CHAPTER -1
INTRODUCTION
1.1 MOTIVATION
The basic motivation behind this idea is to use sensor networks and in turn next
generation networks in making the travelling safe as well as trying to prevent the
circumstances from any undesired event. If any undesired situation had occurred then
to see that the loss is reduced at the least. Road traffic accidents (RTAs) had become an
important factor in public health and development problem in India. RTAs involve
high percentage of damages in human life in various levels. Although there are various
measures had been taken to reduce accidents. A survey by ministry of road transport
highway in 2015 reports around 5 lakh accidents in India in which 1.3 lakh people
were dead and 5.2 lakh were injured. RTAs Kill almost 1.2 million people a year and
injuring or disabling between 20-50 million people around the world. This clearly
shows the importance of a crash prevention and avoidance systems in todays
automotive industry.
This project aims to create a low cost, retrospective solution that cancan be
implemented in large scale to help reduce a significant number of accidents. This is by
no means a fully autonomous system as it is, but an effective driver assistance system
which helps the driver use an automobile in a safe way without getting into a crash
situation from which the driver may find it hard to get out of.
The system can also help a panicking driver to safely get out of the crash
scenario. This system contains two levels of assistance, the first level being a driver
alerting system followed by a controlled braking process. One of the major causes of
road accident in the world is driving too fast, recent studies shows that one third of the
serious road accidents are due to inappropriate speed, as well as change in road way
(like presence of road work or unexpected obstacles).So in order to avoid such kind of
accidents and to alert the drivers and to control their vehicle speed in such kind of
places the highway department have placed the signboards.
But sometimes it may not too possible to view that kind of signboards and
there is a chance for accidents. So there is an utmost need to design a system which
can control the speed of vehicles. Here we are designing a speed control system for
vehicles which can intimate the driver about the zones and limit speed of the vehicle
automatically.
Not following traffic signals- We cross the junctions even on a red light
manoeuvring our way.
Jaywalking is a normal thing for people; please understand that its very
difficult to apply brakes in a split second if someone just emerges in front of your
vehicle.
Dangerous lane shifting- Not a single car or bike ever gave any indication
before changing lanes. Further, the government has marked lanes on every road for
people to drive in the lanes and not between the lanes.
Overtaking from the left please be advised that nobody looks to the left and
expects anyone overtaking from there. This is a blind spot and a cause for accidents
Not a single pillion rider was wearing a helmet on a two wheelers. Helmets
have been made compulsory only for YOUR protection. It is for the safety of the
wearer. Even during low speed collusion a person can be badly injured if he is not
wearing a helmet. To know more about how motorcycle helmets saves lives read this
post.
Seat belts- I hardly saw people wearing a seatbelt. During a crash any object
not tied to the car becomes a projectile, including humans. A seatbelt saves you from
becoming a projectile.
Bikes try to overtake from all directions; even in fast moving traffic, they try to
wriggle their way in front of cars / large vehicles from small gaps. This is very
dangerous and in case the car/ large vehicle is unable to apply brakes, a small nick on a
high speed, can dis-balance a 2 wheeler causing a serious accident.
In our project we can monitor the vehicle speed and implements and action
when the vehicle is detected to be exceeding the speed displayed in the speed display
(sign) boards. The speed display boards are working as per the highway speed limiting
protocol. The driver should take great attention on the speed of the vehicle especially
when driving through busy junctions, railway crossings, school and college zones etc.
The citizens are ought to obey the speed enforcement rules in order to avoid the
accidents, any violation in this are considered as a greater offence. Traffic Police are
authorized to check every vehicle and take actions against the violation. We also
monitor the gas leakages, vibrations and also the alcohol level of the driver and make
the vehicle stop if any of the above parameters are detected. We have also
implemented a GSM system in order to respond immediately through an SMS service
by including the location of the vehicle using GPS.
CHAPTER -2
BACKGROUND
2.1 BACKGROUND OF INTERSECTION TRAFFIC CONTROL
DEVICES.
Intersection traffic control devices are comprised of signs, signals, roundabouts
or pavement markings that can be placed alongside the intersection. They are used to
move vehicles and pedestrians safely and efficiently, consequently preventing
collisions by providing the right-of-way principle assignment. The Federal Highway
Administration periodically publishes recommendations on how to setup specific
control devices in its manual on Uniform Traffic Control Devices (MUTCD) [6], thus
ensuring safety by standardizing operations. The most extensively used devices for
current traffic control include traffic signals, stop signs and roundabouts. These are
explained in this section.
The control device should fulfil a need: Each device must have a specific
purpose for the safe and efficient operation of traffic flow. The superfluous devices
should not be used.
It should command attention from the road users: This affects the design of
signs. For commanding attention, proper visibility should be there. Also the sign
should be distinctive and clear. The sign should be placed in such a way that the driver
requires no extra effort to see the sign.
It should convey a clear, simple meaning: Clarity and simplicity of message
is essential for the driver to properly understand the meaning in short time. The use of
colour, shape and legend as codes becomes important in this regard. The legend should
be kept short and simple so that even a less educated driver could understand the
message in less time.
Road users must respect the signs: Respect is commanded only when the
drivers are conditioned to expect that all devices carry meaningful and important
messages. Overuse, misuse and confusing messages of devices tend the drivers to
ignore them.
The control device should provide adequate time for proper response from
the road users: This is again related to the design aspect of traffic control devices. The
sign boards should be placed at a distance such that the driver could see it and gets
sufficient time to respond to the situation. For example, the STOP sign which is always
placed at the stop line of the intersection should be visible for at least one safe stopping
sight distance away from the stop line
There is several hundreds of traffic signs available covering wide variety of traffic
situations. They can be classified into three main categories.
Regulatory signs: These signs require the driver to obey the signs for the
safety of other road users.
Warning signs: These signs are for the safety of oneself who is driving and
advice the drivers to obey these signs.
Informative signs: These signs provide information to the driver about the
facilities available ahead, and the route and distance to reach the specific destinations
CHAPTER -3
LITERATURE SURVEY
The main motive behind this paper is to reduce these reckless accidents for
which we propose a system that governs and controls the speed of the vehicle without
any direct inconvenience to the driver. There are instances where the speed of the
automobile is beyond the expected speed limit or the driver does not obey the traffic
signals. Thus we are using optical character recognition algorithm by placing a camera
inside the vehicle and this camera will recognize the speed signs along the roads, thus
compares the vehicle speed and control the speed of the vehicle if it does not obey the
speed limits or exceeding the speed. With India reporting as many as 1.34 lakh
fatalities in road accidents every year, a vast 70 per cent of them being due to drunken
driving, questions are now being raised on whether the mushrooming growth of liquor
vends along the highways is responsible for costing precious lives in an untimely
manner.14% of accidents are due to gas leakages . So in order to monitor all these
from inside a car, our project mainly includes real time sensors like GAS, ALCOHOL,
IR and Vibration sensor. These sensors are used for continuous monitoring of the
alcohol levels or gas leakages if any inside the car.
CHAPTER 4
BLOCK DIAGRAM
4.1 BLOCK DIAGRAM
We can monitor the vehicle speed and implements and action when the vehicle
is detected to be exceeding the speed displayed in the speed display (sign) boards. The
speed display boards are working as per the highway speed limiting protocol. The
driver should take great attention on the speed of the vehicle especially when driving
through busy junctions, railway crossings, school and college zones etc. The citizens
are ought to obey the speed enforcement rules in order to avoid the accidents, any
violation in this are considered as a greater offence. Traffic Police are authorized to
check every vehicle and take actions against the violation. We also monitor the gas
leakages, vibrations and also the alcohol level of the driver and make the vehicle stop if
any of the above parameters are detected. We have also implemented a GSM system in
order to respond immediately through an SMS service by including the location of the
vehicle using GPS.
This project is mainly for cars, for making them more intelligent and provides a
better drive safe system. By using Raspberry pi 3 this system becomes more reliable,
effective and efficient for avoiding accidents on roads. There are very few systems that
are developed for detection and controlling the vehicle without the involvement of
human. In this paper we are proposing a prototype which controls the vehicle speed by
recognizing the speed signs that are setup along the roads and also continuously
monitor various parameters that lead to accidents. The main components of this system
are Raspberry pi3, Pi Camera and few sensors like Alcohol, Gas, Infrared and a
Vibration sensor, GSM module and a GPS receiver to find out the location of the
vehicle.
CHAPTER 5
HARDWARE DESCRIPTION
5.1 RASPBERRY PI 3
5.1.1 INTRODUCTION
The Raspberry Pi 3 Model B is the third generation Raspberry Pi. This powerful credit-
card sized single board computer can be used for many applications and supersedes the
original Raspberry Pi Model B+ and Raspberry Pi 2 Model B. Whilst maintaining the
popular board format the Raspberry Pi 3 Model-B brings you a more powerful
processer, 10x faster than the first generation Raspberry Pi. Additionally it adds
wireless LAN & Bluetooth connectivity making it the ideal solution for powerful
connected designs.
5.1.2 SPECIFICATIONS
PROCESSOR Broadcom BCM2387 chipset.
5.1.3 CONNECTORS
Ethernet 10/100 BaseT Ethernet socket
Video Output HDMI (rev 1.3 & 1.4Composite RCA (PAL and
NTSC)
Audio Output Audio Output 3.5mm jack, HDMIUSB 4 x USB
2.0
Memory Card Slot Push/pull Micro SDIO
Camera Connector 15-pin MIPI Camera Serial Interface (CSI-2)
5.2 PI CAM
5.2.1 INTRODUCTION
The Raspberry Pi Camera v2 is the new official camera board released by the
Raspberry Pi Foundation. The Raspberry Pi Camera Module v2 is a high quality 8
megapixel Sony IMX219 image sensor custom designed add-on board for Raspberry
Pi, featuring a fixed focus lens. The Raspberry Pi Zero now comes complete with a
camera port! Using the new Raspberry Pi Zero Camera Adapter, you can now use a
Raspberry Pi camera to your Zero. It's capable of 3280 x 2464 pixel static images, and
also supports 1080p30, 720p60 and640x480p90 video. It attaches to Pi by way of one
of the small sockets on the board upper surface and uses the dedicated CSI interface,
designed especially for interfacing to cameras.
5.2.2 FEATURES:
5.2.3 SPECIFICATIONS
Image Sensor : Sony IMX 219 PQ CMOS image sensor in a fixed-focus
module.
Resolution: 8-megapixel
Still picture resolution :3280 x 2464
Max image transfer rate: 1080p: 30fps (encode and decode)
720p: 60fps
5.3.2 FEATURES:
5V DC or AC circuit.
Requires heater voltage.
Operation Temperature: -10 to 70 degrees C.
Heater consumption: less than 750mW.
Dimensions: 16.8mm diameter, 9.3 mm height without the pins.
5.3.3 DESCRIPTION
This is a simple-to-use liquefied petroleum gas (LPG) sensor, suitable for sensing LPG
(composed of mostly propane and butane) concentrations in the air. The MQ-6 can
detect gas concentrations anywhere from 200 to 10000ppm. This sensor has a high
sensitivity and fast response time. The sensors output is an analog resistance. The
drive circuit is very simple; all you need to do is power the heater coil with 5V, add a
load resistance, and connect the output to an ADC. MQ-6 gas sensor can detect kinds
of flammable gases, especially has high sensitivity to LPG (propane). It is a kind of low-
cost sensor for many applications.
5.3.4CAUTIONS
1. Following conditions must be prohibited
1.1 Exposed to organic silicon steam sensing material will lose sensitivity and never
recover if the sensor absorbs organic silicon steam. Sensors must avoid exposing to
silicon bond, fixtures, silicon latex, putty or plastic contain silicon environment.
1.2 High Corrosive gas if the sensors are exposed to high concentration corrosive gas
(such as H2 S, SOX , Cl2, HCl etc.), it will not only result in corrosion of sensors
structure, also it cause sincere sensitivity attenuation.
1.3 Alkali, Alkali metals salt, halogen pollution .The sensors performance will be
changed badly if sensors be sprayed polluted by alkali metals salt especially brine, or
are exposed to halogen such as fluorine.
1.4 Touch water Sensitivity of the sensors will be reduced when spattered or dipped in
water.
1.5 Freezing do avoid icing on sensors surface, otherwise sensing material will be
broken and lost sensitivity.
1.6 Applied higher voltage Applied voltage on sensor should not be higher than
stipulated value, even if the sensor is not physically damaged or broken, it causes
down-line or heater damaged, and bring on sensors sensitivity characteristic changed
badly.
1.7 Voltage on wrong pins For 6 pins sensor, Pin 2&5 is heating electrodes, Pin
(1,3)/(4,6) are testing electrodes (Pin 1 connects with Pin 3, while Pin 4 connects with
Pin 6).If apply voltage on Pin 1&3 or 4&6, it will make lead broken; and no signal
putout if apply on pins 2&4. Fig8. Lead sketch .
2.1 Water Condensation Indoor conditions, slight water condensation will influence
sensors performance lightly. However, if water condensation on sensors surface and
keep a certain period, sensors sensitive will be decreased.
2.2 Used in high gas concentration No matter the sensor is electrified or not, if it is
placed in high gas concentration for long time, sensors characteristic will be affected.
If lighter gas sprays the sensor, it will cause extremely damage.
2.3 Long time storage the sensors resistance will drift reversibly if its stored for long
time without electrify, this drift is related with storage conditions. Sensors should be
stored in airproof bag without volatile silicon compound. For the sensors with long
time storage but no electrify, they need long galvanic aging time for stability before
using.
When a mobile subscriber roams into a new location area (new VLR), the VLR
automatically determines that it must update the HLR with the new location
information, which it does using an SS7 Location Update Request Message. The
Location Update Message is routed to the HLR through the SS7 network, based on the
global title translation of the IMSI that is stored within the SCCP Called Party Address
portion of the message. The HLR responds with a message that informs the VLR
whether the subscriber should be provided service in the new location.
DEPARTMENT OF ECE, ALIET Page 18
COLLISION AVOIDANCE AND DRIVE SAFE SYSTEM
When a user dials a GSM mobile subscriber's MSISDN, the PSTN routes the
call to the Home MSC based on the dialled telephone number. The MSC must then
query the HLR based on the MSISDN, to attain routing information required to route
the call to the subscribers' current location.
The MSC stores global title translation tables that are used to determine the
HLR associated with the MSISDN. When only one HLR exists, the translation tables
are trivial. When more than one HLR is used however, the translations become
extremely challenging; with one translation record per subscriber (see the example
below). Having determined the appropriate HLR address, the MSC sends a Routing
Information Request to it.
When the HLR receives the Routing Information Request, it maps the MSISDN to the
IMSI, and ascertains the subscribers' profile including the current VLR at which the
subscriber is registered. The HLR then queries the VLR for a Mobile Station Roaming
Number (MSRN). The MSRN is essentially an ISDN telephone number at which the
mobile subscriber can currently be reached. The MSRN is a temporary number that is
valid only for the duration of a single call.
The HLR generates a response message, which includes the MSRN, and sends
it back across the SS7 network to the MSC. Finally, the MSC attempts to complete the
call using the MSRN provided.
GSM has been the backbone of the phenomenal success in mobile telecoms over
the last decade. Now, at the dawn of the era of true broadband services, GSM
continues to evolve to meet new demands. One of GSM's great strengths is its
international roaming capability, giving consumers a seamless service. This has been a
vital driver in growth, with around 300 million. In the Americas, today's 7 million
subscribers are set to grow rapidly, with market potential of 500 million in population,
due to the introduction of GSM 800, which allows operators using the 800 MHz band
to have access to GSM technology too
General Packet Radio System (GPRS), Enhanced Data GSM Environment (EDGE),
and Universal Mobile Telecommunications Service (UMTS).
GSM security issues such as theft of service, privacy, and legal interception
continue to raise significant interest in the GSM community. The purpose of this portal
is to raise awareness of these issues with GSM security.
The mobile communications has become one of the driving forces of the
digital revolution. Every day, millions of people are making phone calls by pressing a
few buttons. Little is known about how one person's voice reaches the other person's
phone that is thousands of miles away. Even less is known about the security measures
and protection behind the system. The complexity of the cell phone is increasing as
people begin sending text messages and digital pictures to their friends and family. The
cell phone is slowly turning into a handheld computer. All the features and
advancements in cell phone technology require a backbone to support it. The system
has to provide security and the capability for growth to accommodate future
enhancements. General System for Mobile Communications, GSM, is one of the many
solutions out there. GSM has been dubbed the "Wireless Revolution" and it doesn't
take much to realize why GSM provides a secure and confidential method of
communication.
Scalability
Micro transactions/Micropayments compatibility
Content channel neutrality (heterogeneous networks, unicast/multicast/broadcast etc.)
Possibility of DRM
Consumer anonymity.
5.4.3 ARCHITECTURE
The GSM network can be divided into three broad parts. The Mobile
Station is carried by the subscriber. The Base Station subsystem controls the
radio link with the Mobile Station. The Network Subsystem, the main part of
which is the Mobile services Switching Centre (MSC), performs the switching
of calls between the mobile and fixed network users. The Mobile Station and
the Base Station subsystem communicate across the Um interface, also known
as the air interface or radio link. The Base Station Subsystem communicates
with the Mobile service Switching Centre across the A interface.
Allows users to send and receive calls and receive other subscriber services
Encoded network identification details- key kick and A3,A5 and A8 algorithms
Can be moved from phone to phone-contains key information to activate the phone
By inserting the SIM card into another GSM cellular phone, the user is able to receive
calls at that phone, make calls from that phone.
Capacity increases
Reduced RF transmission power and longer battery life
International roaming capability
Better security against fraud
Encryption capability for information security and privacy
Compatibility with ISDN, leading to wider range of services.
Here we are using micro controller. It has antenna which is in the form of wire.
It has external slot for SIM allocation. We can keep any network SIM which is a GSM
model. It wants external power supply; this is given by using adaptor which supports
9v and 2A. It has two LEDs for indication of power and network signalling
respectively. Power LED emits light continuously. Network signalling LED, at starting
blinks fatly and after sometime it starts blinking slowly like single blink per minute.
This indicates the SIM got signal according to its network. Then it can send message to
any network
Capacitors
100F/25v for +12v
Step down transformer
230v / 12v- 0 -12v/ 500mA Transformer
Diodes: 1N4007
A diode can be used as rectifier. There are various types of diodes. However,
semiconductor diodes are very popularly used as rectifiers. A semiconductor diode is a
solid-state device consisting of two elements is being an electron emitter or cathode,
the other an electron collector or anode. Since electrons in a semiconductor diode can
flow in one direction only-form emitter to collector-the diode provides the unilateral
conduction necessary for rectification. The rectified Output is filtered for smoothening
the DC, for this purpose capacitor is used in the filter circuit. The filter capacitors are
usually connected in parallel with the rectifier output and the load. The AC can pass
through a capacitor but DC cannot, the ripples are thus limited and the output becomes
smoothed. When the voltage across the capacitor plates tends to rise, it stores up
energy back into voltage and current. Thus, the fluctuation in the output voltage is
reduced considerable
5.5.5 Features
Output Current up to 1A
Output Voltages of 5, 6, 8, 9, 10, 12, 15, 18, 24V
Thermal Overload Protection
Short Circuit Protection
Output Transistor Safe Operating Area Protection
The LM7805 is simple to use. You simply connect the positive lead of
your unregulated DC power supply (anything from 9VDC to 24VDC) to the
Input pin, connect the negative lead to the Common pin and then when you turn
on the power, you get a 5 volt supply from the Output pin.
5.6.1INTRODUCTION
In current technology scenario, monitoring of gases produced is very important.
From home appliances such as air conditioners to electric chimneys and safety systems
at industries monitoring of gases is very crucial. Gas sensors are very important part
of such systems. Small like a nose, gas sensors spontaneously react to the gas present,
thus keeping the system updated about any alterations that occur in the concentration
of molecules at gaseous state. The gas sensor can have certain constant pressure value
when pressure of the wheel reducing the beyond the constant value, it will sent a
signal to the processor then buzzer sound will indicate the low pressure in tier tubes. .
When a gas interacts with this sensor, it is first ionized into its constituents and
is then adsorbed by the sensing element. This adsorption creates a potential difference
on the element which is conveyed to the processor unit through output pins in form of
current. The gas sensor module consists of a steel exoskeleton under which a sensing
element is housed. This sensing element is subjected to current through connecting
leads.
This current is known as heating current through it, the gases coming close to
the sensing element get ionized and are absorbed by the sensing element. This changes
the resistance of the sensing element which alters the value of the current going out of
it.
5.6.4 FEATURES
5.6.5 SPECIFICATIONS
The receiver uses the messages it receives to determine the transit time of each
message and computes the distance to each satellite. These distances along with the
satellites locations are used with the possible aid of trilateration, to compute the
position of the receiver. This position is then displayed, with a moving map display or
latitude and longitude. Many GPS units show derived information such as direction
and speed, calculate from position changes.
Three satellites might seem enough to solve for position since space has three
dimensions and a position near the Earth's surface can be assumed. However, even a
very small clock error multiplied by the very large speed of light , the speed at which
satellite signals propagate results in a large positional error. Therefore receivers use
four or more satellites to solve for both the receiver's location and time. Although four
satellites are required for normal operation, fewer apply in special cases. If one
variable is already known, a receiver can determine its position using only three
satellites. Some GPS receivers may use additional clues or assumptions (such as
reusing the last known altitude, or including information from the vehicle computer) to
give a less accurate (degraded) position when fewer than four satellites are visible.
For automobiles and other near-earth vehicles, the correct position of the GPS
receiver is the intersection closest to the Earth's surface. For space vehicles, the
intersection farthest from Earth is the correct one .The correct position for the GPS
receiver is also on the intersection with the surface of the sphere corresponding to the
fourth satellite.
The above figure indicates the GPS MODEM. It is manufactured at Taiwan. It has
antenna named as GPS ANTENNA which is connected externally. It also wants
additional adaptor for power supply.
The adaptor gives 9v and 2A. It consists of a switch for on and off purpose.
The GPS antenna provides 1575.42MHz frequency for signal grasping and it wants
3v-6v for operation.
5.7.5 Applications
1. Science
2. Transportation
5.8 RELAY
5.8.1 INTRODUCTION
NO normally open. The contacts are open until the coil of the relay is
energised, whereupon they are closed to complete the outside circuit.
NC - normally closed. The contacts are closed until the coil of the relay is
energised, whereupon they are opened to break the outside circuit, switching it
off.
Many relays have multiple contacts, half of which are NO and half NC.
Most relays are designed for PCB mounting but you can solder wires directly to the
pins providing you take care to avoid melting the plastic case of the relay.
On/Off Control: Example: Air Conditioning control, used to limit and control a high power
load, such as a compressor.
Limit Control Example: Motor Speed Control, used to disconnect a motor if it runs slower or
faster than the desired speed .
Logic Operation: Example: Test Equipment, used to connect the instrument to a number of
testing points on the device under test
5.9 DISPLAY
5.9.1 INTRODUCTION
5.9.2MEASUREMENTS OF PERFORMANCE
Luminance is measured in candelas per square meter (cd/m2 also called a Nit).
Aspect ratio is the ratio of the horizontal length to the vertical length. Monitors
usually have the aspect ratio 4:3, 5:4, 16:10 or 16:9.
Viewable image size is usually measured diagonally, but the actual widths and
heights are more informative since they are not affected by the aspect ratio in the
same way. For CRTs, the viewable size is typically 1 in (25 mm) smaller than the
tube itself.
Display resolution is the number of distinct pixels in each dimension that can be
displayed. For a given display size, maximum resolution is limited by dot pitch.
Dot pitch is the distance between sub-pixels of the same color in millimetres. In
general, the smaller the dot pitch, the sharper the picture will appear.
Refresh rate is the number of times in a second that a display is illuminated.
Maximum refresh rate is limited by response time.
Response time is the time a pixel in a monitor takes to go from active (white) to
inactive (black) and back to active (white) again, measured in milliseconds. Lower
numbers mean faster transitions and therefore fewer visible image artefacts.
Contrast ratio is the ratio of the luminosity of the brightest color (white) to that of
the darkest color (black) that the monitor is capable of producing.
Power consumption is measured in watts.
Delta-E: Color accuracy is measured in delta-E; the lower the delta-E, the more
accurate the color representation. A delta-E of below 1 is imperceptible to the
human eye. Delta-Es of 2 to 4 are considered good and require a sensitive eye to
spot the difference.
Viewing angle is the maximum angle at which images on the monitor can be
viewed, without excessive degradation to the image. It is measured in degrees
horizontally and vertically.
5.9.3 FEATURES
SIZE
The size of a display is usually by monitor manufacturers given by the
diagonal, i.e. the distance between two opposite screen corners. This method of
measurement is inherited from the method used for the first generation of CRT
television, when picture tubes with circular faces were in common use The estimation
of the monitor size by the distance between opposite corners does not take into account
the display aspect ratio, so that for example a 16:9 21-inch (53 cm) widescreen display
has less area, than a 21-inch (53 cm) 4:3 screen. The 4:3 screen has dimensions of
16.8 in 12.6 in (43 cm 32 cm) and area 211 sq. in (1,360 cm2), while the
widescreen is 18.3 in 10.3 in (46 cm 26 cm), 188 sq. in (1,210 cm2).
ASPECTS RATIO
Computer monitors had a 4:3 aspect ratio and some had 5:4
RESOLUTION
The resolution for computer monitors has increased over time. Major display
manufacturers had released 3840x2160 resolution displays.
Some monitors will also switch themselves off after a time period on standby.
rotates in one direction. We change the logic bits as 0, 1 then current flow is Vcc to
motor negative after that motor negative to positive and then flows to ground. Then
motor rotate in opposite direction. If we give logic bits 1, 1 then Vcc and ground are
short. So motor does not rotate. If we give logic bits 0, 0 then motor does not start.
Because two pins are given to zero.
5.10.3 FEATURES
5.11 IR SENSORS
5.11.1 Introduction
They are the modern technology used to pick up an area of the light
spectrum which the eyes are not capable of seeing; they also known
as thermography, infrared detectors are used in construction, public service and
science.
The infrared sensors emit and/or receive the infrared waves in the form of the
heat, while most the infrared sensors transmit and receive infrared waves, some can
receive them only; these types of infrared sensors are known as Passive Infrared
Sensors (PIR sensors) or motion detectors .
The infrared detectors are the pyro-electric sensors which detect the light
spectrums infrared wavelength , They are usually emitters as well , They can be made
of a phototransistor , photodiode , or photo resistor as these are basically the same
device , They have many uses and they are essential to the transference of infrared
light .
5.11.2 IR LED
Here the 5v is applied to IR LED via 330 ohms resistor in forward bias; the IR
LED emits constant IR light in the free space. The light is focused on the photo diode
kept at opposite to the IR LED, connected in reverse bias in series with 10 k ohms
resistor. The junction is connected to the port P1.0 of Microcontroller. When the IR
light is focused on the photo diode that maintains very low resistance due to that the
P1.0 maintains low i.e. 0 V. When any obstruction is there in between IR LED and
photo diode, there is no IR focused on the photo diode that maintains very high
resistance due to that the port maintains high signal i.e. 5V (bit-1)
Like this we are connected 8 sensors for port 1 (P1.0 to P1.7). These 8 sensors
are organized in 4 rows of each 2 sensors.
5.11.3 Photodiode
A photodiode is a type of photo detector capable of converting light into either
current or voltage, depending upon the mode of operation. Photodiodes are similar to
regular semiconductor diodes except that they may be either exposed (to detect
vacuum UV or X-rays) or packaged with a window or optical fibre connection to allow
light to reach the sensitive part of the device. Many diodes designed for use
specifically as a photodiode will also use a PIN junction rather than the typical PN
junction.
5.11.7Working Mechanism
An IR sensor is basically a device which consists of a pair of an IR LED and a
photodiode which are collectively called a photo-coupler or an opto-coupler. The IR
LED emits IR radiation, reception and/or intensity of reception of which by the
photodiode dictates the output of the sensor. Now, there are so many ways by which
the radiation may or may not be able to reach the photodiode. Lets discuss a few types
of IR sensors as below.
1. Direct Incidence
We may hold the IR LED directly in front of the photodiode, such that almost
all the radiation emitted, reaches the photodiode. This creates an invisible line of IR
radiation between the IR LED and the photodiode. Now, if an opaque object is placed
obstructing this line, the radiation will not reach the photodiode and will get either
reflected or absorbed by the obstructing object. This mechanism is used in object
counters and burglar alarms.
2. Indirect Incidence
High school physics taught us that black colour absorbs all radiation, and the
colour white reflects all radiation. We use this very knowledge to build our IR sensor.
If we place the IR LED and the photodiode side by side, close together, the radiation
from the IR LED will get emitted straight in the direction to which the IR LED is
pointing towards, and so is the photodiode, and hence there will be no incidence of the
radiation on the photodiode. Please refer to the right part of the illustration given below
for better understanding. But, if we place an opaque object in front the two, two cases
occur:
3. Reflective Surface
If the object is reflective, (White or some other light colour), then most of the radiation
will get reflected by it, and will get incident on the photodiode. For further
understanding, please refer to the left part of the illustration below.
4. Non-Reflective Surface
If the object is non-reflective, (Black or some other dark colour), then most of the
radiation will get absorbed by it, and will not become incident on the photodiode. It is
similar to there being no surface (object) at all, for the sensor, as in both the cases, it
does not receive any radiation.
5.11.8 Advantages
Infrared detectors has the ability to be applied to a large area, they are operating
in the real time. They pick up the movement, so, they are very useful in a variety of
circumstance. They are used by many fire departments and they help the fire fighters to
see through the smoke.
Infrared detectors can receive the infrared light which is irradiated from both
living and non-living objects which is very important for many of the applications
that infrared sensors are used for.
Infrared sensors can detect the infrared light from far distances over a large
area, they detect the movement, making them ideal for the security purposes, and they
help the humans see what the other devices do not allow them to see, such as
the leaks in underground pipes.
5.11.9 Applications
Infrared detectors are used in a wide variety of applications, they can be used in
any situation that requires thermal energy detection, and they are most used in the
conjunction with an infrared emitter to transfer the infrared light.
Infrared detectors are used as motion detectors to open the doors, track the
objects, or activate specific systems based on the thermal energy which is irradiated
from the people, the animals and moving objects.
Infrared detectors are used in night-vision applications, laser range
finding and heat-seeking missiles, Television remotes emit infrared light to change the
channels and the television itself has a built-in infrared sensor to receive the remotes
signals.
511.10 Features
Very low supply current
Photo detector and preamplifier in one package
Internal filter for PCM frequency
Supply voltage: 2.5 V to 5.5 V
Improved immunity against ambient light
CHAPTER 6
SOFTWARE DESCRIPTION
6.1 PYTHON
6.1.1 INTRODUCTION
JAVA:
Python programs are generally expected to run slower than Java programs, but
they also take much less time to develop. Python programs are typically 3-5 times
shorter than equivalent Java programs. This difference can be attributed to Python's
built-in high-level data types and its dynamic typing. For example, a Python
programmer wastes no time declaring the types of arguments or variables, and Python's
powerful polymorphic list and dictionary types, for which rich syntactic support is built
straight into the language, find a use in almost every Python program. Because of the
run-time typing, Python's run time must work harder than Java's. For example, when
evaluating the expression a+b, it must first inspect the objects a and b to find out their
type, which is not known at compile time. It then invokes the appropriate addition
operation, which may be an overloaded user-defined method. Java, on the other hand,
can perform an efficient integer or floating point addition, but requires variable
declarations for a and b, and does not allow overloading of the + operator for instances
of user-defined classes.
For these reasons, Python is much better suited as a "glue" language, while
Java is better characterized as a low-level implementation language. In fact, the two
together make an excellent combination. Components can be developed in Java and
combined to form applications in Python; Python can also be used to prototype
components until their design can be "hardened" in a Java implementation. To support
this type of development, a Python implementation written in Java is under
development, which allows calling Python code from Java and vice versa. In this
implementation, Python source code is translated to Java byte code (with help from a
run-time library to support Python's dynamic semantics).
JAVASCRIPT :
PERL :
Python and Perl come from a similar background (UNIX scripting, which both
have long outgrown), and sport many similar features, but have a different philosophy.
Perl emphasizes support for common application-oriented tasks, e.g. by having built-in
regular expressions, file scanning and report generating features. Python emphasizes
support for common programming methodologies such as data structure design and
object-oriented programming, and encourages programmers to write readable (and thus
maintainable) code by providing an elegant but not overly cryptic notation. As a
consequence, Python comes close to Perl but rarely beats it in its original application
domain; however Python has an applicability well beyond Perl's niche.
TCL :
that Tcl's one redeeming quality is the Tk toolkit. Python has adopted an interface to Tk
as its standard GUI component library.
Tcl 8.0 addresses the speed issues by providing a byte code compiler with
limited data type support, and adds namespaces. However, it is still a much more
cumbersome programming language.
SMALL TALK :
Perhaps the biggest difference between Python and Smalltalk is Python's more
"mainstream" syntax, which gives it a leg up on programmer training. Like Smalltalk,
Python has dynamic typing and binding, and everything in Python is an object.
However, Python distinguishes built-in object types from user-defined classes, and
currently doesn't allow inheritance from built-in types. Smalltalk's standard library of
collection data types is more refined, while Python's library has more facilities for
dealing with Internet and WWW realities such as email, HTML and FTP.
C++ :
Almost everything said for Java also applies for C++, just more so: where
Python code is typically 3-5 times shorter than equivalent Java code, it is often 5-10
times shorter than equivalent C++ code! Anecdotal evidence suggests that one Python
programmer can finish in two months what two C++ programmers can't complete in a
year. Python shines as a glue language, used to combine components written in C++.
For Windows users (and also those of you with Mac OS X) the tool of choice for
writing a Raspberry Pi OS image to SD card is SD Formatter, from the SD
Association. With the card inserted into your computers card reader, and ensuring you
have the correct Drive letter selected in the drop down menu, open the Option menu
and select Full (Erase) and On. This ensures that the full capacity of the storage card
will be available.
To write the disk image, use Win32DiskImager, available from Source forge.
You may need to run with administrator privileges. Select the correct drive letter for
your SD card, browse to the image file and click Write to commence the process.
Win32DiskImager will inform you when the data has been written.
If writing the disk image seems too much hassle or is beyond your abilities, it is
possible to purchase SD cards with Raspbian pre-installed.
With Raspbian installed, youll need to login with the following credentials:
Username: pi
Password: raspberry
For other operating systems, check the documentation to find the default login
credentials.
Remember that the password will not be displayed as you type it; there are no
Windows-style * symbols representing the letters. Instead, it will appear that you
havent entered a password. This is a security feature in Linux to prevent people
guessing the length of your passphrase. Just type the password regardless.
Sudo raspi-config
6.4 Install Raspbian, XBMC, Risc OS, OpenElec & ArchLinux Easily
With NOOBS.
For a simpler, more streamlined install of the more popular Raspberry Pi
distros such as Raspbian, ArchLinux, XBMC and OpenElec media centres, as well as
Risc OS and Pidora you can employ NOOBS, the New out Of Box Software
installation system.
With the Raspberry Pi booted into the NOOBS interface, you can choose your
operating system(s).
For instance, if you want to use your Raspberry Pi as a media centre, then
you might use NOOBS to install XBMC or (the better option, in my opinion)
OpenElec.
Find the Image File field, and browse to the folder where you will be saving
your SD card image; in the Device box, select the drive letter of the SD card,
and after confirming both are correct, click Read to begin the cloning,
following any on-screen instructions. Give the process time to complete before
proceeding.
Should you need to revert the SD card back to its perfect state later on, youll
need to remove all partitions (WIN+R to launch Disk Management, right-click the SD
DEPARTMENT OF ECE, ALIET Page 56
COLLISION AVOIDANCE AND DRIVE SAFE SYSTEM
card and select Delete) before restoring the image. You might also reformat using SD
Formatter, as explained above.
Again using Win32DiskImager, browse for the image file, set the Device drive
letter and then click Write. Once the process is complete, your SD card will be
reverted to the perfect configuration you worked on earlier, and your Raspberry Pi
should be ready to put to use once more.
One thing is clear about the Raspberry Pi: it relies on the SD card to on extent
or another. As such, understanding how to use this type of media with the little
computer is vital.
PYTESSERACT:
It will recognize and read the text present in images. It can read all image types
- png, jpeg, gif, tiff, bmp etc. Its widely used to process everything from scanned
documents.
DEPARTMENT OF ECE, ALIET Page 57
COLLISION AVOIDANCE AND DRIVE SAFE SYSTEM
Installation:
Requirements:
USAGE:
In Python Script:
import Image
CHAPTER 7
Enhanced Safety:
The most important advantage that a collision avoidance system will bring to
the table is an enhanced sense of safety. This isnt just crucial for your driver; its
crucial for pedestrians, bicyclists, and other drivers on the road as well. Collision
avoidance systems will use radar and video technologies to minimize the likelihood of
accidents, thus creating a safer road for anyone who traverses it.
Reduced Expenses:
An accident can be a frightening experience for all who are involved, and it can
result in damage to both vehicles and people. In addition, it can substantially reduce the
efficiency of your operation. When you use a collision avoidance system, you can rely
on your technology to prevent accidents from occurring. This keeps everybody safe,
prevents damage to company vehicles, and ensures that the driver stays on track.
Protection of property: If people know they are being taped, they are less likely
to engage in damaging or dangerous activities with your vehicle. This can protect your
car from vandalism and theft. In the case of corporate vehicles, it reduces liability as
people are less likely to mess with your company fleet.
Improved safety: Since monitoring drivers with a camera system helps increase
accountability, it also improves safety by extension. Drivers will be more likely to obey
traffic laws and avoid dangerous activities, such as drinking while driving
7.2 APPLICATIONS
Can control over speed vehicles
Can stop drunk drivers
Can detect any kind of internal gas leakage
Can prevent collisions
Used to find out the location of the vehicle with a SMS notification
immediately after any kind of accident
CHAPTER 8
8.3 CONCLUSION
We will limit the speed of the car according to the sign boards that are placed
on the roads and also continuously scan for various parameters like alcohol, gas and
also scan for any obstacle and stop the vehicle if any accident occurs. We also send a
sms alert whenever any kind of accident occurs. If accident happened, by using
vibration sensors we are able to found out on which side the impact occurred. After
collecting all information which is stored in internal memory, C send this data to
emergency services like ambulance unit via SMS using GSM modem.
Road edge and barrier detection with steer assist helps the driver avoid
accidental road departures. The technology detects if the car is about to drive off the
road and autonomously applies steering torque to bring the vehicle back on track. A
forward-looking camera and radar cooperate to monitor the road edge and different
kinds of road barriers. The technology acts immediately if the driver shows signs of
unintentionally drifting too close to the edge.
BIBLOGRAPHY:
[1] A Velocity Control Strategy for Vehicular Collision Avoidance System Mingyuan
Bian, Keqiang Li, Dafeng Jin and Xiaomin Lian State Key Lab of Automotive Safety
and Energy Tsinghua University Beijing 100084, P.R.China bmy@tsinghua.edu.cn.
[2] Sensored Car , 2009 Second International Conference on Computer and Electrical
Engineering , Mrs.Bhavna Ambudkar Department of Electronics Padmashree
Dr.D.Y.Patil Institute of Engineering & Technology, Pimpri , Pune-411018.,
Maharashtra, India Email: bhavnada@yahoo.co.in
[3] Real-time crash avoidance system on crossroads based on 802.11 devices and GPS
receivers , Proceedings of the IEEE ITSC 2006 2006 IEEE Intelligent Transportation
Systems Conference Toronto, Canada, September 17-20, 2006 , Samer Ammoun
Fawzi Nashashibi Claude Laurgeau.
[6] Traffic Road Sign Detection and Recognition for Automotive Vehicles ,
International Journal of Computer Applications (0975 8887) Volume 120 No.24,
June 2015 , Md. Safaet Hossain , Zakir Hyder - Department of Electrical Engineering
and Computer Science North South University, Dhaka Bangladesh.
APPENDIX 1
CODE:
camera.awb_gains = g
time.sleep(2)
return
#-----------------------------------------------------
def capture():
camera.start_preview()
time.sleep(1)
camera.capture('source.jpg')
camera.stop_preview()
#camera.close()
def preprocess():
img = cv2.imread('source.jpg') #---Read colour image
grey = cv2.cvtColor(img,cv2.COLOR_BGR2GRAY) #--- Convert into grayscale
cv2.imwrite('grey.jpg',grey)
kernel = cv2.getStructuringElement(cv2.MORPH_ELLIPSE,(3,3)) #---Get kernal of
cross shaped with size of 3x3
dilated = cv2.dilate(grey,kernel,iterations=2) #---Apply kernel and iterations on
threshold for dilation
cv2.imwrite('dilate.jpg',dilated)
eroded = cv2.erode(dilated,kernel,iterations=2) #---Apply kernel and iterations on
threshold for erosion
cv2.imwrite('erode.jpg',eroded)
smooth = cv2.blur(eroded,(3,3))
cv2.imwrite('smooth.jpg',smooth)
#thresh =
cv2.adaptiveThreshold(grey,255,cv2.ADAPTIVE_THRESH_GAUSSIAN_C,cv2.TH
RESH_BINARY,11,4)
#thresh =
cv2.adaptiveThreshold(smooth,255,cv2.ADAPTIVE_THRESH_MEAN_C,cv2.THRE
SH_BINARY,11,4)
#(thresh,im_bw) = cv2.threshold(grey,50,255,cv2.THRESH_BINARY |
cv2.THRESH_OTSU)
ret,thresh = cv2.threshold(dilated,80,255,cv2.THRESH_BINARY)
print("return value: {}".format(ret))
cv2.imwrite('thresh.jpg',thresh)
return
#------------------------------------------------------
def ocr_do():
#image_file = 'fonts_test.png'
txt = ""
"""
inpath = 'thresh.jpg'
outpath = 'thresh.crop.jpg'
print ("waiting for cropping.....")
crop.process_image(inpath, outpath)
time.sleep(1)
"""
image_file = 'thresh.jpg'
im = Image.open(image_file)
DEPARTMENT OF ECE, ALIET Page 67
COLLISION AVOIDANCE AND DRIVE SAFE SYSTEM
while(cread!='\n'):
cread = adrport.read()
mstr += cread
print mstr
return mstr
#-----------------------------------------------------
def displl():
flag = False
qry = "GPGGA"
lat = ''
lon = ''
while(flag == False):
data = gpsread()
i = data.find(qry)
if(i==0):
flag = True
print("GPGGA string identified...")
n = data.find('N')
e = data.find('E')
#print(n,e)
lat = data[n-10:n+1]
lon = data[e-10:e+1]
lat = re.sub('[^A-Z.0-9]',' ',lat)
lon = re.sub('[^A-Z.0-9]',' ',lon)
print("latitude: {} longitude: {}".format(lat,lon))
return lat,lon
#------------ SMS Sending Loop ---------------------
def smstx(msg,num):
lat,lon = displl()
adrport.write('AT+CMGF=1\r\n')
time.sleep(0.5)
adrport.write('AT+CMGS="{}"\r\n'.format(num))
#print('AT+CMGS="%s"\r\n' %dnum)
time.sleep(0.5)
adrport.write("{}.Location is latitude:{}, longitude:{} -Vehicle security
system.\r\n".format(msg,lat,lon))
time.sleep(0.5)
adrport.write(ascii.ctrl('z'))
time.sleep(8)
return
#-----------------------------------------------------
def signdetect():
print ("Taking Picture...\n")
capture() #--Capture Image with Specified Settings ---------------
print ("Preprocessing image for OCR...")
time.sleep(2)
preprocess()
print ("Running OCR...\n")
time.sleep(2)
DEPARTMENT OF ECE, ALIET Page 69
COLLISION AVOIDANCE AND DRIVE SAFE SYSTEM