot automatically goes to the particular area and captures the
image of that area and sends it to the user predefined mail id.

Department of ECE 20
Fig 4:- Representation of Proposed System

CHAPTER 5
BLOCK DIAGRAM

Fig 5: Block Diagram of Women Protection Patrolling Robot Using Raspberry PI

Department of ECE 21
CHAPTER 6
HARDWARE IMPLEMENTATION

6.1 Raspberry PI
The Raspberry Pi is a low cost, credit-card sized computer that plugs into a computer monitor
or TV, and uses a standard keyboard and mouse. It is a capable little device that enables people of all
ages to explore computing, and to learn how to program in languages like Scratch and Python. It’s
capable of doing everything you’d expect a desktop computer to do, from browsing the internet and
playing high-definition video, to making spreadsheets, word-processing, and playing games.
The Raspberry Pi is a remarkable device: a fully functional computer in a tiny and low-cost
package. Whether you’re looking for a device you can use to browse the web or play games, are
interested in learning how to write your own programs, or are looking to create your own circuits and
physical devices, the Raspberry Pi – and its amazing community – will support you every step of the
way. The Raspberry Pi is known as a single-board computer, which means exactly what it sounds
like: it’s a computer, just like a desktop, laptop, or smart phone, but built on a single printed circuit
board. Like most single-board computers, the Raspberry Pi is small – roughly the same footprint as a
credit card – but that doesn’t mean it’s not powerful: a Raspberry Pi can do anything a bigger and
more power-hungry computer can do, though not necessarily as quickly.
The Raspberry Pi family was born from a desire to encourage more hands-on computer
education around the world. Its creators, who joined together to form the non-profit Raspberry Pi
Foundation, had little idea that it would prove so popular: the few thousand built in 2012 to test the
waters were immediately sold out, and millions have been shipped all over the world in the years
since. These boards have found their ways into homes, classrooms, offices, data centers, factories,
and even self-piloting boats and space faring balloons. Various models of Raspberry Pi have been
released since the original Model B, each bringing either improved specifications or features specific
to a particular use-case. The Raspberry Pi Zero family, for example, is a tiny version of the full-size

Department of ECE 22
Raspberry Pi which drops a few features – in particular the multiple USB ports and wired network
port – in favour of a significantly smaller layout and lowered power needs.

Fig 6.1: Raspberry PI 4 Model B

The name system-on-chip is a great indicator of what you would find if you prised the metal
cover off: a silicon chip, known as an integrated circuit, which contains the bulk of the Raspberry
Pi’s system. This includes the central processing unit (CPU), commonly thought of as the ‘brain’ of a
computer, and the graphics processing unit (GPU), which handles the visual side of things. A brain is
no good without memory, however, and on the underside of the Raspberry Pi you’ll find exactly that:
another chip, which looks like a small, black, plastic square (Figure 1-3). This is the Pi’s random-
access memory (RAM). When you’re working on the Pi, it’s the RAM that holds what you’re doing;
only when you save your work will it be written to the microSD card. Together, these components
form the Pi’s volatile and non-volatile memories: the volatile RAM loses its contents whenever the Pi
is powered off, while the non-volatile microSD card keeps its contents.

Department of ECE 23
6.1.1 Raspberry PI Pin Diagram

Fig 6.1.1 : Pin Diagram of Raspberry PI

6.2 Sound Sensor


The sound sensor is one type of module used to notice the sound. Generally, this module is used to
detect the intensity of sound. The applications of this module mainly include switch, security, as well
as monitoring. The accuracy of this sensor can be changed for the ease of usage. This sensor employs
a microphone to provide input to buffer, peak detector and an amplifier. This sensor notices a sound,
& processes an o/p voltage signal to a microcontroller. After that, it executes required processing.

Department of ECE 24
This sensor is capable to determine noise levels within DB’s or decibels at 3 kHz 6 kHz
frequencies approximately wherever the human ear is sensitive. In smartphones, there is an android
application namely decibel meter used to measure the sound level.

Fig 6.2 : Sound Sensor

6.3 IR Sensor
IR sensor is an electronic device, that emits the light in order to sense some object of the
surroundings. An IR sensor can measure the heat of an object as well as detects the motion.
Usually, in the infrared spectrum, all the objects radiate some form of thermal radiation.

Fig 6.3 IR Sensor

How to Use IR Sensor Module?


The 5 VDC supply input is given to the VCC pin and the supply negative is connected to the GND
terminal of the module. When no object is detected within the range of the IR receiver, the output LED
remains off. When a object is detected within the range of the IR sensor the LED glows.

Department of ECE 25
Fig 6.3.1: IR Sensor Working

6.4 PI Camera Module


Pi Camera module is a camera which can be used to take pictures and high definition video.
Raspberry Pi Board has CSI (Camera Serial Interface) interface to which we can attach PiCamera
module directly. This Pi Camera module can attach to the Raspberry Pi’s CSI port using 15-pin
ribbon cable.
Features of Pi Camera
Here, we have used Pi camera v1.3. Its features are listed below:
Resolution – 5 MP
HD Video recording – 1080p @30fps, 720p @60fps, 960p @45fps and so on.
It Can capture wide, still (motionless) images of resolution 2592x1944 pixels
CSI Interface enabled.
How to attach Pi Camera to Raspberry Pi?
Connect Pi Camera to CSI interface of Raspberry Pi board as shown below:
CSI Port position.
How to connect Pi camera?
Now, we can use Pi Camera for capturing images and videos using Raspberry Pi.
Before using Pi Camera, we need to enable camera for its working.

Department of ECE 26
How to Enable Camera functionality on Raspberry Pi?
For enabling camera in Raspberry Pi, open raspberry pi configuration using following command,
sudo raspi-config and then select Interfacing options in which select camera option to enableits
functionality.reboot Raspberry Pi. Now we can access camera on Raspberry Pi.
Now we can capture images and videos using Pi Camera on Raspberry Pi.
Example
Capture images and save it to the specified directory.
We can capture images using Python. Here, we will write a Python program to capture images using
Pi Camera on Raspberry Pi.
Here, we have used picamera package(library) which provides different classes for Raspberry Pi. Out
of which we are mainly interested in PiCamera class which is for camera module.

Fig 6.4: Raspberry Pi Camera Module

Department of ECE 27
Python Program for Image Capture
#create object for PiCamera class
camera = picamera.PiCamera()
#set resolution
camera.resolution = (1024, 768)
camera.brightness = 60
camera.start_preview()
#add text on image
camera.annotate_text = 'Hi Pi User'
sleep(5)
#store image
camera.capture('image1.jpeg')
camera.stop_preview()

6.5 L298N Driver Motor


The motor driver package L298N is interfaced with 89C51 microcontroller through IN1 to
IN4 of H Bridge (L293D). Both the enable pins (EN1 and EN2) of motor driver L298N is combined
together and fed to controller to access the command signals. Depending up on the command signals
issued by the controller, the enable pins are activated to control all the four internal drivers of L298N
respectively to drive two geared DC motors. Hear H Bridge is required, because the microcontroller
output is not sufficient to drive the DC motors, so current drivers are required for motor rotation.

The L298N is a quad, high current, half-H driver designed to provide bidirectional drive
currents of up to 600mA at voltages from 4.5V to 36V. It makes it easier to drive the DC motors. The
L298N consists of four drivers. Pins IN1 through IN4 and OUT1 through OUT4 are input and output
pins, respectively, of driver 1 through driver 4. Drivers 1 and 2, and drivers 3 and 4 are enabled by
enable pin 1 (EN1) and pin 9 (EN2), respectively. When enable input EN1 (Pin1) is high, drivers 1
and 2 are enabled and the outputs corresponding to their inputs are active. Similarly, enable input
EN2 (Pin9) enables drivers 3 and 4.

Department of ECE 28
Features

1. High operating voltage, which can be up to 40 volts;


2. Large output current, the instantaneous peak current can be up to 3A;
3. With 25W rated power;
4. Two built in H-bridge, high voltage, large current, full bridge driver, which can be used to
drive DC motors, stepper motors, relay coils and other inductive loads.
5. Using standard logic level signal to control.
6. Able to drive a two-phase stepper motor or four-phase stepper motor, and two-phase DC
motors.
7. Adopt a high-capacity filter capacitor and a freewheeling diode that protects devices in the
circuit from being damaged by the reverse current of an inductive load, enhancing reliability

Fig 6.5: L298N Driver Motor

Department of ECE 29
6.6 T- Cobbler
This is the assembled version of the Pi T-Cobbler Plus.  It only works with the Raspberry Pi
Model Zero, A+, B+, Pi 2, Pi 3 & Pi 4! (Any Pi with 2x20 connector).
How do connect the T-cobbler to the Pi?
We can plug the 40-pin GPIO cable between the Pi computer and the T-Cobbler breakout.
The T-Cobbler can plug into any solderless breadboard (or even a prototyping board like the
PermaProto).

Fig 6.6: T-Cobbler

6.7 Ribbion Cable(40 Pin)


The 2.54mm Pitch 40 Pin GPIO Ribbon Cable has Good appearance, without defects of
plastic injection molding, metal parts may not have scratches, deformation and other defects of
performance to meet the requirements. This ribbon cable widely used in various computer
equipment, machinery, electrical appliances, cars, color TV, air conditioning, LED display, DVD,
VCD, and other connectors and connector. Ribbon Cables consist of multiple wires attached to each
other in the form of a flexible ribbon. Due to their flexibility Ribbon Cables have many different
functions. Also, they are a vital part of multiple electronics.  Another term for these cables is “flat
cables”. This is a literal description of their appearance. Structurally speaking the individual
conductors form a ribbon by the addition of an insulating material. This material is usually PVC.
However, Teflon is another material that can insulate the conductors.

Department of ECE 30
Cable UL2651 28AWG or custom

Cable Pitch PH1.0MM

7/0.12MM (Other
Copper wire Conductor general 7/0.08MM, 7/0.09MM, 7/0.1MM, 7/0.16MM,
7/0.2MM 7 of 7-strand copper wire)

Gray with red edge


Jacket colour
(And another colour, Gray and yellow, to be ordered!)

Connector 40 Pin 2mm Pitch IDC Female Connector

Conductor diameter 0.12 ± 0.005mm

Conductor Elongation 18% ↑

Withstand Voltage 2KV 10mA /

Conductor resistance ≤237 ohms / RM ↓

Operating temperature 15mΩ

Operating Temperature -40 °C ~ + 105 °C

Insulation Jacket Environmental PVC 45P (RoHS) 8058 Grey

Service OEM ODM Accepted

Department of ECE 31
Fig 6.7: Rainbow Ribbion Cable

6.8 60 RPM 12v Geared DC Motors


60 RPM 12V DC geared motors widely used for robotics applications. A DC motor is an
electrical machine that converts electrical energy into mechanical energy. In a DC motor, the input
electrical energy is the direct current which is transformed into the mechanical rotation. 
Permanent magnet DC motor responds to both voltage and current. The steady state voltage
across a motor determines the motor’s running speed, and the current through its armature windings
determines the torque. Apply a voltage and the motor will start running in one direction; reverse the
polarity and the direction will be reversed. If you apply a load to the motor shaft, it will draw more
current, if the power supply does not able to provide enough current, the voltage will drop and the
speed of the motor will be reduced. However, if the power supply can maintain voltage while
supplying the current, the motor will run at the same speed. In general, you can control the speed by
applying the appropriate voltage, while current controls torque. In most cases, DC motors are
powered up by using fixed DC power supply, therefore; it is more efficient to use a chopping
circuit.

Fig 6.8: 60 RPM 12 Geared Dc Motor

Department of ECE 32
6.9 Wheels
A circular frame of hard material that may be solid, partly solid, or spoked and that is capable of
turning on an axle.

Fig 6.9: Wheels

6.10 Buzzer
Piezo Electric buzzers are Solid state devices that produce an Audible signal when powered.
They are basically made up of piezo crystal.
The fundamental property of Piezo crystal states that when a voltage is applied to the crystal in a
particular plane. It enters into oscillations.
A simple oscillator circuit is used to make these signals audible.
Piezo electric buzzers operate right from 3V up to 24V DC. Similar to the LED drive, a transistor
driver is used for driving the load. The other advantage with this scheme is that the drive voltage can
be much higher than the operating voltage of the microcontroller.
A protection diode is included in all inductive load circuits to prevent the back emf from damaging
the driving transistor & subsequently the microcontroller.

Department of ECE 33
Fig 6.10: Buzzer

6.11 Jumper Wires


Jumper wires are simply wires that have connector pins at each end, allowing them to be used to
connect two points to each other without soldering. Jumper wires are typically used with bread
boards and other prototyping tools in order to make it easy to change a circuit as needed. Fairly
simple. In fact, it doesn’t get much more basic than jumper wires.
It has mainly three types:
6.11.1 Male to Male
This is 20 cm Male to Male Breadboard Jumper Dupont 2.54MM 1P-1P Cable 40 Pcs. A very
Flexible and easily detachable cable to the no. of wires according to your requirement. It has 1Pin
Female to the 1pin male header with another end Female. Also, it is compatible with 2.54 mm mil
spacing pin headers. This cable is an electrical wire or group of them in a cable with a connector or
pins at each end, which is normally for interconnecting the components of a breadboard or other
prototype or test circuit, internally or with other equipment or components, without soldering.
Individual Dupont Cables are fitted by inserting their “end connectors” into the slots provided in a
breadboard, the header connector of a circuit board, or a piece of test equipment. Mostly it is useful
with Orange Pi, Banana Pi, Raspberry Pi, Arduino, and other mini pc and development boards. It is
very useful in the PCB project, pc motherboard, as well as Breadboard connections. Additionally, it
allows you to plug and unplug easily for prototyping and can be used over and over again. This
Product is known as Male-to-Male Jumper Cable, Jumper Cable, Jumper Wire Male to Male, Jumper
Wire Male to Male Connector, Male to Male Connector, Male to Male Jumper Wire.

Department of ECE 34
Fig 6.11.1: Male to Male Jumper Wires

6.11.2 Male to Female


Mostly it is useful with Orange Pi, Banana Pi, Raspberry Pi, Arduino, and other mini pc and
development boards. It is very useful in the PCB project, pc motherboard, as well as Breadboard
connections. Additionally, it allows you to plug and unplug easily for prototyping and can be used
over and over again.

Fig 6.11.2: Male to Female Jumper Wires

6.11.3 Female to Female


Mostly it is useful with Orange Pi, Banana Pi, Raspberry Pi, Arduino, and other mini pc and
development boards. It is very useful in the PCB project, pc motherboard, as well as Breadboard
connections. Additionally, it allows you to plug and unplug easily for prototyping and can be used
over and over again.

Department of ECE 35
Fig 6.11.3: Female to Female Jumper Wire

6.12 Batteries

An electric battery is a source of electric power consisting of one or more electrochemical


cells with external connections for powering electrical devices. When a battery is supplying power,
its positive terminal is the cathode and its negative terminal is the anode. The terminal marked
negative is the source of electrons that will flow through an external electric circuit to the positive
terminal. When a battery is connected to an external electric load, a redox reaction converts high-
energy reactants to lower-energy products, and the free-energy difference is delivered to the external
circuit as electrical energy. Historically the term "battery" specifically referred to a device composed
of multiple cells; however, the usage has evolved to include devices composed of a single cell.

Primary batteries are used once and discarded, as the electrode materials are irreversibly changed


during discharge; a common example is the alkaline battery used for flashlights and a multitude of
portable electronic devices. Secondary (rechargeable) batteries can be discharged and recharged
multiple times using an applied electric current; the original composition of the electrodes can be
restored by reverse current. Examples include the lead-acid batteries used in vehicles and lithium-
ion batteries used for portable electronics such as laptops and mobile phones.

Batteries come in many shapes and sizes, from miniature cells used to power hearing aids and
wristwatches to, at the largest extreme, huge battery banks the size of rooms that provide standby or
emergency power for telephone exchanges and computer data centers.

Department of ECE 36
Batteries have much lower specific energy (energy per unit mass) than common fuels such as
gasoline. In automobiles, this is somewhat offset by the higher efficiency of electric motors in
converting electrical energy to mechanical work, compared to combustion engines.

Fig 6.12: Circuit Diagram of Battery

6.13 SD Card(32 GB)


SD card. Secure Digital, officially abbreviated as SD, is a proprietary non-volatile
memory card format developed by the SD Card Association (SDA) for use in portable devices. By
using SD Card, we can store the data regarding the values are photos or sensors data.

Fig 6.13: 32 GB SD Card

6.14 Light Emmiting Diodes

Department of ECE 37
Light Emitting Diodes or LEDs, are among the most widely used of all the types of diodes
available. They are the most visible type of diode that emits a fairly narrow bandwidth of either
visible colored light, invisible infra-red or laser type light when a forward current is passed through
them. A "Light Emitting Diode" or LED as it is more commonly called, is basically just a specialized
type of PN-junction diode, made from a very thin layer of fairly heavily doped semiconductor
material. When the diode is Forward Biased, electrons from the semiconductor’s conduction band
combine with holes from the valence band, releasing sufficient energy to produce photons of light.
Because of this thin layer a reasonable number of these photons can leave the junction and radiate
away producing a colored light output.

Unlike normal diodes which are made for detection or power rectification, and which are
generally made from either Germanium or Silicon semiconductor material, Light Emitting Diodes are
made from compound type semiconductor materials such as Gallium Arsenide (GaAs), Gallium
Phosphide (Gap), Gallium Arsenide Phosphide (Gasp), Silicon Carbide (Sic) or Gallium Indium
Nitride (Gain). The exact choice of the semiconductor material used will determine the overall
wavelength of the photon light emissions and therefore the resulting color of the light emitted, as in
the case of the visible light-colored LEDs, (RED, AMBER, GREEN etc).

Typical LED Characteristics


Semiconductor
Wavelength Colour VF @ 20mA
Material
++++GaAs 850-940nm Infra-Red 1.2v
Gasp 630-660nm Red 1.8v
Gasp 605-620nm Amber 2.0v
Gaspin 585-595nm Yellow 2.2v
Gap
550-570nm Green 3.5v

Department of ECE 38
SiC 430-505nm Blue 3.6v
GainN 450nm White 4.0v

From the table above we can see that the main P-type dopant used in the manufacture of Light
Emitting Diodes is Gallium (Ga, atomic number 31) and the main N-type dopant used is Arsenic (As,
atomic number 31) giving the resulting Gallium Arsenide (GaAs) crystal structure, which has the
characteristics of radiating significant amounts of infrared radiation from its junction when a forward
current is flowing through it. By also adding Phosphorus (P, atomic number 15), as a third dopant the
overall wavelength of the emitted radiation is reduced to give visible red light to the human eye.

Further refinements in the doping process of the PN-junction have resulted in a range of
colors available from red, orange and amber through to yellow, and the recently developed blue LED
which is achieved by injecting nitrogen atoms into the crystal structure during the doping process

Light Emitting Diodes I-V Characteristics:

Before a light emitting diode can "emit" any form of light it needs a current to flow through it,
as it is a current dependent device. As the LED is to be connected in a forward bias condition across a
power supply it should be Current Limited using a series resistor to protect it from excessive current
flow. From the table above we can see that each LED has its own forward voltage drop across the
PN-junction and this parameter which is determined by the semiconductor material used is the
forward voltage drop for a given amount of forward conduction current, typically for a forward
current of 20mA. In most cases LEDs are operated from a low voltage DC supply, with a series
resistor to limit the forward current to a suitable value from say 5mA for a simple LED indicator to
30mA or more where a high brightness light output is needed.

Department of ECE 39
LED Series Resistance:

The series resistor value RS is calculated by simply using Ohm´s Law, knowing the required
forward current IF, the supply voltage VS and the expected forward voltage drop of the LED, VF at
this current level as shown below:

Department of ECE 40
LED Typical Applications: The following figure shows how to interface the LED to
microcontroller. As you can see the Anode is connected through a resistor to Vcc and the Cathode is
connected to the Microcontroller pin. So, when the Port Pin is HIGH the LED is OFF and when the
Port Pin is LOW the LED is turned ON.

Fig 6.14: LED

6.15 Relay Module


Relay is one kind of electro-mechanical component that functions as a switch. The relay coil
is energized by DC so that contact switches can be opened or closed. A single channel 5V relay
module generally includes a coil, and two contacts like normally open (NO) and normally closed
(NC). This article discusses an overview of the 5V relay module & its working but before going
to discuss what is relay module is, first we have to know what is relay and its pin configuration.
What is a 5V Relay?
A 5v relay is an automatic switch that is commonly used in an automatic control
circuit and to control a high-current using a low-current signal. The input voltage of the
relay signal ranges from 0 to 5V.

5V Relay Pin Configuration

The pin configuration of the 5V relay is shown below. This relay includes 5-pins where each pin
and its functionality are shown below.

Department of ECE 41
Pin1 (End 1): It is used to activate the relay; usually this pin one end is connected to 5Volts whereas
another end is connected to the ground.
Pin2 (End 2): This pin is used to activate the Relay.
Pin3 (Common (COM)): This pin is connected to the main terminal of the Load to make it active.
Pin4 (Normally Closed (NC)): This second terminal of the load is connected to either NC/ NO pins.
If this pin is connected to the load then it will be ON before the switch.
Pin5 (Normally Open (NO)): If the second terminal of the load is allied to the NO pin, then the load
will be turned off before the switch.

Fig 6.15: Relay Module

5Volts 1-Channel Relay Module Components

The components in a 5v relay module with a single channel include a relay, output terminal,
status LED, power LED, freewheeling diode, input connector & switching transistor.

Relay

A 5V relay is coated with blue colour plastic material. For both AC & DC loads, the utmost
operating voltage & current are also displayed on the relay. This relay operates with 5V, so it is
called a 5V relay.

Output Terminal

The output terminal of the relay module is located at the left-hand side, used to fix an AC/DC
load & AC/DC i/p power source. Every o/p connector’s terminal is connected through NC, COM
pins & NO of the relay.

Department of ECE 42
Status LED
Status LED is connected by using a current limiting resistor that is located on the top right side
of the relay module. So, this LED illustrates the relay status by activating the relay & coil through a
signal pin. The DC supplies throughout a relay coil.

Power LED
Power LED shows the condition of the power source that is connected through the single channel
module. If we provide the above 5V source toward both the pins of the module like Vcc & GND, the
LED will be damaged due to high voltage.

Freewheeling Diode

The connection of this diode can be done across the coil to keep away from the back EMF effect,
so-called a flyback diode. The type of coil used in the relay is the inductive type.

CHAPTER 7
SOFTWARE IMPLEMENTATION

7.1 Python

Python is an interpreted, high-level, general-purpose programming language. Created by Guido


van Rossum and first released in 1991, Python's design philosophy emphasizes code readability with
its notable use of significant whitespace. Its language constructs and object-oriented approach aim to
help programmers write clear, logical code for small and large-scale projects.

Python is dynamically typed and garbage-collected. It supports multiple programming


paradigms, including structured (particularly, procedural,) object-oriented, and functional
programming. Python is often described as a "batteries included" language due to its
comprehensive standard library.

Python was conceived in the late 1980s as a successor to the ABC language. Python 2.0, released
in 2000, introduced features like list comprehensions and a garbage collection system capable of

Department of ECE 43
collecting reference cycles. Python 3.0, released in 2008, was a major revision of the language that is
not completely backward-compatible, and much Python 2 code does not run unmodified on Python 3.

The Python 2 language, i.e. Python 2.7.x, was officially discontinued on 1 January 2020 (first
planned for 2015) after which security patches and other improvements will not be released for
it. With Python 2's end-of-life, only Python 3.5.xand later are supported.

Python interpreters are available for many operating systems. A global community of


programmers develops and maintains CPython, an open source reference implementation. A non-
profit organization, the Python Software Foundation, manages and directs resources for Python and
CPython development.

Python is used for:

 web development (server-side),


 software development,
 mathematics, system scripting.

Python do?:

 Python can be used on a server to create web applications.


 Python can be used alongside software to create workflows.
 Python can connect to database systems. It can also read and modify files.
 Python can be used to handle big data and perform complex mathematics.
 Python can be used for rapid prototyping, or for production-ready software development.

Why Python?:

Department of ECE 44
 Python works on different platforms (Windows, Mac, Linux, Raspberry Pi, etc).
 Python has a simple syntax similar to the English language.
 Python has syntax that allows developers to write programs with fewer lines
 Python can be treated in a procedural way, an object-orientated way or a functional way.

Python compared to other programming languages

 Python was designed for readability.


 Python uses new lines to complete a command.
 As opposed to other programming languages which often use semicolons or parentheses.
 Python relies on indentation, using whitespace, to define scope; such as the scope of loops.
 Other programming languages often use curly-brackets for this purpose.

Python installation procedure:

Windows Based

It is highly unlikely that your Windows system shipped with Python already installed. Windows systems
typically do not. Fortunately, installing does not involve much more than downloading the Python installer
from the python.org website and running it. Let’s take a look at how to install Python 3 on Windows:

Step 1: Download the Python 3 Installer

1. Open a browser window and navigate to the Download page for Windows at python.org.


2. Underneath the heading at the top that says Python Releases for Windows, click on the link for
the Latest Python 3 Release - Python 3.x.x. (As of this writing, the latest is Python 3.6.5.)
3. Scroll to the bottom and select either Windows x86-64 executable installer for 64-bit
or Windows x86 executable installer for 32-bit. (See below.)

Department of ECE 45
Sidebar: 32-bit or 64-bit Python?
For Windows, you can choose either the 32-bit or 64-bit installer. Here’s what the difference
between the two comes down to:

 If your system has a 32-bit processor, then you should choose the 32-bit installer.
 On a 64-bit system, either installer will actually work for most purposes. The 32-bit version will
generally use less memory, but the 64-bit version performs better for applications with intensive
computation.
 If you’re unsure which version to pick, go with the 64-bit version.

Note: Remember that if you get this choice “wrong” and would like to switch to another version of
Python, you can just uninstall Python and then re-install it by downloading another installer
from python.org.

Step 2: Run the Installer


Once you have chosen and downloaded an installer, simply run it by double-clicking on the
downloaded file. A dialog should appear that looks something like this:

Department of ECE 46
Important: You want to be sure to check the box that says Add Python 3.x to PATH as shown to
ensure that the interpreter will be placed in your execution path.
Then just click Install Now. That should be all there is to it. A few minutes later you should have a
working Python 3 installation on your system.

CHAPTER 8
FUTURE SCOPE OF THE PROJECT

Department of ECE 47
Patrolling Robots are designed to help women from the dangerous situations. Women can
rescue and protect themselves in any circumstances, so that she will never feel helpless at any sort
locale and can protect herself even at late night. These techniques will also help police to arrest
and search for the culprits.
Since women safety is a matter of concern in many parts of the world, this robot can prove
itself to be a helping assistance. As far as the future scope of this system is concerned and as far as
women’s safety is an issue this robot can be an abetment and a Good Samaritan.

8.1 ADVANTAGES:

1. Used for safety of women


2. Used for the safety of children
3. It reduces theft cases
4. Used for safety of physically challenged people
5. It is low-cost

8.2 APPLICATIONS:
1. Used in Rail-Way Stations
2. Used in Bus-Stations
3. Used in Hazardous/Dangerous roads
4. Used in schools
5. Used in Colleges

CHAPTER 9
RESULT AND DISCUSSION

Department of ECE 48
9.1 Introduction
The Women protection robot project is an embedded system project and thus consists of a
software program embedded on hardware components. Therefore, the results obtained from this
project comprises of the results obtained from connecting the various hardware components and
the software design or program that runs on the hardware.

9.2 Results from Hardware Design

CHAPTER 10
CONCLUSION
Department of ECE 49
Till now women/Girls are suffering /facing so many problems like harassments and mistreats
by some rude people at bus stations, roads ,Schools,Colleges… The system's main objective is to
fast and low cost. This paper will allow women to immediately identify themselves with the
authorities concerned when she is in danger. GPS monitoring, SMS alerting, image capture . The
warning will be sent both manually and automatically to the nearest police booth number and
predefined mail id.

CHAPTER 11
REFERENCES

Department of ECE 50
1. T. Akilan, S. Chaudhary, P. Kumari and U. Pandey, "Surveillance Robot in Hazardous Place Using
IoT Technology," 2020 2nd International Conference on Advances in Computing, Communication
Control and Networking (ICACCCN), 2020, pp. 775-780.
2. Rashmi Mishra and Vandana Khare, "Low-Cost HD Video Surveillance and Recording System
Using Raspberry Pi", International Journal of Recent Technology and Engineering (IJRTE), vol. 7,
no. 6S, pp. 22-25, March 2019.
3. K. Gopalakrishnan, S. Thiruvenkatasamy, E. Prabhakar and R. Aarthi, "Night Vision Patrolling
Rover Navigation System for Women’s Safety Using Machine Learning", International Journal of
Psychosocial Rehabilitation, vol. 23, no. 04, pp. 1136-1148, 2019.
4. J. Ghanem Osman Elhaj Abdalla ‘Implementation of Spy Robot for A Surveillance System using
internet protocol of Raspberry Pi’, published in 2017 International conference on recent trends in
electronic information and communication technology.
5. Vinay Kumar Chowdary Ravipati and Vineela Thonduri, "An IOT Approach for Motion Detection
Using Raspberry PI", International Journal of Innovative Science and Research Technology, vol. 2,
no. 7, pp. 225-228, July 2017.
6. Shoeb Maroof Shaikh, Khan Sufiyan, Asgar Ali, Mir Ibrahim and Kalpana Bodke, "Wireless Video
Surveillance Robot Controlled Using Android Mobile Device", International Journal of Advance
Foundation and Research in Science & Engineering (IJAFRSE), vol. 1, 2015.
7. Takato Saito and Yoji Kuroda: ‘Mobile robot localization using multiple observations based on
place recognition and GPS’, published in IEEE International Conference on Robotics and
Automation Road detection at night based on a planar reflection model in 2013.
8. Ghanem Osman Elhaj Abdalla, T. Veeramanikandaswamy, “Implementation of spy robot for a
surveillance system using Internet protocol of Raspberry pi” Published in 19 may 2017 IEEE
International Conference.
9. G. Anandravisekar, A. Anto Clinton, T. Mukesh Raj, L. Naveen and M. Mahendran, "IOT based
Surveillance Robot" in International Journal of Engineering Research & Technology (IJERT),
Tamilnadu, India:Department of Electronics and Communication Engineering Saranathan College
of Engineering Trichy, 2018.

Department of ECE 51

You might also like