INVISIBLE EYE:PERSONAL COMPUTER,WORKING,ADVANTAGES & DIS ADVANTAGES,APPLICATIONS,CONCLUSION



Personal Computer
A personal computer is a general-purpose computer whose size, capabilities, and original sale price make it useful for individuals, and is intended to be operated directly by an end- user with no intervening computer time-sharing models that allowed larger, more expensive minicomputer and mainframe systems to be used
by many people, usually at the same time.
Software applications for most personal computers include, but are not limited to, word processing, spreadsheets,databases, webbrowsers and e-mail clients, digital
media playback, games and many personal productivityand special-purpose software applications.Modern personal computers often have connections to the Internet, allowing access to the World Wide Web and a wide range of other resources. Personal computers may be connected to a local area network(LAN), either by a cable or a wireless connection. A personal computer may be a laptop computer or a desktop computer running an operating system such as Windows, Linux (and the various operating systems based on it), or Macintosh OS.
Early computer owners usually had to write their own programs to do anything useful with the machines, which even did not include an operating system. The very earliest microcomputers, equipped with a front panel,required hand-loading of a bootstrap program to load programs from external storage (paper tape, cassettes, or eventually diskettes). Before very long , automatic booting from permanent read-only memory became universal. Today's users have access to a wide range of commercial software, freeware and free and open-source software, which are provided in ready-to-run or ready-to-compile form. Software for personal computers, such as applications and video games, are typically developed and distributed independently from the hardware or OS manufacturers, whereas software for many mobile phones and other portable systems is approved and
distributed through a centralized online store.

Since the early 1990s, Microsoft operating systems and Intel hardware dominated much of the personal computer market, first with MS-DOS and then with Windows. Popular alternatives to Microsoft's Windows operating systems include Apple's OS X and free open-source Unix- like operating systems such as Linux and
BSD. AMD provides the major alternative to Intel's processors. ARM architecture processors now outnumber Intel's (and compatibles) in smart phones and tablets , that are also personal computers, outnumbering the traditional kind.

WORKING
Step1: user enters the password, if password entered is correct then the system starts else he is prompted to reenter the password.
Step2: If sensor sense any change or sense any motion, then an intrusion is detected. Else there is no intrusion.
Step3: If intrusion is detected, then relay triggered, stepper motor rotates the camera, it start recording and an email is sent to user

ADVANTAGES
Invisible Eye Security system solves many of the problems faced by the multiple camera based security system at an easily affordable cost.

The biggest advantage is that we can avoid having to wade through hours of footage of empty rooms.

One can also avoid having to install multiple cameras to cover a single room.
DIS ADVANTAGES
we have to deactivate the system while your shop is open
If the owner is out of network then message will not be sent.
APPLICATIONS
Use for home security systems.
Office security system
Bank security system
CONCLUSION
It is very secure security system as compare to present security system.
it solves many of the problems faced by the multiple Camera based security system.so we can use Invisible eyes instead of present security system.