Final Part Ii
Final Part Ii
Final Part Ii
2022-2023
2
2022-2023
CERTIFICATE
EXTERNAL EXAMINER
3
ACKNOWLEDGEMENT
We would like to express our sincere gratitude to our guide Dr.CH. VENUGOPAL
REDDY, M.E, Ph.D. for providing his invaluable guidance, comments, suggestions, and
support throughout the course of the project.
We pay our profound sense of gratitude to our Head of the Department Dr.CH.
VENUGOPAL REDDY, M.E, Ph.D. for providing an excellent environment in our college
and helping us at all points for achieving our task.
We pay our profound sense of gratitude to our Principial Prof. Dr. A. V. BHASKARA
RAO for providing an excellent environment in our college and helping us at all points for
achieving our task.
We express our sincere thanks to the Management of RISE Krishna Sai Prakasam Group
of Institutions, Valluru for providing a good environment and infrastructure.
Finally, we thank all our faculty members, supporting staff of ECE Department and friends
for their kind co-operation and valuable help for the completion of the project.
Project Associates
2022-2023
Program Outcomes(POs):
PO2 Problem Analysis: Identify, formulate, review research literature, and analyze complex
engineering problems reaching substantiated conclusions using first principles of
mathematics, natural sciences, and engineering sciences
PO6 The Engineer and Society: Apply reasoning informed by the contextual
knowledge to assess societal, health, safety, legal and cultural issues and the
consequent responsibilities relevant to the Professional engineering practice.
PO8 Ethics: Apply ethical principles and commit to professional ethics and
responsibilities and norms of the engineering practice
PO9 Individual and Team Work: Function effectively as an individual, and as a
member or leader in diverse teams, and in multidisciplinary settings
PO12 Life-long Learning: Recognize the need for, and have the preparation and ability
to engage in independent and life-long learning in the broadest context of
technological change.
Program Specific Outcomes (PSO’s):
A student of the Electronics and Communication Engineering Program will be able to
Name of the Course : Project Part-1 Year & Semester : IV ECE & I
Write Technical / Project reports and oral presentation of the work done to an
C416.5 audience. Demonstrate a product developed.
RISE KRISHNA SAI PRAKASAM GROUP OF
INSTITUTIONS: ONGOLE
(Approved by AICTE-NEW DELHI, Affiliated to JNTUK KAKINADA)
(An ISO 9001:2015 certified Institute, NBA accredited for B.Tech. in ECE, EEE, CE, ME and CSE)
Accredited By NAAC with “A” Grade
NH-16, Valluru, -523272, Ongole, Prakasam District, A.P
2022-2023
ENGINEERING
CO Vs PO Mapping
Course
Outcomes PO PO PO PO PO PO PO PO PO PO PO PO
(COs) 1 2 3 4 5 6 7 8 9 10 11 12
2 2 3 2 3 3 3 2 3 3 3 3
C416.1
C416.2 2 2 3 2 3 2 2 2 3 3 3 3
C416.3 2 2 3 2 3 3 2 3 3 3 3 3
C416.4 3 2 3 2 3 2 3 3 3 3 3 3
C416.5 2 2 3 2 3 2 2 3 3 3 3 3
C416.6 2.20 2.00 3.00 2.00 3.00 2.40 2.40 2.60 3.00 3.00 3.00 3.00
CO VS PSO Mapping
PAGE.NO
1. ABSTRACT
2. INTRODUCTION
2.1 Background 1
2.2 Problem Definition 1
2.3 Project Objectives 2
2.4 Research Methodology 2
2.5 Facilities used for the Research 2
4. PROPOSED SYSTEM 12
5. BLOCK DIAGRAM
5.1 Raspberry PI & Pin Configuration 13-14
5.2 Sound Sensor 15
5.3 IR Sensor 15
5.4 Night Vision Camera 16
5.5 Motor Driver 16
9. REFERENCES 21
LIST OF FIGURES
Fig: 3.4.1 8 Block diagram of A Raspberry Pi Based Smart Ring For Women
Raspberry PI
ABSTRACT
Women's safety has become a major concern in all parts of the world as a result of
growing violence against them. They have become common to being physically or mentally
mistreated. Harassment at work and in public places is causing individuals to leave their
passions and goals. Although the government has passed various anti-harassment laws but,
the rate of female harassment has not decreased. Existing systems use CCTV cameras to
record incidents, but this is not a preventative strategy for women's protection, whereas the
suggested patrolling robot will patrol in its assigned area and check for anonymous
behaviours. As a result, the women's community will benefit more from the night patrolling
robot.
Department of ECE
CHAPTER 1
INTRODUCTION
1.1 Background
Robotics is the study of the Design, Development, Function, and Application of Robots. Robots
eliminate dangerous jobs for human because they are capable of working in hazardous
environments and manufacturing processes. Since the world faces serious issues regarding
women’s protection it is necessary to constitute our work towards it. Even in the 21st century
where technology is rapidly growing and new gadgets are being developed but still women and
girls are facing problems. To reduce those problems, we implementing a women
protection/safety patrolling robot using raspberry pi. The Women Safety Patrolling robot is an
attempt to make use of the robots for enhancing Women’s safety. It will be a great step towards
the rise of automation and Safety. Women safety patrolling robot makes the best use of its
features to work without any problem. It is primarily due to fear of violence against them or
being physically or sexually abused. Women’s robot patrolling system is the best way to reduce
the probability of becoming a victim of violent crime is to recognize, defend and look up
resources to help you in hazardous/dangerous situations.
Department of ECE 1
1.3 Project Objective
The objectives of this project include the following:
1. We are focusing on building an effective, fast and reliant system to make the women of
India feel safe and empowered.
2. Our platform will act as a 24/7 active help and associate for women so that they don’t ever
feel that they are alone in the middle or dangerous situation.
3. It will unite and enable the citizens of India and the police to work towards a common
problem.
4. This tool will act as eyes and ears for the police and help them in preventing crimes against
women.
Department of ECE 2
CHAPTER 2
INTRODUCTION TO EMBEDDED SYSTEMS
1.1Embedded Systems
EMBEDDED
SYSTEMS
SOFTWARE HARDWARE
ALP PROCESSORS
C PERIPHERALS
VB MEMORY
Department of ECE 3
All embedded systems are including computers or microprocessors. Some of these computers
are however very simple systems as compared with a personal computer.
The very simplest embedded systems are capable of performing only a single function or set of
functions to meet a single predetermined purpose. In more complex systems an application program
that enables the embedded system to be used for a particular purpose in a specific application
determines the functioning of the embedded system. The ability to have programs means that the
same embedded system can be used for a variety of different purposes. In some cases a
microprocessor may be designed in such a way that application software for a particular purpose can
be added to the basic software in a second process, after which it is not possible to make further
changes. The applications software on such processors is sometimes referred to as firmware.
The simplest devices consist of a single microprocessor (often called a "chip”), which may
itself be packaged with other chips in a hybrid system or Application Specific Integrated Circuit
(ASIC). Its input comes from a detector or sensor and its output goes to a switch or activator which
(for example) may start or stop the operation of a machine or, by operating a valve, may control the
flow of fuel to an engine. As the embedded system is the combination of both software and hardware.
Software deals with the languages like ALP, C, and VB etc., and Hardware deals with
Processors, Peripherals, and Memory.
Department of ECE 4
1.2Types of Embedded Systems
Embedded systems can be classified into different types based on performance, functional
requirements and performance of the microcontroller.
Embedded systems are classified into four categories based on their performance and
functional requirements:
Standalone embedded systems
Real time embedded systems
Networked embedded systems
Mobile embedded systems
Small scale embedded systems
Medium scale embedded systems
Sophisticated embedded systems
Department of ECE 5
1.2.1 Stand Alone Embedded Systems
Stand Alone embedded systems do not require a host system like a computer, it works by itself.
It takes the input from the input ports either analog or digital and processes, calculates and converts
the data and gives the resulting data through the connected device-Which either controls or drives
and displays the connected devices.
Examples for the standalone embedded systems are mp3 players, digital cameras, videogame
consoles, microwave ovens and temperature measurement systems.
Department of ECE 6
1.2.6 Medium Scale Embedded Systems
These types of embedded systems design with a single or 16- or 32-bit microcontroller,
RISCs or DSPs. These types of embedded systems have both hardware and software complexities.
For developing embedded software for medium scale embedded systems, the main programming
tools are C, C++, and JAVA, Visual C++, and RTOS, debugger, source code engineering tool,
simulator and IDE.
Department of ECE 7
Fig 1.3: Embedded System Architecture
The Central Processing Unit (processor, in short) can be any of the following:
microcontroller, microprocessor or Digital Signal Processing (DSP). A micro-controller is a
low-cost processor. Its main attraction is that on the chip itself, there will be many other
components such as memory, serial communication interface, analog-to-digital converter etc. So,
for small applications, a micro-controller is the best choice as the number of external components
required will be very less. On the other hand, microprocessors are more powerful, but you need
to use many external components with them. DSP is used mainly for applications in which
signaling is involved such as audio and video processing.
1.3.2 Memory
The memory is categorized as Random Access Memory (RAM) and Read Only Memory (ROM).
The content of the RAM will be erased if power is switch off to the chip, where ROM retains the
contents even if the power is switched off. So, the firmware is stored in the ROM. When power is
switched on, the processer reads the ROM. The basic limitation of these devices is the other
resources and limitation of memory.
The program is executed. On the other hand, microprocessors are more powerful, but you
need to use many external components with them. DSP is used mainly for applications in which
signaling is involved such as audio and video processing. authentication and verification are
embedded systems. Encryption devices are nearly 99 percent of the processors that are manufactured
end up in embedded systems.
Department of ECE 8
1.3.4 Output Devices
The output devices of the embedded systems also have very limited capability. Some
embedded systems will have a few Light Emitting Diodes (LEDs) to indicate the health status
of the system modules, or for visual indication of alarms. A small Liquid Crystal Display
(LCD) may also be used to display some important parameters.
1.4 Memory Architecture
Computers have separate memory areas for program instructions and data. There are two or
more internal data buses, which allow simultaneous access to both instructions and data. The CPU
fetches program instructions on the program memory bus.
The Harvard architecture is a computer architecture with physically separate storage and signal
pathways for instructions and data. The term originated from the Harvard Mark I relay-based
computer, which stored instructions on punched tape (24 bits wide) and data in electro-mechanical
counters. These early machines had limited data storage, entirely contained within the central
processing unit, and provided no access to the instruction storage as data. Programs needed to be
loaded by an operator, the processor could not boot itself.
Department of ECE 9
Fig 1.4.1: Harvard Architecture
Digital signal processors (DSPs) generally execute small, highly-optimized audio or video
processing algorithms. They avoid caches because their behavior must be extremely reproducible. The
difficulties of coping with multiple address spaces are of secondary concern to speed of execution.
As a result, some DSPs have multiple data memories in distinct address spaces to facilitate SIMD and
VLIW processing. Texas Instruments TMS320 C55x processors, as one example, have multiple
parallel data busses (two write, three read) and one instruction bus.
Microcontrollers are characterized by having small amounts of program (flash
memory) and data (SRAM) memory, with no cache, and take advantage of the Harvard
architecture to speed processing by concurrent instruction and data access. The separate
storage means the program and data memories can have different bit depths, for example
using 16-bit wide instructions and 8-bit wide data. They also mean that instruction pre-fetch
can be performed in parallel with other activities.
Examples include, the AVR by Atmel Corp, the PIC by Microchip Technology, Inc and
the ARM Cortex-M3 processor (not all ARM chips have Harvard architecture).
Even in these cases, it is common to have special instructions to access program memory as
data for read-only tables, or for reprogramming.
Department of ECE 10
CHAPTER 3
LITERATURE SURVEY
3.1 WOMEN SAFETY NIGHT PATROLLING ROBOT
AUTHORS: Dr.M. Sivachitra, T. NaveenRaj, V.G. Rekhasri, N. Sowmiyaa.
ABSTRACT: In these days’ women safety is the biggest issue in all parts of the world due to increased
violence against them. Getting physically or mentally abused has become a part of their daily life.
Workplace harassment and public place harassment are forcing them to quit their passion and dreams.
Even though the government has enacted several laws against women harassment, threat of women
harassment has not reduced. There are only few preventive measurements to reduce the probability of
women harassment. The best way to reduce the violence (robbery, sexual assault, domestic violence,
etc) against them is being amoral support. So, the night Patrolling Robot will be attempting to ensure
women safety.
The suggested patrolling robot will patrol in its assigned area and check for anonymous behaviors’.
As a result, the women's community will benefit more from the night patrolling robot.
Department of ECE 11
Technologies: IoT
Hardware:
Arduino Uno
Motors
L293D Drivers
ABSTRACT: At present the surveillance of international border areas is a difficult task. The border
guarding forces are patrolling the border seriously, but it is not possible to watch the border at each
and every moment. An essential requirement of this situation is a robot which automatically detects
trespasser in the border and report nearby board security control unit. Many of the military
departments now utilize the robots to carry out risky jobs that cannot be done by the soldiers. The spy
robot system comprises the Raspberry Pi (small single-board computer), night vision pi camera and
sensors. The information regarding the detection of living objects by PIR sensor is sent to the users
through the web server and pi camera capture the moving object which is posted inside the webpage
simultaneously. The user in control room able to access the robot with wheel drive control buttons on
the webpage. The movement of a robot is also controlled automatically through obstacle detecting
sensors to avoiding the collision. This surveillance system using spy robot can be customized for
various fields like industries, banks and shopping malls.
Department of ECE 12
3.2.1 Proposed System:
Hardware:
Raspberry PI
Vision Sensor
Motor Driver
Obstacle Sensor
Technologies: IoT, AI
Advantages: It capture the images by using pi camera and here used night vision cameras
Disadvantage: The main disadvantage is the robot will control by user and sends to predefine mail
id.
Department of ECE 13
3.3 Night Patrolling Robot
AUTHORS: Farabee Khalid, Itmamul Haque Albab, Dipto Roy, Azad Prince Asif, Kawshik Shikder
ABSTRACT: Security is a necessity of every human being. With an increase in population the
demand of security has increased. But due to lack of proper resources proper security cannot be
arranged. To achieve proper security, it requires a heavy payment, which not all can afford. The aim
of the research was to provide a solution to the problem by designing a smart robot that can provide
quality security with a fraction of price, when considering long term effects. The idea was to design
and implement a rover, that takes the advantage of modern technology allowing it to roam
autonomously without the assistance of humans, scouring the area and alerting the control room
once any abnormality has been detected. The robot has built in GPS navigation for figuring out the
routes of its workplace. The robot is also equipped with a smart camera that allows for capturing of
live video and images of the intruder when the time comes.
Department of ECE 14
Fig 3.3.1 Block Diagram of Proposed system
Hardware:
Raspberry PI
Motor Driver
Motor
GSM
Advantage: The robot has the advantage of using a smart camera, having the functionality of human
detection, tracking and night vision, which can be controlled wirelessly via an app, making it easy to
use and monitor.
Disadvantage: The main disadvantage is it is a human controlled robot by using app
Department of ECE 15
3.4.1 Proposed System:
Hardware:
Raspberry PI
Buzzer
Camera
Technologies: IoT
Advantages:
Criminal Identification
A boon to senior citizens and people suffering from medical issues
Department of ECE 16
3.5 A RASPBERRY PI-BASED SAFETY SYSTEM FOR WOMEN
SECURITY USING IOT
AUTHORS: Bhuvaneshwari Mehtre
ABSTRACT: Every day, each girl, women, and those from different backgrounds of life struggle
to be secure and rescue themselves from the quite disrespectful guy’s roving eye that abuses girl’s
dignity each day. Its miles implemented within the form of a cleaver IoT tool and include
Raspberry Pi, Heartbeat sensor, temperature sensor, GPS, Panic button, and camera. This device
is extremely compact and may be triggered utilizing the sufferer just through clicking a button
and additionally use to study human temperature and heart rate exceeds above the edge cost it
without delay ship her cutting-edge location, and seize the attacker's photograph, through the
raspberry pi camera. The location and connection of the captured picture and SMS can be sent to
the selected contact numbers or police. We additionally use voice factor when the lady is not in
that situation to press button, she uses to mention help then a message will be dispatched to the
emergency contact numbers.
Technologies: IoT
Advantage: The raspberry pi is integrated with a temperature sensor, heart Beat sensor, GPS,
camera module. When a woman is in danger the alert will send automatically, manually to the
concerned authorities SMS alert will send to the concerned authorities.
Disadvantage: Carrying the all the sensors and boards with us is very difficult.
Department of ECE 18
3.6.1 Proposed System:
Hardware:
Buttons
16x2 Display
Advantage: Device that sends SMS and area directions of the client to the relatives of the client or
helpline number. In this system, we have used a GPS module to access location of user instantly.
Disadvantage: The main disadvantage is whenver we push the button across three buttons
that time only this system will work.
Department of ECE 19
CHAPTER 4
PROPOSED SYSTEM
The idea behind this is to provide security to women. Any abnormal activity and small interaction of
sound results in the alert of the concerned authority. The Women Protection Patrolling robot is an
attempt to make use of the robots for enhancing Women’s safety. It will be a great step towards the
rise of automation and Safety. Women Protection Patrolling robot makes the best use of its features
to work without any problem. It is primarily due to fear of violence against them or being physically
or sexually abused. Women’s robot patrolling system is the best way to reduce the probability of
becoming a victim of violent crime is to recognize, defend and look up resources to help you in
hazardous/dangerous situations. Then robot automatically goes to the particular area and captures the
image of that area and sends it to the user predefined mail id.
Department of ECE 20
Fig 4:- Representation of Proposed System
CHAPTER 5
BLOCK DIAGRAM
Department of ECE 21
CHAPTER 6
HARDWARE IMPLEMENTATION
6.1 Raspberry PI
The Raspberry Pi is a low cost, credit-card sized computer that plugs into a computer monitor
or TV, and uses a standard keyboard and mouse. It is a capable little device that enables people of all
ages to explore computing, and to learn how to program in languages like Scratch and Python. It’s
capable of doing everything you’d expect a desktop computer to do, from browsing the internet and
playing high-definition video, to making spreadsheets, word-processing, and playing games.
The Raspberry Pi is a remarkable device: a fully functional computer in a tiny and low-cost
package. Whether you’re looking for a device you can use to browse the web or play games, are
interested in learning how to write your own programs, or are looking to create your own circuits and
physical devices, the Raspberry Pi – and its amazing community – will support you every step of the
way. The Raspberry Pi is known as a single-board computer, which means exactly what it sounds
like: it’s a computer, just like a desktop, laptop, or smart phone, but built on a single printed circuit
board. Like most single-board computers, the Raspberry Pi is small – roughly the same footprint as a
credit card – but that doesn’t mean it’s not powerful: a Raspberry Pi can do anything a bigger and
more power-hungry computer can do, though not necessarily as quickly.
The Raspberry Pi family was born from a desire to encourage more hands-on computer
education around the world. Its creators, who joined together to form the non-profit Raspberry Pi
Foundation, had little idea that it would prove so popular: the few thousand built in 2012 to test the
waters were immediately sold out, and millions have been shipped all over the world in the years
since. These boards have found their ways into homes, classrooms, offices, data centers, factories,
and even self-piloting boats and space faring balloons. Various models of Raspberry Pi have been
released since the original Model B, each bringing either improved specifications or features specific
to a particular use-case. The Raspberry Pi Zero family, for example, is a tiny version of the full-size
Department of ECE 22
Raspberry Pi which drops a few features – in particular the multiple USB ports and wired network
port – in favour of a significantly smaller layout and lowered power needs.
The name system-on-chip is a great indicator of what you would find if you prised the metal
cover off: a silicon chip, known as an integrated circuit, which contains the bulk of the Raspberry
Pi’s system. This includes the central processing unit (CPU), commonly thought of as the ‘brain’ of a
computer, and the graphics processing unit (GPU), which handles the visual side of things. A brain is
no good without memory, however, and on the underside of the Raspberry Pi you’ll find exactly that:
another chip, which looks like a small, black, plastic square (Figure 1-3). This is the Pi’s random-
access memory (RAM). When you’re working on the Pi, it’s the RAM that holds what you’re doing;
only when you save your work will it be written to the microSD card. Together, these components
form the Pi’s volatile and non-volatile memories: the volatile RAM loses its contents whenever the Pi
is powered off, while the non-volatile microSD card keeps its contents.
Department of ECE 23
6.1.1 Raspberry PI Pin Diagram
Department of ECE 24
This sensor is capable to determine noise levels within DB’s or decibels at 3 kHz 6 kHz
frequencies approximately wherever the human ear is sensitive. In smartphones, there is an android
application namely decibel meter used to measure the sound level.
6.3 IR Sensor
IR sensor is an electronic device, that emits the light in order to sense some object of the
surroundings. An IR sensor can measure the heat of an object as well as detects the motion.
Usually, in the infrared spectrum, all the objects radiate some form of thermal radiation.
Department of ECE 25
Fig 6.3.1: IR Sensor Working
Department of ECE 26
How to Enable Camera functionality on Raspberry Pi?
For enabling camera in Raspberry Pi, open raspberry pi configuration using following command,
sudo raspi-config and then select Interfacing options in which select camera option to enableits
functionality.reboot Raspberry Pi. Now we can access camera on Raspberry Pi.
Now we can capture images and videos using Pi Camera on Raspberry Pi.
Example
Capture images and save it to the specified directory.
We can capture images using Python. Here, we will write a Python program to capture images using
Pi Camera on Raspberry Pi.
Here, we have used picamera package(library) which provides different classes for Raspberry Pi. Out
of which we are mainly interested in PiCamera class which is for camera module.
Department of ECE 27
Python Program for Image Capture
#create object for PiCamera class
camera = picamera.PiCamera()
#set resolution
camera.resolution = (1024, 768)
camera.brightness = 60
camera.start_preview()
#add text on image
camera.annotate_text = 'Hi Pi User'
sleep(5)
#store image
camera.capture('image1.jpeg')
camera.stop_preview()
The L298N is a quad, high current, half-H driver designed to provide bidirectional drive
currents of up to 600mA at voltages from 4.5V to 36V. It makes it easier to drive the DC motors. The
L298N consists of four drivers. Pins IN1 through IN4 and OUT1 through OUT4 are input and output
pins, respectively, of driver 1 through driver 4. Drivers 1 and 2, and drivers 3 and 4 are enabled by
enable pin 1 (EN1) and pin 9 (EN2), respectively. When enable input EN1 (Pin1) is high, drivers 1
and 2 are enabled and the outputs corresponding to their inputs are active. Similarly, enable input
EN2 (Pin9) enables drivers 3 and 4.
Department of ECE 28
Features
Department of ECE 29
6.6 T- Cobbler
This is the assembled version of the Pi T-Cobbler Plus. It only works with the Raspberry Pi
Model Zero, A+, B+, Pi 2, Pi 3 & Pi 4! (Any Pi with 2x20 connector).
How do connect the T-cobbler to the Pi?
We can plug the 40-pin GPIO cable between the Pi computer and the T-Cobbler breakout.
The T-Cobbler can plug into any solderless breadboard (or even a prototyping board like the
PermaProto).
Department of ECE 30
Cable UL2651 28AWG or custom
7/0.12MM (Other
Copper wire Conductor general 7/0.08MM, 7/0.09MM, 7/0.1MM, 7/0.16MM,
7/0.2MM 7 of 7-strand copper wire)
Department of ECE 31
Fig 6.7: Rainbow Ribbion Cable
Department of ECE 32
6.9 Wheels
A circular frame of hard material that may be solid, partly solid, or spoked and that is capable of
turning on an axle.
6.10 Buzzer
Piezo Electric buzzers are Solid state devices that produce an Audible signal when powered.
They are basically made up of piezo crystal.
The fundamental property of Piezo crystal states that when a voltage is applied to the crystal in a
particular plane. It enters into oscillations.
A simple oscillator circuit is used to make these signals audible.
Piezo electric buzzers operate right from 3V up to 24V DC. Similar to the LED drive, a transistor
driver is used for driving the load. The other advantage with this scheme is that the drive voltage can
be much higher than the operating voltage of the microcontroller.
A protection diode is included in all inductive load circuits to prevent the back emf from damaging
the driving transistor & subsequently the microcontroller.
Department of ECE 33
Fig 6.10: Buzzer
Department of ECE 34
Fig 6.11.1: Male to Male Jumper Wires
Department of ECE 35
Fig 6.11.3: Female to Female Jumper Wire
6.12 Batteries
Batteries come in many shapes and sizes, from miniature cells used to power hearing aids and
wristwatches to, at the largest extreme, huge battery banks the size of rooms that provide standby or
emergency power for telephone exchanges and computer data centers.
Department of ECE 36
Batteries have much lower specific energy (energy per unit mass) than common fuels such as
gasoline. In automobiles, this is somewhat offset by the higher efficiency of electric motors in
converting electrical energy to mechanical work, compared to combustion engines.
Department of ECE 37
Light Emitting Diodes or LEDs, are among the most widely used of all the types of diodes
available. They are the most visible type of diode that emits a fairly narrow bandwidth of either
visible colored light, invisible infra-red or laser type light when a forward current is passed through
them. A "Light Emitting Diode" or LED as it is more commonly called, is basically just a specialized
type of PN-junction diode, made from a very thin layer of fairly heavily doped semiconductor
material. When the diode is Forward Biased, electrons from the semiconductor’s conduction band
combine with holes from the valence band, releasing sufficient energy to produce photons of light.
Because of this thin layer a reasonable number of these photons can leave the junction and radiate
away producing a colored light output.
Unlike normal diodes which are made for detection or power rectification, and which are
generally made from either Germanium or Silicon semiconductor material, Light Emitting Diodes are
made from compound type semiconductor materials such as Gallium Arsenide (GaAs), Gallium
Phosphide (Gap), Gallium Arsenide Phosphide (Gasp), Silicon Carbide (Sic) or Gallium Indium
Nitride (Gain). The exact choice of the semiconductor material used will determine the overall
wavelength of the photon light emissions and therefore the resulting color of the light emitted, as in
the case of the visible light-colored LEDs, (RED, AMBER, GREEN etc).
Department of ECE 38
SiC 430-505nm Blue 3.6v
GainN 450nm White 4.0v
From the table above we can see that the main P-type dopant used in the manufacture of Light
Emitting Diodes is Gallium (Ga, atomic number 31) and the main N-type dopant used is Arsenic (As,
atomic number 31) giving the resulting Gallium Arsenide (GaAs) crystal structure, which has the
characteristics of radiating significant amounts of infrared radiation from its junction when a forward
current is flowing through it. By also adding Phosphorus (P, atomic number 15), as a third dopant the
overall wavelength of the emitted radiation is reduced to give visible red light to the human eye.
Further refinements in the doping process of the PN-junction have resulted in a range of
colors available from red, orange and amber through to yellow, and the recently developed blue LED
which is achieved by injecting nitrogen atoms into the crystal structure during the doping process
Before a light emitting diode can "emit" any form of light it needs a current to flow through it,
as it is a current dependent device. As the LED is to be connected in a forward bias condition across a
power supply it should be Current Limited using a series resistor to protect it from excessive current
flow. From the table above we can see that each LED has its own forward voltage drop across the
PN-junction and this parameter which is determined by the semiconductor material used is the
forward voltage drop for a given amount of forward conduction current, typically for a forward
current of 20mA. In most cases LEDs are operated from a low voltage DC supply, with a series
resistor to limit the forward current to a suitable value from say 5mA for a simple LED indicator to
30mA or more where a high brightness light output is needed.
Department of ECE 39
LED Series Resistance:
The series resistor value RS is calculated by simply using Ohm´s Law, knowing the required
forward current IF, the supply voltage VS and the expected forward voltage drop of the LED, VF at
this current level as shown below:
Department of ECE 40
LED Typical Applications: The following figure shows how to interface the LED to
microcontroller. As you can see the Anode is connected through a resistor to Vcc and the Cathode is
connected to the Microcontroller pin. So, when the Port Pin is HIGH the LED is OFF and when the
Port Pin is LOW the LED is turned ON.
The pin configuration of the 5V relay is shown below. This relay includes 5-pins where each pin
and its functionality are shown below.
Department of ECE 41
Pin1 (End 1): It is used to activate the relay; usually this pin one end is connected to 5Volts whereas
another end is connected to the ground.
Pin2 (End 2): This pin is used to activate the Relay.
Pin3 (Common (COM)): This pin is connected to the main terminal of the Load to make it active.
Pin4 (Normally Closed (NC)): This second terminal of the load is connected to either NC/ NO pins.
If this pin is connected to the load then it will be ON before the switch.
Pin5 (Normally Open (NO)): If the second terminal of the load is allied to the NO pin, then the load
will be turned off before the switch.
The components in a 5v relay module with a single channel include a relay, output terminal,
status LED, power LED, freewheeling diode, input connector & switching transistor.
Relay
A 5V relay is coated with blue colour plastic material. For both AC & DC loads, the utmost
operating voltage & current are also displayed on the relay. This relay operates with 5V, so it is
called a 5V relay.
Output Terminal
The output terminal of the relay module is located at the left-hand side, used to fix an AC/DC
load & AC/DC i/p power source. Every o/p connector’s terminal is connected through NC, COM
pins & NO of the relay.
Department of ECE 42
Status LED
Status LED is connected by using a current limiting resistor that is located on the top right side
of the relay module. So, this LED illustrates the relay status by activating the relay & coil through a
signal pin. The DC supplies throughout a relay coil.
Power LED
Power LED shows the condition of the power source that is connected through the single channel
module. If we provide the above 5V source toward both the pins of the module like Vcc & GND, the
LED will be damaged due to high voltage.
Freewheeling Diode
The connection of this diode can be done across the coil to keep away from the back EMF effect,
so-called a flyback diode. The type of coil used in the relay is the inductive type.
CHAPTER 7
SOFTWARE IMPLEMENTATION
7.1 Python
Python was conceived in the late 1980s as a successor to the ABC language. Python 2.0, released
in 2000, introduced features like list comprehensions and a garbage collection system capable of
Department of ECE 43
collecting reference cycles. Python 3.0, released in 2008, was a major revision of the language that is
not completely backward-compatible, and much Python 2 code does not run unmodified on Python 3.
The Python 2 language, i.e. Python 2.7.x, was officially discontinued on 1 January 2020 (first
planned for 2015) after which security patches and other improvements will not be released for
it. With Python 2's end-of-life, only Python 3.5.xand later are supported.
Python do?:
Why Python?:
Department of ECE 44
Python works on different platforms (Windows, Mac, Linux, Raspberry Pi, etc).
Python has a simple syntax similar to the English language.
Python has syntax that allows developers to write programs with fewer lines
Python can be treated in a procedural way, an object-orientated way or a functional way.
Windows Based
It is highly unlikely that your Windows system shipped with Python already installed. Windows systems
typically do not. Fortunately, installing does not involve much more than downloading the Python installer
from the python.org website and running it. Let’s take a look at how to install Python 3 on Windows:
Department of ECE 45
Sidebar: 32-bit or 64-bit Python?
For Windows, you can choose either the 32-bit or 64-bit installer. Here’s what the difference
between the two comes down to:
If your system has a 32-bit processor, then you should choose the 32-bit installer.
On a 64-bit system, either installer will actually work for most purposes. The 32-bit version will
generally use less memory, but the 64-bit version performs better for applications with intensive
computation.
If you’re unsure which version to pick, go with the 64-bit version.
Note: Remember that if you get this choice “wrong” and would like to switch to another version of
Python, you can just uninstall Python and then re-install it by downloading another installer
from python.org.
Department of ECE 46
Important: You want to be sure to check the box that says Add Python 3.x to PATH as shown to
ensure that the interpreter will be placed in your execution path.
Then just click Install Now. That should be all there is to it. A few minutes later you should have a
working Python 3 installation on your system.
CHAPTER 8
FUTURE SCOPE OF THE PROJECT
Department of ECE 47
Patrolling Robots are designed to help women from the dangerous situations. Women can
rescue and protect themselves in any circumstances, so that she will never feel helpless at any sort
locale and can protect herself even at late night. These techniques will also help police to arrest
and search for the culprits.
Since women safety is a matter of concern in many parts of the world, this robot can prove
itself to be a helping assistance. As far as the future scope of this system is concerned and as far as
women’s safety is an issue this robot can be an abetment and a Good Samaritan.
8.1 ADVANTAGES:
8.2 APPLICATIONS:
1. Used in Rail-Way Stations
2. Used in Bus-Stations
3. Used in Hazardous/Dangerous roads
4. Used in schools
5. Used in Colleges
CHAPTER 9
RESULT AND DISCUSSION
Department of ECE 48
9.1 Introduction
The Women protection robot project is an embedded system project and thus consists of a
software program embedded on hardware components. Therefore, the results obtained from this
project comprises of the results obtained from connecting the various hardware components and
the software design or program that runs on the hardware.
CHAPTER 10
CONCLUSION
Department of ECE 49
Till now women/Girls are suffering /facing so many problems like harassments and mistreats
by some rude people at bus stations, roads ,Schools,Colleges… The system's main objective is to
fast and low cost. This paper will allow women to immediately identify themselves with the
authorities concerned when she is in danger. GPS monitoring, SMS alerting, image capture . The
warning will be sent both manually and automatically to the nearest police booth number and
predefined mail id.
CHAPTER 11
REFERENCES
Department of ECE 50
1. T. Akilan, S. Chaudhary, P. Kumari and U. Pandey, "Surveillance Robot in Hazardous Place Using
IoT Technology," 2020 2nd International Conference on Advances in Computing, Communication
Control and Networking (ICACCCN), 2020, pp. 775-780.
2. Rashmi Mishra and Vandana Khare, "Low-Cost HD Video Surveillance and Recording System
Using Raspberry Pi", International Journal of Recent Technology and Engineering (IJRTE), vol. 7,
no. 6S, pp. 22-25, March 2019.
3. K. Gopalakrishnan, S. Thiruvenkatasamy, E. Prabhakar and R. Aarthi, "Night Vision Patrolling
Rover Navigation System for Women’s Safety Using Machine Learning", International Journal of
Psychosocial Rehabilitation, vol. 23, no. 04, pp. 1136-1148, 2019.
4. J. Ghanem Osman Elhaj Abdalla ‘Implementation of Spy Robot for A Surveillance System using
internet protocol of Raspberry Pi’, published in 2017 International conference on recent trends in
electronic information and communication technology.
5. Vinay Kumar Chowdary Ravipati and Vineela Thonduri, "An IOT Approach for Motion Detection
Using Raspberry PI", International Journal of Innovative Science and Research Technology, vol. 2,
no. 7, pp. 225-228, July 2017.
6. Shoeb Maroof Shaikh, Khan Sufiyan, Asgar Ali, Mir Ibrahim and Kalpana Bodke, "Wireless Video
Surveillance Robot Controlled Using Android Mobile Device", International Journal of Advance
Foundation and Research in Science & Engineering (IJAFRSE), vol. 1, 2015.
7. Takato Saito and Yoji Kuroda: ‘Mobile robot localization using multiple observations based on
place recognition and GPS’, published in IEEE International Conference on Robotics and
Automation Road detection at night based on a planar reflection model in 2013.
8. Ghanem Osman Elhaj Abdalla, T. Veeramanikandaswamy, “Implementation of spy robot for a
surveillance system using Internet protocol of Raspberry pi” Published in 19 may 2017 IEEE
International Conference.
9. G. Anandravisekar, A. Anto Clinton, T. Mukesh Raj, L. Naveen and M. Mahendran, "IOT based
Surveillance Robot" in International Journal of Engineering Research & Technology (IJERT),
Tamilnadu, India:Department of Electronics and Communication Engineering Saranathan College
of Engineering Trichy, 2018.
Department of ECE 51