Академический Документы
Профессиональный Документы
Культура Документы
CHAPTER-1
INTRODUCTION
INTRODUCTION TO PROJECT:
In this project Live Human Detection and Alerting System it will detect the humans
using PIR sensor and sends the signal from the transmitter side to the receiver side and
notifies it to the user by sending a gsm to their mobile. Human Detection system can detect
the presence of human; it sends the signal from the transmitter side to the receiver side and
notifies it to the user by continuous buzz. A unique passive Infrared sensor is used in our
design that emits infrared rays to detect humans. As a human body emits thermal radiation.
Will be received and manipulated by the PIR (Passive infrared sensor). Once a human
target is located manipulated by the PIR once a human target is located the system has to be
give and alert which may be held to localized the victim location as soon as possible.
After sensing through PIR sensor it notifies by sending an SMS through a GSM to the
intended user’s mobile through GSM or it sends an alert through the thingspeak cloud.
Embedded systems are self-contained programs that are embedded within a piece of
hardware. Whereas a regular computer has many different applications and software that
can be applied to various tasks, embedded systems are usually set to a specific task that
cannot be altered without physically manipulating the circuitry. Another way to think of an
embedded system is as a computer system that is created with optimal efficiency, thereby
allowing it to complete specific functions as quickly as possible.
Embedded systems technologies are usually fairly expensive due to the necessary
development time and built in efficiencies, but they are also highly valued in specific
industries. Smaller businesses may wish to hire a consultant to determine what sort of
embedded systems will add value to your organization.
software for a particular purpose can be added to the basic software in a second process,
after which it is not possible to make further changes. The applications software on such
processors is sometimes referred to as firmware.
Software deals with the languages like ALP, C, and VB etc., and Hardware deals with
Processors, Peripherals, and Memory.
In both cases, the higher the value, the more powerful the CPU. For example, a 32-
bit microprocessor that runs at 50MHz is more powerful than a 16-bit microprocessor that
runs at 25MHz. In addition to bandwidth and clock speed, microprocessors are classified as
being either RISC (reduced instruction set computer) or CISC (complex instruction set
computer).
A microprocessor has three basic elements, as shown above. The ALU performs all
arithmetic computations, such as addition, subtraction and logic operations (AND, OR, etc).
It is controlled by the Control Unit and receives its data from the Register Array. The
Register Array is a set of registers used for storing data. These registers can be accessed by
the ALU very quickly. Some registers have specific functions - we will deal with these
later. The Control Unit controls the entire process. It provides the timing and a control
signal for getting data into and out of the registers and the ALU and it synchronizes the
execution of instructions (we will deal with instruction execution at a later date).
ASIC is a combination of digital and analog circuits packed into an IC to achieve the
desired control/computation function
CISC, which stands for Complex Instruction Set Computer, is a philosophy for
designing chips that are easy to program and which make efficient use of memory. Each
instruction in a CISC instruction set might perform a series of operations inside the
processor. This reduces the number of instructions required to implement a given program,
and allows the programmer to learn a small but flexible set of instructions.
At the time of their initial development, CISC machines used available technologies to
optimize computer performance.Microprogramming is as easy as assembly language to
implement, and much less expensive than hardwiring a control unit.
Disadvantages of CISC
Still, designers soon realized that the CISC philosophy had its own problems, including:
Memory Architecture
There two different type’s memory architectures there are:
I. Harvard Architecture
II. Von-Neumann Architecture
Harvard Architecture
Computers have separate memory areas for program instructions and data. There are
two or more internal data buses, which allow simultaneous access to both instructions and
data. The CPU fetches program instructions on the program memory bus.
contained within the central processing unit, and provided no access to the instruction
storage as data. Programs needed to be loaded by an operator, the processor could not boot
itself. Even in these cases, it is common to have special instructions to access program
memory as data for read-only tables, or for reprogramming.
Von-Neumann Architecture
A computer has a single, common memory space in which both program instructions and
data are stored. There is a single internal data bus that fetches both instructions and data.
They cannot be performed at the same time.
The von Neumann architecture is a design model for a stored-program digital computer
that uses a central processing unit (CPU) and a single separate storage structure
("memory") to hold both instructions and data. It is named after the mathematician and
early computer scientist John von Neumann. Such computers implement a universal Turing
machine and have a sequential architecture.
A stored-program digital computer is one that keeps its programmed instructions, as well
as its data, in read-write, random-access memory (RAM). Stored-program computers were
advancement over the program-controlled computers of the 1940s, such as the Colossus
and the ENIAC, which were programmed by setting switches and inserting patch leads to
route data and to control signals between various functional units.
In the vast majority of modern computers, the same memory is used for both data
and program instructions. The mechanisms for transferring the data and instructions
between the CPU and memory are, however, considerably more complex than the original
von Neumann architecture.
The terms "von Neumann architecture" and "stored-program computer" are generally used
interchangeably, and that usage is followed in this article.
I. The primary difference between Harvard architecture and the Von Neumann
architecture is in the Von Neumann architecture data and programs are stored in the
same memory and managed by the same information handling system.
II. Whereas the Harvard architecture stores data and programs in separate memory
devices and they are handled by different subsystems.
III. In a computer using the Von-Neumann architecture without cache; the central
processing unit (CPU) can either be reading and instruction or writing/reading data
to/from the memory. Both of these operations cannot occur simultaneously as the
data and instructions use the same system bus.
IV. In a computer using the Harvard architecture the CPU can both read an instruction
and access data memory at the same time without cache. This means that a
computer with Harvard architecture can potentially be faster for a given circuit
complexity because data access and instruction fetches do not contend for use of a
single memory pathway.
V. Today, the vast majority of computers are designed and built using the Von
Neumann architecture template primarily because of the dynamic capabilities and
efficiencies gained in designing, implementing, operating one memory system as
opposed to two. Von Neumann architecture may be somewhat slower than the
contrasting Harvard Architecture for certain specific tasks, but it is much more
flexible and allows for many concepts unavailable to Harvard architecture such as
self programming, word processing and so on.
VI. Harvard architectures are typically only used in either specialized systems or for
very specific uses. It is used in specialized digital signal processing (DSP), typically
for video and audio processing products. It is also used in many small
microcontrollers used in electronics applications such as Advanced RISK Machine
(ARM) based products for many vendors.
Characteristics:
Two major areas of differences are cost and power consumption. Since many
embedded systems are produced in the tens of thousands to millions of units range,
reducing cost is a major concern. Embedded systems often use a (relatively) slow processor
and small memory size to minimize costs. The slowness is not just clock speed. The whole
architecture of the computer is often intentionally simplified to lower costs. For example,
embedded systems often use peripherals controlled by synchronous serial interfaces, which
are ten to hundreds of times slower than comparable peripherals used in PCs.Programs on
an embedded system often must run with real-time constraints with limited hardware
resources: often there is no disk drive, operating system, keyboard or screen. A flash drive
may replace rotating media, and a small keypad and LCD screen may be used instead of a
PC's keyboard and screen.Firmware is the name for software that is embedded in hardware
devices, e.g. in one or more ROM/Flash memory IC chips.
Tools
Like a typical computer programmer, embedded system designers use compilers,
assemblers and debuggers to develop an embedded system.Those software tools can come
from several sources: Software companies that specialize in the embedded market Ported
from the GNU software development tools. Sometimes, development tools for a personal
computer can be used if the embedded processor is a close relative to a common PC
processor. Embedded system designers also use a few software tools rarely used by typical
computer programmers.Some designers keep a utility program to turn data files into code,
so that they can include any kind of data in a program. Most designers also have utility
programs to add a checksum or CRC to a program, so it can check its program data before
executing it.
Operating system
They often have no operating system, or a specialized embedded operating system
(often a real-time operating system), or the programmer is assigned to port one of these to
the new system.
Debugging
Debugging is usually performed with an in-circuit emulator, or some type of
debugger that can interrupt the micro controller’s internal microcode.The microcode
interrupt lets the debugger operate in hardware in which only the CPU works. The CPU-
based debugger can be used to test and debug the electronics of the computer from the
viewpoint of the CPU. This feature was pioneered on the PDP-11.
Developers should insist on debugging which shows the high-level language, with
breakpoints and single stepping, because these features are widely available. Also,
developers should write and use simple logging facilities to debug sequences of real-time
events.PC or mainframe programmers first encountering this sort of programming often
become confused about design priorities and acceptable methods. Mentoring, code-
reviews and ego less programming are recommended.
Start-up :
All embedded systems have start-up code. Usually it disables interrupts, sets up
the electronics, tests the computer (RAM, CPU and software), and then starts the
application code. Many embedded systems recover from short-term power failures by
restarting (without recent self-tests). Restart times under a tenth of a second are common.
Many designers have found one of more hardware plus software-controlled LEDs useful to
indicate errors during development (and in some instances, after product release, to produce
troubleshooting diagnostics). A common scheme is to have the electronics turn off the
LED(s) at reset, whereupon the software turns it on at the first opportunity, to prove that the
hardware and start-up software have performed their job so far. After that, the software
blinks the LED(s) or sets up light patterns during normal operation, to indicate program
execution progress and/or errors. This serves to reassure most technicians/engineers and
some users.
Many designers prefer to design their state machines to check only one or two
things per state. Usually this is a hardware event, and a software timer.
Designers recommend that hierarchical state machines should run the lower-level
state machines before the higher, so the higher run with accurate information. Complex
functions like internal combustion controls are often handled with multi-dimensional tables.
Instead of complex calculations, the code looks up the values. The software can interpolate
between entries, to keep the tables small and cheap One major weakness of this system is
that it does not guarantee a time to respond to any particular hardware event. Careful
coding can easily assure that nothing disables interrupts for long. Thus interrupt code can
run at very precise timings. Another major weakness of this system is that it can become
complex to add new features. Algorithms that take a long time to run must be carefully
broken down so only a little piece gets done each time through the main loop. This system's
strength is its simplicity, and on small pieces of software the loop is usually so fast that
nobody cares that it is not predictable. Another advantage is that this system guarantees that
the software will run. There is no mysterious operating system to blame for bad behavior.
User interfaces
User interfaces for embedded systems vary wildly, and thus deserve some special
comment. Designers recommend testing the user interface for usability at the earliest
possible instant. A quick, dirty test is to ask an executive secretary to use cardboard models
drawn with magic markers, and manipulated by an engineer. The videotaped result is likely
to be both humorous and very educational. In the tapes, every time the engineer talk, the
interface has failed: It would cause a service call.
Exactly one person should approve the user interface. Ideally, this should be a customer,
the major distributor or someone directly responsible for selling the system. The decision maker
should be able to decide. The problem is that a committee will never make up its mind, and neither
will some people. Not doing this causes avoidable, expensive delays. A usability test is more
important than any number of opinions. Interface designers at PARC, Apple Computer, Boeing
and HP minimize the number of types of user actions. For example, use two buttons (the absolute
minimum) to control a menu system (just to be clear, one button should be "next menu entry" the
other button should be "select this menu entry"). A touch-screen or screen-edge buttons also
minimize the types of user actions.
Another basic trick is to minimize and simplify the type of output. Designs should
consider using a status light for each interface plug, or failure condition, to tell what failed.
A cheap variation is to have two light bars with a printed matrix of errors that they select-
the user can glue on the labels for the language that she speaks. For example, Boeing's
standard test interface is a button and some lights. When you press the button, all the lights
turn on. When you release the button, the lights with failures stay on. The labels are in
Basic English. For another example, look at a small computer printer. You might have one
next to your computer. Notice that the lights are labeled with stick-on labels that can be
printed in any language. Really look at it.
Designers use colors. Red means the users can get hurt- think of blood. Yellow
means something might be wrong. Green means everything's OK. Another essential trick is
to make any modes absolutely clear on the user's display.
Most designers recommend that one use the native character sets, no matter how
painful. People with peculiar character sets feel coddled and loved when their language
shows up on machinery they use. Text should be translated by professional translators, even
if native speakers are on staff. Marketing staff have to be able to tell foreign distributors
that the translations are professional.
AT89C51 MICROCONTROLLER
FEATURES
I. 80C51 based architecture
II. 4-Kbytes of on-chip Reprogrammable Flash Memory
III. 128 x 8 RAM
IV. Two 16-bit Timer/Counters
V. Full duplex serial channel
VI. Boolean processor
VII. Four 8-bit I/O ports, 32 I/O lines
GENERAL DESCRIPTION:
THE MICROCONTROLLER:
A microcontroller is a general purpose device, but that is meant to read data, perform
limited calculations on that data and control its environment based on those calculations.
The prime use of a microcontroller is to control the operation of a machine using a fixed
program that is stored in ROM and that does not change over the lifetime of the system.
The microcontroller design uses a much more limited set of single and double byte
instructions that are used to move data and code from internal memory to the ALU. The
microcontroller is concerned with getting data from and to its own pins; the architecture
and instruction set are optimized to handle data in bit and byte size.
PIN DESCRIPTION:
VCC: Supply voltage
GND:Ground
Port 0
Port 0 is an 8-bit open drain bi-directional I/O port. As an output port, each pin can
sink eight TTL inputs. When 1s are written to port 0 pins, the pins can be used as high
impedance inputs.
Port 0 can also be configured to be the multiplexed low order address/data bus
during access to external program and data memory. In this mode, P 0 has internal pull-ups.
Port 0 also receives the code bytes during Flash programming and outputs the code bytes
during program verification. External pull-ups are required during program verification.
Port 1
Port 1 is an 8-bit bi-directional I/O port with internal pull-ups. The port 1output
buffers can sink/source four TTL inputs. When 1s are written to port 1 pins, they are pulled
high by the internal pull-ups can be used as inputs. As inputs, Port 1 pins that are externally
being pulled low will source current (1) because of the internal pull-ups.
Port 2
Port 2 is an 8-bit bi-directional I/O port with internal pull-ups. The port 2 output
buffers can sink/source four TTL inputs. When 1s are written to port 2 pins, they are pulled
high by the internal pull-ups can be used as inputs. As inputs, Port 2 pins that are
externally being pulled low will source current because of the internal pull-ups.
Port 2 emits the high-order address byte during fetches from external program
memory and during access to DPTR. In this application Port 2 uses strong internal pull-ups
when emitting 1s. During accesses to external data memory that use 8-bit data address
(MOVX@R1), Port 2 emits the contents of the P2 Special Function Register. Port 2 also
receives the high-order address bits and some control signals during Flash programming
and verification.
Port 3
Port 3 is an 8-bit bi-directional I/O port with internal pull-ups. The port 3 output buffers can
sink/source four TTL inputs. When 1s are written to port 3 pins, they are pulled high by the
internal pull-ups can be used as inputs. As inputs, Port 3 pins that are externally being
pulled low will source current because of the internal pull-ups.
Port 3 also receives some control signals for Flash Programming and verification
TABLE1:PORT FUNCTIONS
RST:
Rest input A on this pin for two machine cycles while the oscillator is running resets the
device.
ALE/PROG:
Address Latch Enable is an output pulse for latching the low byte of the address during
access to external memory. This pin is also the program pulse input (PROG) during Flash
programming.
In normal operation ALE is emitted at a constant rate of 1/16 the oscillator frequency and
may be used for external timing or clocking purpose. Note, however, that one ALE pulse is
skipped during each access to external Data memory.
PSEN :
Program Store Enable is the read strobe to external program memory when the AT89c51 is
executing code from external program memory PSEN is activated twice each machine
cycle, except that two PSEN activations are skipped during each access to external data
memory.
EA /VPP:
External Access Enable (EA) must be strapped to GND in order to enable the device to
fetch code from external program memory locations starting at 0000h up to FFFFH. Note,
however, that if lock bit 1 is programmed EA will be internally latched on reset. EA should
be strapped to Vcc for internal program executions. This pin also receives the 12-volt
programming enable voltage (Vpp) during Flash programming when 12-volt programming
is selected.
XTAL1:
Input to the inverting oscillator amplifier and input to the internal clock operating circuit.
XTAL 2:
OPERATING DESCRIPTION
The detail description of the AT89C51 included in this description is:
The AT89C51 has separate address spaces for program and data memory. The program and
data memory can be up to 64K bytes long. The lower 4K program memory can reside on-
chip. The AT89C51 has 128 bytes of on-chip RAM. The lower 128 bytes can be accessed
either by direct addressing or by indirect addressing. The lower 128 bytes of RAM can be
divided into 3 segments as listed below
I. Register Banks 0-3: locations 00H through 1FH (32 bytes). The device after reset
defaults to register bank 0. To use the other register banks, the user must select them
in software. Each register bank contains eight 1-byte registers R0-R7. Reset
initializes the stack point to location 07H, and is incremented once to start from
08H, which is the first register of the second register bank.
II. Bit Addressable Area: 16 bytes have been assigned for this segment 20H-2FH.
Each one of the 128 bits of this segment can be directly addressed (0-7FH). Each of
the 16 bytes in this segment can also be addressed as a byte.
III. Scratch Pad Area: 30H-7FH are available to the user as data RAM. However, if
the data pointer has been initialized to this area, enough bytes should be left aside to
prevent SP data destruction.
Accumulator (ACC):
B Register (B):The B register is used during multiply and divide operations. For other
instructions it can be treated as another scratch pad register.
The Stack Pointer Register is eight bits wide. It is incremented before data is stored
during PUSH and CALL executions. While the stack may reside anywhere in on chip
RAM, the Stack Pointer is initialized to 07H after a reset. This causes the stack to begin at
location 08H.
The Data Pointer consists of a high byte (DPH) and a low byte (DPL). Its function
is to hold a 16-bit address. It may be manipulated as a 16-bit register or as two independent
8-bit registers.
The Serial Data Buffer is actually two separate registers, a transmit buffer and a
receive buffer register. When data is moved to SBUF, it goes to the transmit buffer, where
it is held for serial transmission. (Moving a byte to SBUF initiates the transmission.) When
data is moved from SBUF, it comes from the receive buffer.
Timer Registers:
Register pairs (TH0, TL0) and (TH1, TL1) are the 16-bit Counter registers for
Timer/Counters 0 and 1, respectively.
Control Registers:
Special Function Registers IP, IE, TMOD, TCON, SCON, and PCON contain
control and status bits for the interrupt system, the Timer/Counters, and the serial port.
TIMER/COUNTERS:
The IS89C51 has two 16-bit Timer/Counter registers: Timer 0 and Timer 1. All two
can be configured to operate either as Timers or event counters. As a Timer, the register is
incremented every machine cycle. Thus, the register counts machine cycles. Since a
machine cycle consists of 12 oscillator periods, the count rate is 1/12 of the oscillator
frequency.
TIMERS:
FIGURE8:TIMERS
I. TMOD Register
II. TCON Register
III. Timer(T0) & timer(T1) Registers
I. The timer mode SFR is used to configure the mode of operation of each of the two
timers. Using this SFR your program may configure each timer to be a 16-bit timer,
or 13 bit timer, 8-bit auto reload timer, or two separate timers. Additionally you
may configure the timers to only count when an external pin is activated or to count
“events” that are indicated on an external pin.
II. It can consider as two duplicate 4-bit registers, each of which controls the action of
one of the timers.
I. The timer control SFR is used to configure and modify the way in which the 8051’s
two timers operate. This SFR controls whether each of the two timers is running or
stopped and contains a flag to indicate that each timer has overflowed. Additionally,
some non-timer related bits are located in TCON SFR.
II. These bits are used to configure the way in which the external interrupt flags are
activated, which are set when an external interrupt occurs.
These two SFR’s taken together represent timer 0. Their exact behavior depends on
how the timer is configured in the TMOD SFR; however, these timers always count up.
What is configurable is how and when they increment in value.
These two SFR’s, taken together, represent timer 1. Their exact behavior depends on
how the timer is configured in the TMOD SFR; however, these timers always count up.
What is Configurable is how and when they increment in value.
The Timer or Counter function is selected by control bits C/T in the Special
Function Register TMOD. These two Timer/Counters have four operating modes, which
are selected by bit pairs (M1, M0) in TMOD. Modes 0, 1, and 2 are the same for both
Timer/Counters, but Mode 3 is different.
Mode 0:
Both Timers in Mode 0 are 8-bit Counters with a divide-by-32 pre scalar. Figure 8
shows the Mode 0 operation as it applies to Timer 1. In this mode, the Timer register is
configured as a 13-bit register. As the count rolls over from all 1s to all 0s, it sets the Timer
interrupt flag TF1. The counted input is enabled to the Timer when TR1 = 1 and either
GATE = 0 or INT1 = 1. Setting GATE = 1 allows the Timer to be controlled by external
input INT1, to facilitate pulse width measurements. TR1 is a control bit in the Special
Function Register TCON. Gate is in TMOD.
The 13-bit register consists of all eight bits of TH1 and the lower five bits of TL1.
The upper three bits of TL1 are indeterminate and should be ignored. Setting the run flag
(TR1) does not clear the registers.
Mode 0 operation is the same for Timer 0 as for Timer 1, except that TR0, TF0 and
INT0 replace the corresponding Timer 1 signals. There are two different GATE bits, one
for Timer 1 (TMOD.7) and one for Timer 0 (TMOD.3).
Mode 1:
Mode 1 is the same as Mode 0, except that the Timer register is run with all 16 bits.
The clock is applied to the combined high and low timer registers (TL1/TH1). As clock
pulses are received, the timer counts up: 0000H, 0001H, 0002H, etc. An overflow occurs
on the FFFFH-to-0000H overflow flag. The timer continues to count. The overflow flag is
the TF1 bit in TCON that is read or written by software
Mode 2:
Mode 2 configures the Timer register as an 8-bit Counter (TL1) with automatic
reload, as shown in Figure 10. Overflow from TL1 not only sets TF1, but also reloads TL1
with the contents of TH1, which is preset by software. The reload leaves the TH1
unchanged. Mode 2 operation is the same for Timer/Counter 0.
Mode 3:
Timer 1 in Mode 3 simply holds its count. The effect is the same as setting TR1 = 0.
Timer 0 in Mode 3 establishes TL0and TH0 as two separate counters. The logic for Mode 3
on Timer 0 is shown in Figure 11. TL0 uses the Timer 0 control bits: C/T, GATE, TR0,
INT0, and TF0. TH0 is locked into a timer function (counting machine cycles) and over the
use of TR1 and TF1 from Timer 1. Thus, TH0 now controls the Timer 1 interrupt.
Mode 3 is for applications requiring an extra 8-bit timer or counter. With Timer 0 in
Mode 3, the AT89C51 can appear to have three Timer/Counters. When Timer 0 is in Mode
3, Timer 1 can be turned on and off by switching it out of and into its own Mode 3. In this
case, Timer 1 can still be used by the serial port as a baud rate generator or in any
application not requiring an interrupt.
INTERRUPT SYSTEM:
Baud Rate:
The baud rate in Mode 0 is fixed as shown in the following equation. Mode 0 Baud
Rate = Oscillator Frequency /12 the baud rate in Mode 2 depends on the value of the
SMOD bit in Special Function Register PCON. If SMOD = 0 the baud rate is 1/64 of the
oscillator frequency. If SMOD = 1, the baud rate is 1/32 of the oscillator frequency.
In the IS89C51, the Timer 1 overflow rate determines the baud rates in Modes 1 and 3.
Lower the vector, higher the priority. The External Interrupts INT0 and INT1 can
each be either level-activated or transition-activated, depending on bits IT0 and IT1 in
Register TCON. The flags that actually generate these interrupts are the IE0 and IE1 bits in
TCON. When the service routine is vectored, hardware clears the flag that generated an
external interrupt only if the interrupt was transition-activated. If the interrupt was level-
activated, then the external requesting source (rather than the on-chip hardware) controls
the request flag.
The Timer 0 and Timer 1 Interrupts are generated by TF0and TF1, which are set by
a rollover in their respective Timer/Counter registers (except for Timer 0 in Mode 3).When
a timer interrupt is generated, the on-chip hardware clears the flag that is generated.
The Serial Port Interrupt is generated by the logical OR of RI and TI. The service
routine normally must determine whether RI or TI generated the interrupt, and the bit must
be cleared in software. All of the bits that generate interrupts can be set or cleared by
software, with the same result as though they had been set or cleared by hardware. That is,
interrupts can be generated and pending interrupts can be canceled in software.
D6 bit: Reserved.
There is one more SRF to assign priority to the interrupts which is named as
interrupt priority (IP). User has given the provision to assign priority to one interrupt.
Writing one to that particular bit in the IP register fulfils the task of assigning the priority.
CHAPTER-2
BLOCK DIAGRAM AND WORKING
BLOCK DIAGRAM:
I. GSM module
II. Power Supply
III. PIR sensor
IV. NodeMCU
GSM MODULE:
PIR SENSOR:
A passive infrared sensor (PIR sensor) is an electronic sensor that measures
infrared (IR) light radiating from objects in its field of view. They are most often used in
PIR-based motion detectors.
The PIR sensor is typically mounted on a printed circuit board containing the necessary
electronics required to interpret the signals from the sensor itself. The complete assembly is
usually contained within a housing, mounted in a location where the sensor can cover area
to be monitored.
NodeMCU:
WORKING:
As soon as the PIR sensor detects the changes the presence of a human body a
message(SMS) is sent to the intended recepient’s mobile through the GSM module.Once
the module is connected to WIFI message is also sent to the recepient through
THINGSPEAK cloud.The message “HUMAN DETECTED” is displayed on the screen.
CHAPTER-3
NodeMCU:
NodeMCU is an open source IoT platform. firmware which runs on
the ESP8266 Wi-Fi SoC from Espressif Systems, and hardware which is based on the ESP-
12 module. "NodeMCU" by default refers to the firmware rather than the development kits.
The firmware uses the Lua scripting language. It is based on the eLua project, and built on
the Espressif Non-OS SDK for ESP8266. It uses many open source projects, such as lua-
cjson
NodeMCU was created shortly after the ESP8266 came out. On December 30,
2013, Espressif Systems is a WIFI SoC integrated with a Tensilica Xtensa LX106
core,widely used in IoT applications (see related projects). NodeMCU started on 13 Oct
2014, when Hong committed the first file of nodemcu-firmware to GitHub gerber file of an
ESP8266 board, named devkit v0.9.MQTT client library from Contiki to the ESP8266 SoC
platform and committed to NodeMCU project, then NodeMCU was able to support the
MQTT IoT protocol, using Lua to access the MQTT broker. Another important update was
made on 30 Jan 2015, when Devsaurus ported the u8glib to NodeMCU project, NodeMCU
to easily drive LCD, Screen, OLED, even VGA displays.
In summer 2015 the creators abandoned the firmware project and a group of
independent contributors took over. By summer 2016 the NodeMCU included more than 40
different modules. Due to resource constraints users need to select the modules relevant for
their project and build a firmware tailored to their needs.
allow Arduino C/C++ to be compiled for these new processors. They did this with the
introduction of the Board Manager and the SAM Core. A "core" is the collection of
software components required by the Board Manager and the Arduino IDE to compile an
Arduino C/C++ source file for the target MCU's machine language. Some ESP8266
enthusiasts developed an Arduino core for the ESP8266 WiFi SoC, popularly called the
"ESP8266 Core for the Arduino IDE". NodeMCUs.
GSM
Definition of GSM:
GSM (Global System for Mobile communications) is an open, digital cellular
technology used for transmitting mobile voice and data services.
History:
By the end of 1993, over a million subscribers were using GSM phone networks
being operated by 70 carriers across 48 countries. As of the end of 1997, GSM service was
available in more than 100 countries and has become the de facto standard in Europe and
Asia.
GSM Frequencies:
GSM-900 uses 890–915 MHz to send information from the mobile station to the
base station (uplink) and 935–960 MHz for the other direction (downlink), providing 124
RF channels (channel numbers 1 to 124) spaced at 200 kHz. Duplex spacing of 45 MHz is
used. In some countries the GSM-900 band has been extended to cover a larger frequency
range. This 'extended GSM', E-GSM, uses 880–915 MHz (uplink) and 925–960 MHz
(downlink), adding 50 channels (channel numbers 975 to 1023 and 0) to the original GSM-
900 band.
burst periods) grouped into what is called a TDMA frame. Half rate channels use alternate
frames in the same timeslot. The channel data rate for all 8 channels is 270.833 Kbit/s, and
the frame duration is 4.615 ms.
Terrestrial GSM networks now cover more than 80% of the world’s population.
GSM satellite roaming has also extended service access to areas where terrestrial coverage
is not available.
The first generation of mobile telephony (written 1G) operated using analogue
communications and portable devices that were relatively large. It used primarily the
following standards:
I. AMPS (Advanced Mobile Phone System), which appeared in 1976 in the United
States, was the first cellular network standard. It was used primarily in the
Americas, Russia and Asia. This first-generation analogue network had weak
security mechanisms which allowed hacking of telephones lines.
II. TACS (Total Access Communication System) is the European version of the
AMPS model. Using the 900 MHz frequency band, this system was largely used in
England and then in Asia (Hong-Kong and Japan).
III. ETACS (Extended Total Access Communication System) is an improved version
of the TACS standard developed in the United Kingdom that uses a larger number
of communication channels.
The first-generation cellular networks were made obsolete by the appearance of an entirely
digital second generation.
i. GSM (Global System for Mobile communications) is the most commonly used
standard in Europe at the end of the 20th century and supported in the United States.
This standard uses the 900 MHz and 1800 MHz frequency bands in Europe. In the
United States, however, the frequency band used is the 1900 MHz band. Portable
telephones that are able to operate in Europe and the United States are therefore
called tri-band.
ii. CDMA (Code Division Multiple Access) uses a spread spectrum technique that
allows a radio signal to be broadcast over a large frequency range.
iii. TDMA (Time Division Multiple Access) uses a technique of time division of
communication channels to increase the volume of data transmitted simultaneously.
TDMA technology is primarily used on the American continent, in New Zealand
and in the Asia-Pacific region.
With the 2G networks, it is possible to transmit voice and low volume digital data, for
example text messages (SMS, for Short Message Service) or multimedia messages (MMS,
for Multimedia Message Service). The GSM standard allows a maximum data rate of 9.6
kbps.
Extensions have been made to the GSM standard to improve throughput. One of
these is the GPRS (General Packet Radio System) service which allows theoretical data
rates on the order of 114 Kbit/s but with throughput closer to 40 Kbit/s in practice. As this
technology does not fit within the "3G" category, it is often referred to as 2.5G
The EDGE (Enhanced Data Rates for Global Evolution) standard, billed as 2.75G,
quadruples the throughput improvements of GPRS with its theoretical data rate of 384
Kbps, thereby allowing the access for multimedia applications. In reality, the EDGE
standard allows maximum theoretical data rates of 473 Kbit/s, but it has been limited in
order to comply with the IMT-2000 (International Mobile Telecommunications-2000)
specifications from the ITU (International Telecommunications Union).
3G offers data rates of more than 144 Kbit/s, thereby allowing the access to multimedia
uses such as video transmission, video-conferencing or high-speed internet access. 3G
networks use different frequency bands than the previous networks: 1885-2025 MHz and
2110-2200 MHz.
The GSM (Global System for Mobile communications) network is at the start of the
21st century, the most commonly used mobile telephony standard in Europe. It is called as
Second Generation (2G) standard because communications occur in an entirely digital
mode, unlike the first generation of portable telephones. When it was first standardized in
1982, it was called as Group Special Mobile and later, it became an international standard
called "Global System for Mobile communications" in 1991.
In Europe, the GSM standard uses the 900 MHz and 1800 MHz frequency bands. In
the United States, however, the frequency band used is the 1900 MHz band. For this
reason, portable telephones that are able to operate in both Europe and the United States are
called tri-band while those that operate only in Europe are called bi-band.
The GSM standard allows a maximum throughput of 9.6 kbps which allows
transmission of voice and low-volume digital data like text messages (SMS, for Short
Message Service) or multimedia messages (MMS, for Multimedia Message Service).
GSM Standards:
GSM uses narrowband TDMA, which allows eight simultaneous calls on the same
radio frequency. There are three basic principles in multiple access, FDMA (Frequency
Division Multiple Access), TDMA (Time Division Multiple Access), and CDMA (Code
Division Multiple Access). All three principles allow multiple users to share the same
physical channel. But the two competing technologies differ in the way user sharing the
common resource.
TDMA allows the users to share the same frequency channel by dividing the signal
into different time slots. Each user takes turn in a round robin fashion for transmitting and
receiving over the channel. Here, users can only transmit in their respective time slot.
TDMA in brief:
In late1980’s, as a search to convert the existing analog network to digital as a
means to improve capacity, the cellular telecommunications industry association chose
TDMA over FDMA. Time Division Multiplex Access is a type of multiplexing where two
or more channels of information are transmitted over the same link by allocating a different
time interval for the transmission of each channel. The most complex implementation using
TDMA principle is of GSM’s (Global System for Mobile communication). To reduce the
effect of co-channel interference, fading and multipath, the GSM technology can use
frequency hopping, where a call jumps from one channel to another channel in a short
interval.
Advantages of TDMA:
There are lots of advantages of TDMA in cellular technologies.
TDMA is the most cost effective technology to convert an analog system to digital.
Disadvantages of TDMA:
One major disadvantage using TDMA technology is that the users has a predefined
time slot. When moving from one cell site to other, if all the time slots in this cell are full
the user might be disconnected. Likewise, if all the time slots in the cell in which the user is
currently in are already occupied, the user will not receive a dial tone.
Cellular networks are based on the use of a central transmitter-receiver in each cell,
called a "base station" (or Base Transceiver Station, written BTS). The smaller the radius of
a cell, the higher is the available bandwidth. So, in highly populated urban areas, there are
cells with a radius of a few hundred meters, while huge cells of up to 30 kilometers provide
coverage in rural areas.
In a GSM network, the user terminal is called a mobile station. A mobile station is
made up of a SIM (Subscriber Identity Module) card allowing the user to be uniquely
identified and a mobile terminal. The terminals (devices) are identified by a unique 15-digit
identification number called IMEI (International Mobile Equipment Identity). Each SIM
card also has a unique (and secret) identification number called IMSI (International Mobile
Subscriber Identity). This code can be protected using a 4-digit key called a PIN code.
The SIM card therefore allows each user to be identified independently of the
terminal used during communication with a base station. Communications occur through a
radio link (air interface) between a mobile station and a base station.
All the base stations of a cellular network are connected to a base station
controller (BSC) which is responsible for managing distribution of the resources. The
system consisting of the base station controller and its connected base stations is called
the Base Station Subsystem (BSS).
Finally, the base station controllers are themselves physically connected to the Mobile
Switching Centre (MSC), managed by the telephone network operator, which connects
them to the public telephone network and the Internet. The MSC belongs to a Network
Station Subsystem (NSS), which is responsible for managing user identities, their location
and establishment of communications with other subscribers. The MSC is generally
connected to databases that provide additional functions:
Finally, GSM networks support the concept of roaming i.e., movement from one operator
network to another.
Introduction to Modem:
also modems that come as an expansion board that can be inserted into a vacant expansion
slot. These are sometimes called onboard or internal modems.
While the modem interfaces are standardized, a number of different protocols for
formatting data to be transmitted over telephone lines exist. Some, like CCITT V.34 are
official standards, while others have been developed by private companies. Most modems
have built-in support for the more common protocols at slow data transmission speeds at
least, most modems can communicate with each other. At high transmission speeds,
however, the protocols are less standardized.
Apart from the transmission protocols that they support, the following characteristics
distinguish one modem from another:
I. Bps: How fast the modem can transmit and receive data. At slow rates, modems are
measured in terms of baud rates. The slowest rate is 300 baud (about 25 cps). At
higher speeds, modems are measured in terms of bits per second (bps). The fastest
modems run at 57,600 bps, although they can achieve even higher data transfer rates
by compressing the data. Obviously, the faster the transmission rate, the faster the
data can be sent and received. It should be noted that the data cannot be received at
a faster rate than it is being sent.
II. Voice/data: Many modems support a switch to change between voice and data
modes. In data mode, the modem acts like a regular modem. In voice mode, the
modem acts like a regular telephone. Modems that support a voice/data switch have
a built-in loudspeaker and microphone for voice communication.
III. Auto-answer: An auto-answer modem enables the computer to receive calls in the
absence of the operator.
IV. Data compression: Some modems perform data compression, which enables them
to send data at faster rates. However, the modem at the receiving end must be able
to decompress the data using the same compression technique.
V. Flash memory: Some modems come with flash memory rather than conventional
ROM which means that the communications protocols can be easily updated if
necessary.
VI. Fax capability: Most modern modems are fax modems, which mean that they can
send and receive faxes.
GSM Modem:
A GSM modem is a wireless modem that works with a GSM wireless network. A
wireless modem behaves like a dial-up modem. The main difference between them is that a
dial-up modem sends and receives data through a fixed telephone line while a wireless
modem sends and receives data through radio waves.
Computers use AT commands to control modems. Both GSM modems and dial-up
modems support a common set of standard AT commands. In addition to the standard AT
commands, GSM modems support an extended set of AT commands. These extended AT
commands are defined in the GSM standards. With the extended AT commands, the
following operations can be performed:
The number of SMS messages that can be processed by a GSM modem per minute is very
low i.e., about 6 to 10 SMS messages per minute.
Introduction to AT Commands:
Besides this common AT command set, GSM modems and mobile phones support
an AT command set that is specific to the GSM technology, which includes SMS-related
commands like AT+CMGS (Send SMS message), AT+CMSS (Send SMS message from
storage), AT+CMGL (List SMS messages) and AT+CMGR (Read SMS messages).
It should be noted that the starting "AT" is the prefix that informs the modem about
the start of a command line. It is not part of the AT command name. For example, D is the
actual AT command name in ATD and +CMGS is the actual AT command name in
AT+CMGS.
Some of the tasks that can be done using AT commands with a GSM modem or mobile
phone are listed below:
I. Get basic information about the mobile phone or GSM modem. For example, name
of manufacturer (AT+CGMI), model number (AT+CGMM), IMEI number
(International Mobile Equipment Identity) (AT+CGSN) and software version
(AT+CGMR).
II. Get basic information about the subscriber. For example, MSISDN (AT+CNUM)
and IMSI number (International Mobile Subscriber Identity) (AT+CIMI).
III. Get the current status of the mobile phone or GSM/GPRS modem. For example,
mobile phone activity status (AT+CPAS), mobile network registration status
(AT+CREG), radio signal strength (AT+CSQ), battery charge level and battery
charging status (AT+CBC).
IV. Establish a data connection or voice connection to a remote modem (ATD, ATA,
etc).
V. Send and receive fax (ATD, ATA, AT+F*).
VI. Send (AT+CMGS, AT+CMSS), read (AT+CMGR, AT+CMGL), write
(AT+CMGW) or delete (AT+CMGD) SMS messages and obtain notifications of
newly received SMS messages (AT+CNMI).
VII. Read (AT+CPBR), write (AT+CPBW) or search (AT+CPBF) phonebook entries.
It should be noted that the mobile phone manufacturers usually do not implement all
AT commands, command parameters and parameter values in their mobile phones. Also,
the behavior of the implemented AT commands may be different from that defined in the
standard. In general, GSM modems, designed for wireless applications, have better support
of AT commands than ordinary mobile phones.
An SMS message is stored temporarily in the SMS center if the recipient mobile
phone is offline. It is possible to specify the period after which the SMS message will be
deleted from the SMS center so that the SMS message will not be forwarded to the
recipient mobile phone when it becomes online. This period is called the validity period. A
mobile phone should have a menu option that can be used to set the validity period. After
setting it, the mobile phone will include the validity period in the outbound SMS messages
automatically.
Sometimes the user may want to know whether an SMS message has reached the
recipient mobile phone successfully. To get this information, you need to set a flag in the
SMS message to notify the SMS center that a status report is required about the delivery of
this SMS message. The status report is sent to the user mobile in the form of an SMS
message.
A mobile phone should have a menu option that can be used to set whether the
status report feature is on or off. After setting it, the mobile phone will set the
corresponding flag in the outbound SMS messages for you automatically. The status report
feature is turned off by default on most mobile phones and GSM modems.
After leaving the mobile phone, an SMS message goes to the SMS center. When it
reaches the SMS center, the SMS center will send back a message submission report to the
mobile phone to inform whether there are any errors or failures (e.g. incorrect SMS
message format, busy SMS center, etc). If there is no error or failure, the SMS center sends
back a positive submission report to the mobile phone. Otherwise it sends back a negative
submission report to the mobile phone. The mobile phone may then notify the user that the
message submission was failed and what caused the failure.
If the mobile phone does not receive the message submission report after a period of
time, it concludes that the message submission report has been lost. The mobile phone may
then send the SMS message again to the SMS center. A flag will be set in the new SMS
message to inform the SMS center that this SMS message has been sent before. If the
previous message submission was successful, the SMS center will ignore the new SMS
message but send back a message submission report to the mobile phone. This mechanism
prevents the sending of the same SMS message to the recipient multiple times.
Sometimes the message submission report mechanism is not used and the
acknowledgement of message submission is done in a lower layer.
After receiving an SMS message, the recipient mobile phone will send back a
message delivery report to the SMS center to inform whether there are any errors or failures
(example causes: unsupported SMS message format, not enough storage space, etc). This
process is transparent to the mobile user. If there is no error or failure, the recipient mobile
phone sends back a positive delivery report to the SMS center. Otherwise it sends back a
negative delivery report to the SMS center.
If the sender requested a status report earlier, the SMS center sends a status report to
the sender when it receives the message delivery report from the recipient. If the SMS
center does not receive the message delivery report after a period of time, it concludes that
the message delivery report has been lost. The SMS center then ends the SMS message to
the recipient for the second time.
Sometimes the message delivery report mechanism is not used and the
acknowledgement of message delivery is done in a lower layer
Operating principles
All objects with a temperature above absolute zero emit heat energy in the form of
radiation. Usually this radiation isn't visible to the human eye because it radiates at infrared
wavelengths, but it can be detected by electronic devices designed for such a purpose.
The term passive in this instance refers to the fact that PIR devices do not generate
or radiate energy for detection purposes. They work entirely by detecting infrared
radiation (radiant heat) emitted by or reflected from objects.
Infrared radiation enters through the front of the sensor, known as the 'sensor face'. At the
core of a PIR sensor is a solid state sensor or set of sensors, made
from pyroelectricmaterials—materials which generate energy when exposed to heat.
Typically, the sensors are approximately 1/4 inch square (40 mm2), and take the form of
a thin film. Materials commonly used in PIR sensors include gallium
nitride (GaN), caesium nitrate (CsNO3), polyvinyl fluorides, derivatives of phenylpyridine,
and cobalt phthalocyanine. The sensor is often manufactured as part of an integrated circuit.
Operation:
PIRs come in many configurations for a wide variety of applications. The most
common models have numerous Fresnel lenses or mirror segments, an effective range of
about ten meters (thirty feet), and a field of view less than 180 degrees. Models with wider
fields of view, including 360 degrees, are available—typically designed to mount on a
ceiling. Some larger PIRs are made with single segment mirrors and can sense changes in
infrared energy over thirty meters (one hundred feet) away from the PIR. There are also
PIRs designed with reversible orientation mirrors which allow either broad coverage (110°
wide) or very narrow "curtain" coverage, or with individually selectable segments to
"shape" the coverage.
Differential detection:
temperature of the field of view is removed from the electrical signal; an increase of IR
energy across the entire sensor is self-cancelling and will not trigger the device. This allows
the device to resist false indications of change in the event of being exposed to brief flashes
of light or field-wide illumination. (Continuous high energy exposure may still be able to
saturate the sensor materials and render the sensor unable to register further information.)
At the same time, this differential arrangement minimizes common-mode interference,
allowing the device to resist triggering due to nearby electric fields. However, a differential
pair of sensors cannot measure temperature in this configuration, and therefore is only
useful for motion detection.
Practical Implementation:
Product design:
The PIR sensor is typically mounted on a printed circuit board containing the
necessary electronics required to interpret the signals from the sensor itself. The complete
assembly is usually contained within a housing, mounted in a location where the sensor can
cover area to be monitored.
The housing will usually have a plastic "window" through which the infrared energy
can enter. Despite often being only translucent to visible light, infrared energy is able to
reach the sensor through the window because the plastic used is transparent to infrared
radiation. The plastic window reduces the chance of foreign objects (dust, insects, etc.)
from obscuring the sensor's field of view, damaging the mechanism, and/or causing false
alarms. The window may be used as a filter, to limit the wavelengths to 8-14 micrometres,
which is closest to the infrared radiation emitted by humans. It may also serve as a focusing
mechanism; see below.
Focusing
Different mechanisms can be used to focus the distant infrared energy onto the sensor
surface.
Lenses
The plastic window covering may have multiple facets molded into it, to focus the infrared
energy onto the sensor. Each individual facet is a Fresnel lens.
PIR front cover only, with point light source behind, to show individual lenses.
PIR with front cover removed, showing location of pyroelectric sensor (green arrow).
Mirrors
Some PIRs are manufactured with internal, segmented parabolic mirrors to focus
the infrared energy. Where mirrors are used, the plastic window cover generally has no
Fresnel lenses molded into it.
Cover removed. Segmented mirror at bottom with PC (printed circuit) board above it.
Rear of circuit board which faces mirror when in place. Pyroelectric sensor indicated by
green arrow.
Security applications
When used as part of a security system, the electronics in the PIR typically control a
small relay. This relay completes the circuit across a pair of electrical contacts connected to
a detection input zone of the burglar alarm control panel. The system is usually designed
such that if no motion is being detected, the relay contact is closed—a 'normally closed'
(NC) relay. If motion is detected, the relay will open the circuit, triggering the alarm; or, if
a wire is disconnected, the alarm will also operate.
Placement
It is also recommended that the PIR not be placed in such a position that
an HVAC vent would blow hot or cold air onto the surface of the plastic which covers the
housing's window. Although air has very low emissivity (emits very small amounts of
infrared energy), the air blowing on the plastic window cover could change the plastic's
temperature enough to trigger a false alarm.Sensors are also often designed to "ignore"
domestic pets, such as dogs or cats, by setting a higher sensitivity threshold, or by ensuring
that the floor of the room remains out of focus.
Since PIR sensors have ranges of up to 10 meters (30 feet), a single detector placed
near the entrance is typically all that is necessary for rooms with only a single entrance.
PIR-based security systems are also viable in outdoor security and motion-sensitive
lighting; one advantage is their low power draw, which allows them to be solar-powered.
CHAPTER 4
SOFTWARE DESCRIPTION
Arduino has been used in thousands of different projects and applications. The
Arduino software is easy-to-use for beginners, yet flexible enough for advanced users. It
runs on Mac, Windows, and Linux. Teachers and students use it to build low cost scientific
instruments, to prove chemistry and physics principles, or to get started with programming
and robotics. Designers and architects build interactive prototypes, musicians and artists
use it for installations and to experiment with new musical instruments. Makers, of course,
use it to build many of the projects exhibited at the Maker Faire, for example. Arduino is a
key tool to learn new things. Anyone - children, hobbyists, artists, programmers - can start
tinkering just following the step by step instructions of a kit, or sharing ideas online with
other members of the Arduino community.
There are many other microcontrollers and microcontroller platforms available for
physical computing. Parallax Basic Stamp, Netmedia's BX-24, Phidgets, MIT's
Handyboard, and many others offer similar functionality. All of these tools take the messy
details of microcontroller programming and wrap it up in an easy-to-use package. Arduino
also simplifies the process of working with microcontrollers, but it offers some advantage
for teachers, students, and interested amateurs over other systems:
CODE:
#include <SoftwareSerial.h>
#include <ESP8266WiFi.h>
String apiKey ="RGM5R9JW16DBCSUM"; // Enter your Write API key
from ThingSpeak
const char *ssid = "SRI INDU HUB"; // replace with your wifi ssid and
wpa2 key
const char *pass = "shubsriindu";
const char* server = "api.thingspeak.com";
// Configure software serial port
SoftwareSerial SIM900(D7,D8);//8-gsmtx,7-rx
String textMessage;
WiFiClient client;
delay(100);
}
void loop() {
int a=digitalRead(irpin);
// Prints the gas values on the Serial Monitor
if(a>0)
{
textMessage = "OBJECT DETECTED";
digitalWrite(D2,HIGH);
sendSMS(textMessage);
thingspeak();
}
Serial.println(a);
delay(2000);
}
void sendSMS(String message){
// AT command to set SIM900 to SMS mode
SIM900.print("AT+CMGF=1\r");
delay(100);
void thingspeak()
{
int irpin=digitalRead(D1);
if (client.connect(server,80)) // "184.106.153.149" or api.thingspeak.com
{
String postStr = apiKey;
postStr +="&field1=";
postStr += String(irpin);
postStr += "\r\n\r\n";
client.print("X-THINGSPEAKAPIKEY: "+apiKey+"\n");
client.print("Content-Type: application/x-www-form-
urlencoded\n");
client.print("Content-Length: ");
client.print(postStr.length());
client.print("\n\n");
client.print(postStr);
Serial.println("Sensor: ");
Serial.println(irpin);
}
client.stop();
Serial.println("Waiting...");
CHAPTER 5
CONCLUSION
FUTURE SCOPE:
Human detection is to provide more security for the users to protect their belongings
from robbers. The robot can move in all the directions automatically without controlling it,
which makes the system more effective to use. As the system can move, it covers lot of
distance that reduces the use of many sensors or many robots.When the Robot finds a
human it can notify the users by producing continuous beeps.
The Robot can be modified further by attaching a visual camera where the image of
the intruder can be notified. If the robot is attached with SONAR (Sound Navigation And
Ranging) it can determine the distance between the human and can detect the IR image of
the object.
REFERENCES:
[1] Fahed Awad, Rufaida Shamroukh “Human Detection by Robotic Urban Search
and Rescue Using Image Processing and Neural Networks” International Journal of
Intelligence Science, 2014, PP. 4, 39-53.
[2] Chris Cappello, Chad Olsen, Mike Auen “Remote Operated and Controlled
Hexapod (ROACH) Robot, Rescue Robot League Competition Atlanta, Georgia,
USA May 7 – 10, 2005.
[4] Amerada, T., Yams, T., Igarashit, H., & Matsunos, F. “Development of the
Snake-like Rescue Robot KOHGA” IEEE, 2004, PP. 5081- 5086.
[5] Sandeep Bhatia, Ajay Mudgil and Amita Soni “Alive Human Detection Using
an Autonomous Mobile Rescue Robot”, Department of Electrical And Electronics,
PEC University of Technology, Chandigarh, India Vol. 02, July 2010.