尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2767
WEB-BASED ONLINE EMBEDDED SECURITY SYSTEM AND ALERTNESS
VIA SOCIAL MEDIA
MEHARAJ BEGUM.R[1], PRIYADHARSHINI.K [2], SWATHI.K[3], ANUSHA.P.M [4], SOFIYA JENIFER.J[5]
Students[1, 2, 3], Assistant Professor[4, 5], Dept. of Electronics and Communication Engineering, Parisutham
Institute of Technology & Science, Tamil Nadu, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - This paper presents about providing more
security to BANK from intruder. Now a day protecting the
BANK from the intruder became very difficult. Sofarproviding
the security, plenty of technology has been developed. These
existing technologies cannot give the security properly. So we
have introduced new technology to provide a moresecurityby
using rotatable camera.
Key Words: HMM algorithm, Raspberry pi, Optical flow,
Median filter, Kalman filter, Cmeans, Canny edge
detection, Whatsapp
1. INTRODUCTION
Security is most important in every place; without
security it leads to greater loss; especially providingsecurity
to the bank is must to save all of our money; the motivation
of this paper is to provide the better security to the bank by
using new technology with latest equipment called
Raspberrypi and it follows Hidden Markov model algorithm.
1.1 Background
The featuresandcolorsofcomputervisual detection
and vision always been an area of interest for popular
companies can invest in costly high-level technology and
machinery, but with the advent of cheap and small
sized(debit-card computers such as the Raspberry Pi has a
greater role in society. The RaspberryPimicrocomputer was
developed for the sole purpose of commercial and
academicals use. The applications of any sort of computer
vision or feature detection software in general are
numerous. Examples: people tracking at shopping mall,
surveillance systems with face recognition,helpingrobotsto
pick up objects and to navigate, are monitoring the
equipment. The idea behind this is to form a foundation of
knowledge regarding embedded systems, visual detectionof
objects and the basics of real-time image processing (or
other features), upon which it is possible to add some layers
of complexity and have to undergo further research with
which to modulate projects ranging from less cost and face
recognition or small real-time systems for simple object
detection to high complex systems such as intelligent
machines with self-learning robots with the capability of
visual feedback.
1.2 Aim of thesis
The main goal is to write a python application, with
the help of Open CV libraries, which can be used on an
embedded system, specifically a Raspberry Pi to:
 Capture the coloured blobs from web camera feed
 considering these blobs are objects, and save them
in memory to keep track of their coordinates and
other properties
 Attempt to confirm the linear and realistic
movement of these objects
 Send helpful message about these objects and its
movement continuously as datagram’s (using UDP
protocol of network sockets) to any softwarewhich
makes information requests.
1.2.1 Existing system
In current state CCTV camera is used in all places
especially in Bank for securitypurposeandCCTVcamera has
been checked to find the movement or fault in the bank.
Consider the situation like the intruder is coming to bank by
today night to steal the money and this can be detected by
tomorrow morning only and then we will be checking the
CCTV camera to find the intruder.
1.2.1.1 Disadvantage
 It fails to provide the high security
 It requires large memory space to store the images
 It fails to protect the money from the intruder.
1.2.2 Proposed system
This proposed system is to provide the proper
security to the bank by using raspberry pi kit and it follows
the HMM algorithm .web camera captures the movement of
object and send those images to thebank managerandtothe
police station via whatsapp for security alertness .and it
helps to catch the intruder before he departure from the
bank with money.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2768
2. BLOCK DIAGRAM
Fig.1 Description of block diagram:
The block diagram consist of various components
such as web camera ,raspberrypikitanddisplaymonitorand
power unit and the process is shown in the figure 1. The
camera is to monitors the bank and captures the images of it
and these images are given as input to the video acquisition
block, this will convert the images into video format.Andthis
video is given as input to the frame separation part; this will
convert the video into number of frames and the output of
the frame separation block is given as input to the raspberry
pi kit. Here it follows one algorithm called hidden Markov
model (HMM) all theimageprocessingprocessisdonebythis
algorithm. it gets the frames and it takes the two frames at
first, in that the first frame is considered as reference image
and the second frame is called as processing image, here the
changes can be detected by cmeans, that is it compares the
two frames(reference and processing images) and finds the
changes in it ,this process is done by cmeans.
And the output of the cmeans is given as input to the
various filters .at first the noise in this image can be reduced
by median filter and output of this filter is given to the
kalman filter. This filter used to find the pixel variation by
comparing the two frames. Then this output is given to the
canny edge detection; this detectstheedgesoftheimage.And
the back ground subtraction (bgs) is used to fix thethreshold
value which can be used to detect the movement changes
when it exceeds the threshold value. And the optical flow is
used to track the movement of the object flow (direction of
movement). Thefinal detected image can send via whatsapp
for alertness. This can be done by whatsapp library which
will make communication between python language and the
high level language used in the whatsapp. And the display
monitoris connected to the raspberrypi to view the detected
image. The raspberry pi requires power unit of five volt and
2amps.and it requires LAN/WIFI connection to send the
image via whatsapp and open CV contains all the functions
related to the raspberry pi and pi kit works by rasbian OS.
2.1 Hardware used:
Raspberrypi kit, web camera, power unit
2.2 Software used:
Geany, python (language), HMM (algorithm), open CV,
whatsapp library.
3. COMPONENTS DESCRIPTION:
3.1 Raspberry Pi
Raspberry Pi is a better choice when taking into
account of relatively high performance requirements of
image processing and the equipment currently available for
image processing, are the relatively inexpensive and
powerful embedded platform. Raspberrypi has the
availability of the Pi camera module,whichcancapturehigh-
clarity video as well as snaps which are another factor for
chosen RaspberryPi and this requires a continues updating
of Raspberrypi firmwaretothelatestversion.It worksbetter
with OpenCV based applications. Even though using the
officially supported camera module, It can be accessed
through the V4L APIs and MMAL and it is accepted by the
numerous third-party libraries, It can use any USB web-
camera.
 It works by rasbian OS
 It act as micro controller as well as micro processor
 It is inbuilt with blue tooth, WIFI/LAN
 It has ARM11 processor
 It has 1gb RAM
 It can accept 32 GB memory card
3.2 Web camera
Continuous monitoring and pixel support of 16
mega pixels
3.3 video acquisition
The video capture process is to convert the analog
image into the digital image by the analog to digital
converter. Next, the chrominance is been demodulated to
produce color difference video data. It converts the images
into video format.
3.4 Background subtraction
It is used for detecting the moving objects from
the difference between the current frame and a reference
frame by fixing the threshold. It helps to fix the threshold
to track the movement.
3.5 Hidden Markov model (HMM)
In a hidden Markov model, the state is not been
directly visible, but the output whichdependentonthestate,
is visible. Hidden Markov models are especially used for the
application such as speech, gesture recognition, part-of-
speech tagging, musical score following, partial discharges
and bioinformatics. A hidden Markov model can be
considered as generalization of a mixture model where the
hidden variables are considered for observation.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2769
3.6 Median filter
Median filtering technique often used to remove
noise from the images such noise reduction is a typical pre-
processing step to develop the resultsforfurther processing.
3.7 Fuzzy c-means
(FCM) is a data clustering technique in which a
dataset is grouped into n clusters with every data point.This
is used to compare the two images to find the changes.
3.8 Kalman filtering
It is also known as linear quadratic
estimation (LQE) filter .which is used to find the pixel
variation by comparing the reference and processing image.
The Kalman filter has variety of applicationsintechnology.A
common application is for guidance, navigation, and
control of vehicles, particularly aircraft and spacecraft.
Furthermore, the Kalman filter is a widely applied concept
in time series.
3.9 Canny edge detector
It was developed by Jhon F.Canny in 1986 it is
an edge detection operator that uses a multi-
stage algorithm to detect a wide range of edges in images.
3.10 Optical flow
It detects the motion of objects, surfaces, and edges
in a visual scene caused by the relative motion between an
observer and a scene. It is also called as scene flow. Which
detects the flow of movement.The idea of optical flow was
created by the American psychologist James J. Gibson in the
1940.
3.11 OpenCV (Open Source Computer Vision Library)
It is an open source computer vision and machine
learning software library. OpenCV was developed toprovide
a common infrastructure for computer vision applications
and to accelerate the use of machine perception in the
commercial products. It has C++, C, Python, Java and
MATLAB interfaces and supports Windows, Linux, Android
and Mac OS. It has all the functions relatedto raspberrypi kit.
Advantages
 It provides high security
 It requires very less memory space to store the
images
 Less cost
 Small in size
Applications
 Bank
 Jewellery shop
 Expensive exhibition
4. CONCLUSION
In this paper a web camera is used to detect the
movement of object by using raspberrypi kit and sending
alertness messages via whatsapp and thus provides the
perfect security.
ACKNOWLEDGEMENT
The authors are gratefullyacknowledgingthesupport extent
by the respective institute in bringing out this article.
We also thankful to faculties of Electronics and
Communication Engineering department
REFERENCES
[1] ‘Motion video sensor in the compressed domain'. SCS
Euro media Conf., Valencia, Spain, 2001.
[2] GieseandT.Poggio (2003) Neural mechanisms for the
Recognition of Biological movement sand action.
Nature Reviews Neuro science 4:179–192.
[3] “Neural Networks for 3D Motion Detection From a
Sequence of Image Frames,” Chan Lai Wan and Yip
Pak Ching, IEEE, computer Science Dept., The Chinese
University of Hong Kong, 1991.
[4] Ferster and K.D. Miller. (2000). Neural mechanisms of
orientation Selectivity in the visual cortex. Annual
Review of Neuroscience, 23:441–471.
BIOGRAPHIES
Meharaj Begum.R pursuing her B.E degree in Electronics
and Communication Engineering in Parisutham Institute of
Technology and Science.
Priyadharshini.K pursuing her B.E degree in Electronics
and Communication Engineering in Parisutham Institute of
Technology and Science.
Swathi.K pursuing her B.E degree in Electronics and
Communication Engineering in Parisutham Institute of
Technology and Science.
Anusha.P.M completed her ME in VLSI Design in Kings
College of Engineering and completed her BE in Electronics
and Communication Engineering in Periyar Maniyammai
University. She is working as Assistant Professor in
Parisutham Institute of Technology and Science.
Sofiya Jenifer.J completed her ME in VLSI Design in Kings
College of Engineering and completed her BE in Electronics
and Communication Engineering in Anjalai Ammal
Mahalingam EngineeringCollege.Sheisworkingas Assistant
Professor in Parisutham Instituteof TechnologyandScience.

More Related Content

What's hot

Two Step Design for Personal Authentication Using Finger Vein Recognition and...
Two Step Design for Personal Authentication Using Finger Vein Recognition and...Two Step Design for Personal Authentication Using Finger Vein Recognition and...
Two Step Design for Personal Authentication Using Finger Vein Recognition and...
IJTET Journal
 
B.tech.cse r15 regulations_3rd-4th_year-course_structure_and_syllabus
B.tech.cse r15 regulations_3rd-4th_year-course_structure_and_syllabusB.tech.cse r15 regulations_3rd-4th_year-course_structure_and_syllabus
B.tech.cse r15 regulations_3rd-4th_year-course_structure_and_syllabus
BharathiMudiyam
 
RRD Tool and Network Monitoring
RRD Tool and Network MonitoringRRD Tool and Network Monitoring
RRD Tool and Network Monitoring
sweta dargad
 
Automated Security Surveillance System in Real Time World
Automated Security Surveillance System in Real Time WorldAutomated Security Surveillance System in Real Time World
Automated Security Surveillance System in Real Time World
IRJET Journal
 
A Framework for Wireless LAN Monitoring and Its Applications 
A Framework for Wireless LAN Monitoring and Its Applications A Framework for Wireless LAN Monitoring and Its Applications 
A Framework for Wireless LAN Monitoring and Its Applications 
2012engg
 
Architecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring SystemArchitecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring System
sweta dargad
 
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
cscpconf
 
Surveillance using Video Analytics
Surveillance using Video AnalyticsSurveillance using Video Analytics
Surveillance using Video Analytics
idescitation
 
IRJET- Data Hiding in Digital Image using Steganography
IRJET-  	  Data Hiding in Digital Image using Steganography IRJET-  	  Data Hiding in Digital Image using Steganography
IRJET- Data Hiding in Digital Image using Steganography
IRJET Journal
 
Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Implementation of vehicle ventilation system using node mcu esp8266 for remot...Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Journal Papers
 
Software engineering model based smart indoor localization system using deep-...
Software engineering model based smart indoor localization system using deep-...Software engineering model based smart indoor localization system using deep-...
Software engineering model based smart indoor localization system using deep-...
TELKOMNIKA JOURNAL
 
Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...
Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...
Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...
IOSR Journals
 
IRJET- Optimization of Surveillance Camera for Low Cost Storage Device
IRJET- Optimization of Surveillance Camera for Low Cost Storage DeviceIRJET- Optimization of Surveillance Camera for Low Cost Storage Device
IRJET- Optimization of Surveillance Camera for Low Cost Storage Device
IRJET Journal
 
OBSERVATIONAL DISCRETE LINES FOR THE DETECTION OF MOVING VEHICLES IN ROAD TRA...
OBSERVATIONAL DISCRETE LINES FOR THE DETECTION OF MOVING VEHICLES IN ROAD TRA...OBSERVATIONAL DISCRETE LINES FOR THE DETECTION OF MOVING VEHICLES IN ROAD TRA...
OBSERVATIONAL DISCRETE LINES FOR THE DETECTION OF MOVING VEHICLES IN ROAD TRA...
ijcseit
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET Journal
 
Online Intrusion Alert Aggregation with Generative Data Stream Modeling
Online Intrusion Alert Aggregation with Generative Data Stream  ModelingOnline Intrusion Alert Aggregation with Generative Data Stream  Modeling
Online Intrusion Alert Aggregation with Generative Data Stream Modeling
IJMER
 
Snmp based network monitoring system
Snmp based network monitoring systemSnmp based network monitoring system
Snmp based network monitoring system
sweta dargad
 
Dq3211691171
Dq3211691171Dq3211691171
Dq3211691171
IJMER
 
IRJET- Collision Avoidance based on Obstacle Detection using OpenCV
IRJET-  	  Collision Avoidance based on Obstacle Detection using OpenCVIRJET-  	  Collision Avoidance based on Obstacle Detection using OpenCV
IRJET- Collision Avoidance based on Obstacle Detection using OpenCV
IRJET Journal
 

What's hot (19)

Two Step Design for Personal Authentication Using Finger Vein Recognition and...
Two Step Design for Personal Authentication Using Finger Vein Recognition and...Two Step Design for Personal Authentication Using Finger Vein Recognition and...
Two Step Design for Personal Authentication Using Finger Vein Recognition and...
 
B.tech.cse r15 regulations_3rd-4th_year-course_structure_and_syllabus
B.tech.cse r15 regulations_3rd-4th_year-course_structure_and_syllabusB.tech.cse r15 regulations_3rd-4th_year-course_structure_and_syllabus
B.tech.cse r15 regulations_3rd-4th_year-course_structure_and_syllabus
 
RRD Tool and Network Monitoring
RRD Tool and Network MonitoringRRD Tool and Network Monitoring
RRD Tool and Network Monitoring
 
Automated Security Surveillance System in Real Time World
Automated Security Surveillance System in Real Time WorldAutomated Security Surveillance System in Real Time World
Automated Security Surveillance System in Real Time World
 
A Framework for Wireless LAN Monitoring and Its Applications 
A Framework for Wireless LAN Monitoring and Its Applications A Framework for Wireless LAN Monitoring and Its Applications 
A Framework for Wireless LAN Monitoring and Its Applications 
 
Architecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring SystemArchitecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring System
 
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
 
Surveillance using Video Analytics
Surveillance using Video AnalyticsSurveillance using Video Analytics
Surveillance using Video Analytics
 
IRJET- Data Hiding in Digital Image using Steganography
IRJET-  	  Data Hiding in Digital Image using Steganography IRJET-  	  Data Hiding in Digital Image using Steganography
IRJET- Data Hiding in Digital Image using Steganography
 
Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Implementation of vehicle ventilation system using node mcu esp8266 for remot...Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Implementation of vehicle ventilation system using node mcu esp8266 for remot...
 
Software engineering model based smart indoor localization system using deep-...
Software engineering model based smart indoor localization system using deep-...Software engineering model based smart indoor localization system using deep-...
Software engineering model based smart indoor localization system using deep-...
 
Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...
Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...
Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...
 
IRJET- Optimization of Surveillance Camera for Low Cost Storage Device
IRJET- Optimization of Surveillance Camera for Low Cost Storage DeviceIRJET- Optimization of Surveillance Camera for Low Cost Storage Device
IRJET- Optimization of Surveillance Camera for Low Cost Storage Device
 
OBSERVATIONAL DISCRETE LINES FOR THE DETECTION OF MOVING VEHICLES IN ROAD TRA...
OBSERVATIONAL DISCRETE LINES FOR THE DETECTION OF MOVING VEHICLES IN ROAD TRA...OBSERVATIONAL DISCRETE LINES FOR THE DETECTION OF MOVING VEHICLES IN ROAD TRA...
OBSERVATIONAL DISCRETE LINES FOR THE DETECTION OF MOVING VEHICLES IN ROAD TRA...
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
 
Online Intrusion Alert Aggregation with Generative Data Stream Modeling
Online Intrusion Alert Aggregation with Generative Data Stream  ModelingOnline Intrusion Alert Aggregation with Generative Data Stream  Modeling
Online Intrusion Alert Aggregation with Generative Data Stream Modeling
 
Snmp based network monitoring system
Snmp based network monitoring systemSnmp based network monitoring system
Snmp based network monitoring system
 
Dq3211691171
Dq3211691171Dq3211691171
Dq3211691171
 
IRJET- Collision Avoidance based on Obstacle Detection using OpenCV
IRJET-  	  Collision Avoidance based on Obstacle Detection using OpenCVIRJET-  	  Collision Avoidance based on Obstacle Detection using OpenCV
IRJET- Collision Avoidance based on Obstacle Detection using OpenCV
 

Similar to Web-Based Online Embedded Security System And Alertness Via Social Media

IRJET - Gesture Controlled Home Automation using CNN
IRJET -  	  Gesture Controlled Home Automation using CNNIRJET -  	  Gesture Controlled Home Automation using CNN
IRJET - Gesture Controlled Home Automation using CNN
IRJET Journal
 
Classroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-PiClassroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-Pi
IRJET Journal
 
Secured Spy for Highly Secured Areas
Secured Spy for Highly Secured AreasSecured Spy for Highly Secured Areas
Secured Spy for Highly Secured Areas
IRJET Journal
 
IRJET- Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry PiIRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET- Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET Journal
 
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
IRJET Journal
 
IRJET- Smart Surveillance Cam using Face Recongition Alogrithm
IRJET-  	  Smart Surveillance Cam using Face Recongition AlogrithmIRJET-  	  Smart Surveillance Cam using Face Recongition Alogrithm
IRJET- Smart Surveillance Cam using Face Recongition Alogrithm
IRJET Journal
 
IRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually ImpairedIRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually Impaired
IRJET Journal
 
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET Journal
 
Comparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi TechnologyComparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi Technology
IRJET Journal
 
Human Action Recognition using Contour History Images and Neural Networks Cla...
Human Action Recognition using Contour History Images and Neural Networks Cla...Human Action Recognition using Contour History Images and Neural Networks Cla...
Human Action Recognition using Contour History Images and Neural Networks Cla...
IRJET Journal
 
IRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
IRJET- Implementation of Gender Detection with Notice Board using Raspberry PiIRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
IRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
IRJET Journal
 
IRJET- Real Time Video Surveillance Architecture for Secured City Automation
IRJET-  	  Real Time Video Surveillance Architecture for Secured City AutomationIRJET-  	  Real Time Video Surveillance Architecture for Secured City Automation
IRJET- Real Time Video Surveillance Architecture for Secured City Automation
IRJET Journal
 
S0102297102
S0102297102S0102297102
S0102297102
IOSR Journals
 
IRJET - Cardless ATM
IRJET -  	  Cardless ATMIRJET -  	  Cardless ATM
IRJET - Cardless ATM
IRJET Journal
 
IRJET- ROI based Automated Meter Reading System using Python
IRJET-  	  ROI based Automated Meter Reading System using PythonIRJET-  	  ROI based Automated Meter Reading System using Python
IRJET- ROI based Automated Meter Reading System using Python
IRJET Journal
 
Conceptual Framework for Anthropomorphic Simulation of Human Face for Interac...
Conceptual Framework for Anthropomorphic Simulation of Human Face for Interac...Conceptual Framework for Anthropomorphic Simulation of Human Face for Interac...
Conceptual Framework for Anthropomorphic Simulation of Human Face for Interac...
IRJESJOURNAL
 
IRJET- Pick and Place Robot for Color based Sorting
IRJET-  	  Pick and Place Robot for Color based SortingIRJET-  	  Pick and Place Robot for Color based Sorting
IRJET- Pick and Place Robot for Color based Sorting
IRJET Journal
 
IRJET- VISITX: Face Recognition Visitor Management System
IRJET-  	  VISITX: Face Recognition Visitor Management SystemIRJET-  	  VISITX: Face Recognition Visitor Management System
IRJET- VISITX: Face Recognition Visitor Management System
IRJET Journal
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
IJRTEMJOURNAL
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
journal ijrtem
 

Similar to Web-Based Online Embedded Security System And Alertness Via Social Media (20)

IRJET - Gesture Controlled Home Automation using CNN
IRJET -  	  Gesture Controlled Home Automation using CNNIRJET -  	  Gesture Controlled Home Automation using CNN
IRJET - Gesture Controlled Home Automation using CNN
 
Classroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-PiClassroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-Pi
 
Secured Spy for Highly Secured Areas
Secured Spy for Highly Secured AreasSecured Spy for Highly Secured Areas
Secured Spy for Highly Secured Areas
 
IRJET- Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry PiIRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET- Iot Based Home Visitor Monitoring System using Raspberry Pi
 
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
 
IRJET- Smart Surveillance Cam using Face Recongition Alogrithm
IRJET-  	  Smart Surveillance Cam using Face Recongition AlogrithmIRJET-  	  Smart Surveillance Cam using Face Recongition Alogrithm
IRJET- Smart Surveillance Cam using Face Recongition Alogrithm
 
IRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually ImpairedIRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually Impaired
 
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
 
Comparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi TechnologyComparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi Technology
 
Human Action Recognition using Contour History Images and Neural Networks Cla...
Human Action Recognition using Contour History Images and Neural Networks Cla...Human Action Recognition using Contour History Images and Neural Networks Cla...
Human Action Recognition using Contour History Images and Neural Networks Cla...
 
IRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
IRJET- Implementation of Gender Detection with Notice Board using Raspberry PiIRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
IRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
 
IRJET- Real Time Video Surveillance Architecture for Secured City Automation
IRJET-  	  Real Time Video Surveillance Architecture for Secured City AutomationIRJET-  	  Real Time Video Surveillance Architecture for Secured City Automation
IRJET- Real Time Video Surveillance Architecture for Secured City Automation
 
S0102297102
S0102297102S0102297102
S0102297102
 
IRJET - Cardless ATM
IRJET -  	  Cardless ATMIRJET -  	  Cardless ATM
IRJET - Cardless ATM
 
IRJET- ROI based Automated Meter Reading System using Python
IRJET-  	  ROI based Automated Meter Reading System using PythonIRJET-  	  ROI based Automated Meter Reading System using Python
IRJET- ROI based Automated Meter Reading System using Python
 
Conceptual Framework for Anthropomorphic Simulation of Human Face for Interac...
Conceptual Framework for Anthropomorphic Simulation of Human Face for Interac...Conceptual Framework for Anthropomorphic Simulation of Human Face for Interac...
Conceptual Framework for Anthropomorphic Simulation of Human Face for Interac...
 
IRJET- Pick and Place Robot for Color based Sorting
IRJET-  	  Pick and Place Robot for Color based SortingIRJET-  	  Pick and Place Robot for Color based Sorting
IRJET- Pick and Place Robot for Color based Sorting
 
IRJET- VISITX: Face Recognition Visitor Management System
IRJET-  	  VISITX: Face Recognition Visitor Management SystemIRJET-  	  VISITX: Face Recognition Visitor Management System
IRJET- VISITX: Face Recognition Visitor Management System
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls ChennaiCall Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
paraasingh12 #V08
 
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Tsuyoshi Horigome
 
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdfSELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
Pallavi Sharma
 
SPICE PARK JUL2024 ( 6,866 SPICE Models )
SPICE PARK JUL2024 ( 6,866 SPICE Models )SPICE PARK JUL2024 ( 6,866 SPICE Models )
SPICE PARK JUL2024 ( 6,866 SPICE Models )
Tsuyoshi Horigome
 
Call Girls In Lucknow 🔥 +91-7014168258🔥High Profile Call Girl Lucknow
Call Girls In Lucknow 🔥 +91-7014168258🔥High Profile Call Girl LucknowCall Girls In Lucknow 🔥 +91-7014168258🔥High Profile Call Girl Lucknow
Call Girls In Lucknow 🔥 +91-7014168258🔥High Profile Call Girl Lucknow
yogita singh$A17
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
Lubi Valves
 
My Airframe Metallic Design Capability Studies..pdf
My Airframe Metallic Design Capability Studies..pdfMy Airframe Metallic Design Capability Studies..pdf
My Airframe Metallic Design Capability Studies..pdf
Geoffrey Wardle. MSc. MSc. Snr.MAIAA
 
Cricket management system ptoject report.pdf
Cricket management system ptoject report.pdfCricket management system ptoject report.pdf
Cricket management system ptoject report.pdf
Kamal Acharya
 
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
nonods
 
MODULE 5 BIOLOGY FOR ENGINEERS TRENDS IN BIO ENGINEERING.pptx
MODULE 5 BIOLOGY FOR ENGINEERS TRENDS IN BIO ENGINEERING.pptxMODULE 5 BIOLOGY FOR ENGINEERS TRENDS IN BIO ENGINEERING.pptx
MODULE 5 BIOLOGY FOR ENGINEERS TRENDS IN BIO ENGINEERING.pptx
NaveenNaveen726446
 
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASICINTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
GOKULKANNANMMECLECTC
 
Intuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sdeIntuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sde
ShivangMishra54
 
Microsoft Azure AD architecture and features
Microsoft Azure AD architecture and featuresMicrosoft Azure AD architecture and features
Microsoft Azure AD architecture and features
ssuser381403
 
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
dulbh kashyap
 
CSP_Study - Notes (Paul McNeill) 2017.pdf
CSP_Study - Notes (Paul McNeill) 2017.pdfCSP_Study - Notes (Paul McNeill) 2017.pdf
CSP_Study - Notes (Paul McNeill) 2017.pdf
Ismail Sultan
 
The Differences between Schedule 40 PVC Conduit Pipe and Schedule 80 PVC Conduit
The Differences between Schedule 40 PVC Conduit Pipe and Schedule 80 PVC ConduitThe Differences between Schedule 40 PVC Conduit Pipe and Schedule 80 PVC Conduit
The Differences between Schedule 40 PVC Conduit Pipe and Schedule 80 PVC Conduit
Guangdong Ctube Industry Co., Ltd.
 
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Poonam Singh
 
🔥 Hyderabad Call Girls  👉 9352988975 👫 High Profile Call Girls Whatsapp Numbe...
🔥 Hyderabad Call Girls  👉 9352988975 👫 High Profile Call Girls Whatsapp Numbe...🔥 Hyderabad Call Girls  👉 9352988975 👫 High Profile Call Girls Whatsapp Numbe...
🔥 Hyderabad Call Girls  👉 9352988975 👫 High Profile Call Girls Whatsapp Numbe...
aarusi sexy model
 
🔥Independent Call Girls In Pune 💯Call Us 🔝 7014168258 🔝💃Independent Pune Esco...
🔥Independent Call Girls In Pune 💯Call Us 🔝 7014168258 🔝💃Independent Pune Esco...🔥Independent Call Girls In Pune 💯Call Us 🔝 7014168258 🔝💃Independent Pune Esco...
🔥Independent Call Girls In Pune 💯Call Us 🔝 7014168258 🔝💃Independent Pune Esco...
AK47
 
❣Unsatisfied Bhabhi Call Girls Surat 💯Call Us 🔝 7014168258 🔝💃Independent Sura...
❣Unsatisfied Bhabhi Call Girls Surat 💯Call Us 🔝 7014168258 🔝💃Independent Sura...❣Unsatisfied Bhabhi Call Girls Surat 💯Call Us 🔝 7014168258 🔝💃Independent Sura...
❣Unsatisfied Bhabhi Call Girls Surat 💯Call Us 🔝 7014168258 🔝💃Independent Sura...
hotchicksescort
 

Recently uploaded (20)

Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls ChennaiCall Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
 
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
 
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdfSELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
 
SPICE PARK JUL2024 ( 6,866 SPICE Models )
SPICE PARK JUL2024 ( 6,866 SPICE Models )SPICE PARK JUL2024 ( 6,866 SPICE Models )
SPICE PARK JUL2024 ( 6,866 SPICE Models )
 
Call Girls In Lucknow 🔥 +91-7014168258🔥High Profile Call Girl Lucknow
Call Girls In Lucknow 🔥 +91-7014168258🔥High Profile Call Girl LucknowCall Girls In Lucknow 🔥 +91-7014168258🔥High Profile Call Girl Lucknow
Call Girls In Lucknow 🔥 +91-7014168258🔥High Profile Call Girl Lucknow
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
 
My Airframe Metallic Design Capability Studies..pdf
My Airframe Metallic Design Capability Studies..pdfMy Airframe Metallic Design Capability Studies..pdf
My Airframe Metallic Design Capability Studies..pdf
 
Cricket management system ptoject report.pdf
Cricket management system ptoject report.pdfCricket management system ptoject report.pdf
Cricket management system ptoject report.pdf
 
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
 
MODULE 5 BIOLOGY FOR ENGINEERS TRENDS IN BIO ENGINEERING.pptx
MODULE 5 BIOLOGY FOR ENGINEERS TRENDS IN BIO ENGINEERING.pptxMODULE 5 BIOLOGY FOR ENGINEERS TRENDS IN BIO ENGINEERING.pptx
MODULE 5 BIOLOGY FOR ENGINEERS TRENDS IN BIO ENGINEERING.pptx
 
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASICINTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
 
Intuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sdeIntuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sde
 
Microsoft Azure AD architecture and features
Microsoft Azure AD architecture and featuresMicrosoft Azure AD architecture and features
Microsoft Azure AD architecture and features
 
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
 
CSP_Study - Notes (Paul McNeill) 2017.pdf
CSP_Study - Notes (Paul McNeill) 2017.pdfCSP_Study - Notes (Paul McNeill) 2017.pdf
CSP_Study - Notes (Paul McNeill) 2017.pdf
 
The Differences between Schedule 40 PVC Conduit Pipe and Schedule 80 PVC Conduit
The Differences between Schedule 40 PVC Conduit Pipe and Schedule 80 PVC ConduitThe Differences between Schedule 40 PVC Conduit Pipe and Schedule 80 PVC Conduit
The Differences between Schedule 40 PVC Conduit Pipe and Schedule 80 PVC Conduit
 
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
 
🔥 Hyderabad Call Girls  👉 9352988975 👫 High Profile Call Girls Whatsapp Numbe...
🔥 Hyderabad Call Girls  👉 9352988975 👫 High Profile Call Girls Whatsapp Numbe...🔥 Hyderabad Call Girls  👉 9352988975 👫 High Profile Call Girls Whatsapp Numbe...
🔥 Hyderabad Call Girls  👉 9352988975 👫 High Profile Call Girls Whatsapp Numbe...
 
🔥Independent Call Girls In Pune 💯Call Us 🔝 7014168258 🔝💃Independent Pune Esco...
🔥Independent Call Girls In Pune 💯Call Us 🔝 7014168258 🔝💃Independent Pune Esco...🔥Independent Call Girls In Pune 💯Call Us 🔝 7014168258 🔝💃Independent Pune Esco...
🔥Independent Call Girls In Pune 💯Call Us 🔝 7014168258 🔝💃Independent Pune Esco...
 
❣Unsatisfied Bhabhi Call Girls Surat 💯Call Us 🔝 7014168258 🔝💃Independent Sura...
❣Unsatisfied Bhabhi Call Girls Surat 💯Call Us 🔝 7014168258 🔝💃Independent Sura...❣Unsatisfied Bhabhi Call Girls Surat 💯Call Us 🔝 7014168258 🔝💃Independent Sura...
❣Unsatisfied Bhabhi Call Girls Surat 💯Call Us 🔝 7014168258 🔝💃Independent Sura...
 

Web-Based Online Embedded Security System And Alertness Via Social Media

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2767 WEB-BASED ONLINE EMBEDDED SECURITY SYSTEM AND ALERTNESS VIA SOCIAL MEDIA MEHARAJ BEGUM.R[1], PRIYADHARSHINI.K [2], SWATHI.K[3], ANUSHA.P.M [4], SOFIYA JENIFER.J[5] Students[1, 2, 3], Assistant Professor[4, 5], Dept. of Electronics and Communication Engineering, Parisutham Institute of Technology & Science, Tamil Nadu, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - This paper presents about providing more security to BANK from intruder. Now a day protecting the BANK from the intruder became very difficult. Sofarproviding the security, plenty of technology has been developed. These existing technologies cannot give the security properly. So we have introduced new technology to provide a moresecurityby using rotatable camera. Key Words: HMM algorithm, Raspberry pi, Optical flow, Median filter, Kalman filter, Cmeans, Canny edge detection, Whatsapp 1. INTRODUCTION Security is most important in every place; without security it leads to greater loss; especially providingsecurity to the bank is must to save all of our money; the motivation of this paper is to provide the better security to the bank by using new technology with latest equipment called Raspberrypi and it follows Hidden Markov model algorithm. 1.1 Background The featuresandcolorsofcomputervisual detection and vision always been an area of interest for popular companies can invest in costly high-level technology and machinery, but with the advent of cheap and small sized(debit-card computers such as the Raspberry Pi has a greater role in society. The RaspberryPimicrocomputer was developed for the sole purpose of commercial and academicals use. The applications of any sort of computer vision or feature detection software in general are numerous. Examples: people tracking at shopping mall, surveillance systems with face recognition,helpingrobotsto pick up objects and to navigate, are monitoring the equipment. The idea behind this is to form a foundation of knowledge regarding embedded systems, visual detectionof objects and the basics of real-time image processing (or other features), upon which it is possible to add some layers of complexity and have to undergo further research with which to modulate projects ranging from less cost and face recognition or small real-time systems for simple object detection to high complex systems such as intelligent machines with self-learning robots with the capability of visual feedback. 1.2 Aim of thesis The main goal is to write a python application, with the help of Open CV libraries, which can be used on an embedded system, specifically a Raspberry Pi to:  Capture the coloured blobs from web camera feed  considering these blobs are objects, and save them in memory to keep track of their coordinates and other properties  Attempt to confirm the linear and realistic movement of these objects  Send helpful message about these objects and its movement continuously as datagram’s (using UDP protocol of network sockets) to any softwarewhich makes information requests. 1.2.1 Existing system In current state CCTV camera is used in all places especially in Bank for securitypurposeandCCTVcamera has been checked to find the movement or fault in the bank. Consider the situation like the intruder is coming to bank by today night to steal the money and this can be detected by tomorrow morning only and then we will be checking the CCTV camera to find the intruder. 1.2.1.1 Disadvantage  It fails to provide the high security  It requires large memory space to store the images  It fails to protect the money from the intruder. 1.2.2 Proposed system This proposed system is to provide the proper security to the bank by using raspberry pi kit and it follows the HMM algorithm .web camera captures the movement of object and send those images to thebank managerandtothe police station via whatsapp for security alertness .and it helps to catch the intruder before he departure from the bank with money.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2768 2. BLOCK DIAGRAM Fig.1 Description of block diagram: The block diagram consist of various components such as web camera ,raspberrypikitanddisplaymonitorand power unit and the process is shown in the figure 1. The camera is to monitors the bank and captures the images of it and these images are given as input to the video acquisition block, this will convert the images into video format.Andthis video is given as input to the frame separation part; this will convert the video into number of frames and the output of the frame separation block is given as input to the raspberry pi kit. Here it follows one algorithm called hidden Markov model (HMM) all theimageprocessingprocessisdonebythis algorithm. it gets the frames and it takes the two frames at first, in that the first frame is considered as reference image and the second frame is called as processing image, here the changes can be detected by cmeans, that is it compares the two frames(reference and processing images) and finds the changes in it ,this process is done by cmeans. And the output of the cmeans is given as input to the various filters .at first the noise in this image can be reduced by median filter and output of this filter is given to the kalman filter. This filter used to find the pixel variation by comparing the two frames. Then this output is given to the canny edge detection; this detectstheedgesoftheimage.And the back ground subtraction (bgs) is used to fix thethreshold value which can be used to detect the movement changes when it exceeds the threshold value. And the optical flow is used to track the movement of the object flow (direction of movement). Thefinal detected image can send via whatsapp for alertness. This can be done by whatsapp library which will make communication between python language and the high level language used in the whatsapp. And the display monitoris connected to the raspberrypi to view the detected image. The raspberry pi requires power unit of five volt and 2amps.and it requires LAN/WIFI connection to send the image via whatsapp and open CV contains all the functions related to the raspberry pi and pi kit works by rasbian OS. 2.1 Hardware used: Raspberrypi kit, web camera, power unit 2.2 Software used: Geany, python (language), HMM (algorithm), open CV, whatsapp library. 3. COMPONENTS DESCRIPTION: 3.1 Raspberry Pi Raspberry Pi is a better choice when taking into account of relatively high performance requirements of image processing and the equipment currently available for image processing, are the relatively inexpensive and powerful embedded platform. Raspberrypi has the availability of the Pi camera module,whichcancapturehigh- clarity video as well as snaps which are another factor for chosen RaspberryPi and this requires a continues updating of Raspberrypi firmwaretothelatestversion.It worksbetter with OpenCV based applications. Even though using the officially supported camera module, It can be accessed through the V4L APIs and MMAL and it is accepted by the numerous third-party libraries, It can use any USB web- camera.  It works by rasbian OS  It act as micro controller as well as micro processor  It is inbuilt with blue tooth, WIFI/LAN  It has ARM11 processor  It has 1gb RAM  It can accept 32 GB memory card 3.2 Web camera Continuous monitoring and pixel support of 16 mega pixels 3.3 video acquisition The video capture process is to convert the analog image into the digital image by the analog to digital converter. Next, the chrominance is been demodulated to produce color difference video data. It converts the images into video format. 3.4 Background subtraction It is used for detecting the moving objects from the difference between the current frame and a reference frame by fixing the threshold. It helps to fix the threshold to track the movement. 3.5 Hidden Markov model (HMM) In a hidden Markov model, the state is not been directly visible, but the output whichdependentonthestate, is visible. Hidden Markov models are especially used for the application such as speech, gesture recognition, part-of- speech tagging, musical score following, partial discharges and bioinformatics. A hidden Markov model can be considered as generalization of a mixture model where the hidden variables are considered for observation.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2769 3.6 Median filter Median filtering technique often used to remove noise from the images such noise reduction is a typical pre- processing step to develop the resultsforfurther processing. 3.7 Fuzzy c-means (FCM) is a data clustering technique in which a dataset is grouped into n clusters with every data point.This is used to compare the two images to find the changes. 3.8 Kalman filtering It is also known as linear quadratic estimation (LQE) filter .which is used to find the pixel variation by comparing the reference and processing image. The Kalman filter has variety of applicationsintechnology.A common application is for guidance, navigation, and control of vehicles, particularly aircraft and spacecraft. Furthermore, the Kalman filter is a widely applied concept in time series. 3.9 Canny edge detector It was developed by Jhon F.Canny in 1986 it is an edge detection operator that uses a multi- stage algorithm to detect a wide range of edges in images. 3.10 Optical flow It detects the motion of objects, surfaces, and edges in a visual scene caused by the relative motion between an observer and a scene. It is also called as scene flow. Which detects the flow of movement.The idea of optical flow was created by the American psychologist James J. Gibson in the 1940. 3.11 OpenCV (Open Source Computer Vision Library) It is an open source computer vision and machine learning software library. OpenCV was developed toprovide a common infrastructure for computer vision applications and to accelerate the use of machine perception in the commercial products. It has C++, C, Python, Java and MATLAB interfaces and supports Windows, Linux, Android and Mac OS. It has all the functions relatedto raspberrypi kit. Advantages  It provides high security  It requires very less memory space to store the images  Less cost  Small in size Applications  Bank  Jewellery shop  Expensive exhibition 4. CONCLUSION In this paper a web camera is used to detect the movement of object by using raspberrypi kit and sending alertness messages via whatsapp and thus provides the perfect security. ACKNOWLEDGEMENT The authors are gratefullyacknowledgingthesupport extent by the respective institute in bringing out this article. We also thankful to faculties of Electronics and Communication Engineering department REFERENCES [1] ‘Motion video sensor in the compressed domain'. SCS Euro media Conf., Valencia, Spain, 2001. [2] GieseandT.Poggio (2003) Neural mechanisms for the Recognition of Biological movement sand action. Nature Reviews Neuro science 4:179–192. [3] “Neural Networks for 3D Motion Detection From a Sequence of Image Frames,” Chan Lai Wan and Yip Pak Ching, IEEE, computer Science Dept., The Chinese University of Hong Kong, 1991. [4] Ferster and K.D. Miller. (2000). Neural mechanisms of orientation Selectivity in the visual cortex. Annual Review of Neuroscience, 23:441–471. BIOGRAPHIES Meharaj Begum.R pursuing her B.E degree in Electronics and Communication Engineering in Parisutham Institute of Technology and Science. Priyadharshini.K pursuing her B.E degree in Electronics and Communication Engineering in Parisutham Institute of Technology and Science. Swathi.K pursuing her B.E degree in Electronics and Communication Engineering in Parisutham Institute of Technology and Science. Anusha.P.M completed her ME in VLSI Design in Kings College of Engineering and completed her BE in Electronics and Communication Engineering in Periyar Maniyammai University. She is working as Assistant Professor in Parisutham Institute of Technology and Science. Sofiya Jenifer.J completed her ME in VLSI Design in Kings College of Engineering and completed her BE in Electronics and Communication Engineering in Anjalai Ammal Mahalingam EngineeringCollege.Sheisworkingas Assistant Professor in Parisutham Instituteof TechnologyandScience.
  翻译: