SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 10, No. 6, December 2020, pp. 5932~5939
ISSN: 2088-8708, DOI: 10.11591/ijece.v10i6.pp5932-5939  5932
Journal homepage: http://ijece.iaescore.com/index.php/IJECE
Design and implement a smart system to detect intruders
and firing using IoT
Hussam Jawad Kadhim1
, Mohammed Jabbar Mohammed Ameen2
1
Collage of Science for Women, Department of Computer, University of Babylon, Iraq
2
Collage of Engineering, Department of Electrical Engineering, University of Babylon, Iraq
Article Info ABSTRACT
Article history:
Received Apr 6, 2020
Revised May 15, 2020
Accepted May 28, 2020
The security system is essential for occupants' convenience and protection
from intruders and fire. Theft and fire are the most important requirement for
the security system. The advancement of wireless sensor networks using IoTs
increased the features in a security system and play an important role in daily
life. In this paper, the proposed system is divided into two units.
The first one about security which use to take snapshots by a camera
whenever there is fire or intruders in the security zone and mail it to
the owner every three seconds by using Arduino configured with MATLAB
program. MATLAB program plays the main role to coordinate between
sensors and to turn on/off the cameras. The second unit is about controlling
the appliances and also the main door by using AVR microcontroller
configured by CVAVR software that connected with Bluetooth sensor and
controlled by a smartphone by using the implementation software built-up in
the smartphone. To arrival of the control unit, the user should send code from
the software implementation to the framework that use to turn on/off
the devices or open/close the door. This proposed system is designed and
implemented in details in this paper.
Keywords:
Appliance control system
AVR atmeg8
Communication system
IoT
Remote control
Security system
Copyright © 2020 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Hussam Jawad Kadhim,
Collage of Science for Women,
Department of Computer, University of Babylon,
60th street, Alhilla, Babylon, Iraq.
Email: hussamjwd@yahoo.com
1. INTRODUCTION
Nowadays the risk of fire and intruder has been increased. In general, the security system is defined
as a network of devices that contain a trigger and alarm. The features of the security system have been
increased with the advancement in the internet field. The concept of the internet of things (IoT) is introduced
where the appliances can communicate with humans [1-3].
Nowadays the Internet of Things is a fastly growing technology [4, 5]. Explain that IoT is consist of
a physical device, software, network, sensors, wired or unwired technology, etc. This is essentially due to
the instilling of sensors on them. These sensors are connected by wired and wireless networks using Internet
Protocol that link-up the Internet [6, 7]. Internet as aforesaid has become a part of the daily habit that most of
the people in different countries who have the incoming to it. These people have become contingent on
having an Internet connection in their daily lives to be able to really carry on with their life for some cause.
Because of the increasing risk of burglary and robbery and the busy lifestyle the technology of safety and
security system has been increased [8]. In [9] the author designs a smart system to detect intruders using
short message service, this system consists of a sensor circuit, controller, and receiver. When an intruder
passes through the PIR, SMS is sent to the mobile phone numbers.
In [10] Arduino configured with the gas module, motion sensor, laser sensor to detect intruders and
unwanted occurrences that controlled by Bluetooth when the owner indoor and GSM when the owner
Int J Elec & Comp Eng ISSN: 2088-8708 
Design and implement a smart system to detect intruders and firing using IOT (Hussam Jawad Kadhim)
5933
outdoor. [11] The author suggests two methods to apply the security system for the home. The first one uses
a Webcam. A mail is delivered to the owner whenever there is a motion in front of the camera. The second
one sends SMS. Also, the control of home appliances by code are very important so in [12, 13] the author
explain how to control home appliances using AVR microcontroller by the Bluetooth of smartphone.
In this paper, if an intruder or the fire occurred a snapshot is taken by the camera which connects
with the server and controlled by Matlab program which use SMTP protocol to send e-mail include a photo
of the fire for the first time or to the intruders which give an idea to the occupant about the case of the place
at that time. Also, for more safety, the door will be controlled automatically by sending a code from
the smartphone to the Bluetooth sensor which configured by AVR microcontroller and connected to a DC
motor to open or close the door and also to turn on/off the appliances.
2. RESEARCH METHOD
2.1. Arduino
Arduino is an open exporter stand that used to build an electronics circuits project. This platform
consists of a physical programmable circuit board as shown in Figure 1 and software, or (IDE) that works on
your computer and used to write down and transfer code to the physical board. This podium has become
a popular with world and used widely in electronics circuits because it does not need an independent piece of
hardware (called a programmer), like most previous programmable circuit boards. To programming
the Arduino board, you can plainly use USB-USB cable to upload the code. The programming language that
used with Arduino software is a simplified version of C++, making it easier to learn and programming [14].
Figure 1. Arduino platform
2.2. AVR Microcotroller
The AVR microcontroller has a CPU and ROM, RAM, I/O ports, and timer all embedded together
on a single chip as shown in Figure 2. So, the designer cannot annex any external I/O pins, memory, or timer
to it. The AVR with these facilities makes it perfect for many of applications which the cost and space are
critical. ATmega 8 is used in this project which provides 23 I/O lines, 512 bytes of EEPROM, 8 Kbytes of
System Programmable Flash, 1 KB of SRAM, and USART [15].
Figure 2. AVR microcontroller (Atmega8)
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 5932 - 5939
5934
2.3. CVAVR
Code Vision AVRis a software that is used to write the code for programming the AVR
microcontroller on Windows. To inject the code to the AVR microcontrooler SinaProg program is used.
The CVAVR is a very good Code Wizard that generates codes automatically [15].
2.4. MATLAB
MATLAB is a 4th
generation programming language and it used for numerical analysis. It includes
matrix calculations, running algorithms, data visualization, and creating user interfaces. MATLAB
environment as shown in Figure 3 allows developers to interface it with other programs in different
languages. MATLAB is used in many fields by engineers and scientists such as signal and image processing,
control systems for industry, communications, robotics, smart grid design [16].
Figure 3. Matlab programming
2.5. Smoke detector
Analogy Smoke Sensor or MQ2 module is sensitive to smoke and it has a protection resistor with an
adjustable resistor on board. It could be used for fire or smoke detection, also, it used in gas leakage detecting
equipment in family and industry. The resistance of the sensor changes as the concentricity of the target
smoke changes [17].
2.6. PIR sensor
PIR is a motion sensor and it used to detect whether a human has moved in the security zone or
through the sensor range. The PIR sensor as shown in Figure 4 is small, simple to use, low-power, cheap, and
doesn't wear out. Because of that why the PIR sensor found in the used systems in homes or businesses [18].
PIR used for many projects that need to detect intruders or when a person has left the security zone.
PIR sensors are low cost and low power, pretty rugged and have a wide lens range [19].
Figure 4. PIR sensor
2.7. Webcam
A webcam is a video camera used to flow its image in real-time by means of a personal computer to
the internet. When there are intruders or fire throw the security zone the camera takes a snapshot and sends it
to throw the network via systems such as the internet, and email as an attachment to the owner. A webcam is
generally built into computer hardware or connected by a USB cable [20].
2.8. E-mail or email
Electronic mail is the exchanging of digital messages by telecommunication between people using
digital devices such as mobile phones, computers, and tablets. Electronic mail first uses in the 1960s and by
the mid-1970s had taken the form now recognized as email [21]. Email systems required both the sender and
the recipient online to receive the snapshot at the same time.
Int J Elec & Comp Eng ISSN: 2088-8708 
Design and implement a smart system to detect intruders and firing using IOT (Hussam Jawad Kadhim)
5935
2.9. LCD
Liquid Crystal Display screen is an electronic display module as shown in Figure 5 and used in
various devices and circuits.16x2 LCD means it can display 16 characters per line and there are 2 lines.
Each character is displayed in a 5x7 pixel matrix. The command register stores the command directive given
to the LCD which predefined tasks like preface it, setting the cursor position, controlling a display, clearing
its screen, etc. [22].
Figure 5. LCD display
2.10. Relay
A relay is an electrical switch use dc input for receiving a signal and the output is AC to operate
appliances and other devices, so, in this project, the relay will receive the signal from microcontroller which
connects to the C-port and (NO) port will be connected to the AC device [23].
2.11. Bluetooth module
To remote control the AVR microcontroller over a short distance, the Bluetooth sensor is used to
receive data from the smartphone. HC-06 module is used and the connection pins are TX to TXD to send
data to the microcontroller and RX to RXD to receive data from the microcontroller, VCC with VCC for
power, and GND to GND for ground. For generality, use states the HC-06 is sufficient, as typically I want to
have a wireless UART joining to my devices from my smartphone [24, 25].
2.12. BTInterface
BT The software that is used to control the appliances is BTInterface and it is easy to install on
the smartphone from the android store, so, by using this software it will be possible to control all devices that
connected with the proposed system and used an ID for each device, so, to turn on/off any controlled device
just send the ID number from this application show in Figure 6.
Figure 6. Bluetooth interface in smart phone
3. RESULTS AND DISCUSSION
In this section the proposed system performance will evaluate, in the ability to turn on/off
appliances, open and close the door, receive a snapshot of fire or intruder in the email. Figure 7 shows
the proposed system.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 5932 - 5939
5936
Figure 7. Image of project
3.1. Configure the AVR microcontroller with the outdoor
The security system is designing for the outdoor by using AVR microcontroller configured with
a Bluetooth sensor as shown in Figure 8 and connected with a DC motor to open and close the door.
By sending a code from the smartphone to the sensor the microcontroller will match the code, if the code is
correct the outdoor will open and a welcome message will display in the LCD, else the outdoor will not be
opened. Open and close the outdoor using a code sent by a smartphone through the Bluetooth will allow
the occupant to easily controlling the door and also it will be secure.
Figure 8. Configured the AVR microcontroller
3.2. Configure the AVR microcontroller
The steps to configure the AVR microcontroller CVAVR software will be used and following
this steps:
1) To receive a signal from the smartphone application USART is used.
2) To display each case LCD will be configured.
3) Configure each Port that depends on the number received from the smartphone.
The microcontroller pins connecting as shown in Figure 9 and details below:
1) Connect Bluetooth module (HC-06) Rx to Tx of the AVR microcontroller and Tx of the Bluetooth sensor
to Rx of the AVR microcontroller, also, complete VCC-VCC and GND-GND.
2) Relay to PortB.4
3) AC device to Relay
4) PortB.0,.1, .2, .3 to the DC motor drive.
5) Turn on the software application (BTInterface) on the smartphone.
6) Connect to Bluetooth sensor HC-06.
7) Type the number of password (1234).
8) Press the terminal key and type the number which a sign in the configuration of the microcontroller for
each device, for example, No. 1 to close the door and 2 to open the door also 3 to switch on the light,
and 4 switches off the light.
The controlling of DC motor is done by giving a period to drive the DC motor for example 1000
msec to drive the DC motor and open the door, also the same time is given to drive the DC motor in
the opposite direction to close the door. The port B.4 connects to any appliances to controlling it by
the Bluetooth of the smartphone.
Int J Elec & Comp Eng ISSN: 2088-8708 
Design and implement a smart system to detect intruders and firing using IOT (Hussam Jawad Kadhim)
5937
Figure 9. The proposed syetm for the outdoor controlling
3.3. Configure the Arduino with MATLAB
First, start MATLAB and install Arduino packages by clicking the Add-Ons drop-down menu and
click Get Hardware Support Packages. The package will start download. To establish a connection between
MATLAB and Arduino boards, the following command can be used with MATLAB after the Arduino
package installed.
ard=arduino ('port no.')
The PIN (2 & 8) used as an input which received the signal from the PIR and MQ-2 sensors
respectively.
The pin no. (13) used to send the signal to the camera and to turn on the light when the
sensors detect intruders or fire
readDigitalPin(ard,2)
readDigitalPin(ard,8)
writeDigitalPin(ard,13,1)
writeDigitalPin(ard,13,0)
In this project, the camera will be connected directly with the server and configured with the Matlab program
as shown in Figure 10. So, if there are any intruders to the security zone the sensor sends a signal to
the Arduino which configured with Matlab program to take a snapshot for the introduces and send it by email
to the occupant.
Figure 10. Design of the smart system
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 5932 - 5939
5938
The SMTP protocol code is written in the Matlab program to send a snapshot of the fire or intruders
to the occupant's email every 10 seconds. From the received images it is possible to build a database about all
the steps of fire and to know how it happens, by a trigger of an electricity or by intruders, and also to take
emergency steps by the owner. To display the cases in each time, the following code is written as
if(a==1)
writeDigitalPin(ard,13,1);
disp('intro');
else
writeDigitalPin(ard,13,0);
disp('ok');
if(b==1)
writeDigitalPin(ard,13,1);
disp('fair');
else
writeDigitalPin(ard,13,0);
disp('ok');
end
If there are no intruders and fire (OK) will display, else if there are intruders or fires then (Intruders) or
(Fires) will display and an email will send to the occupant.
4. CONCLUSION
In this paper, the proposed system has been designed using microcontroller AVR Atmega 8
microcontrollers to control the appliances and the main door, also, a security system is done by using
Arduino programmed using Matlab to detect firing and intruders. The performance of the designed system
has been tested and it's work found very comfortable for the occupant to controlling office or home
appliances via Bluetooth with the software application on a smartphone, also, the smartphone using for
calling, games, internet, that is mean in the future the smartphone using for controlling devices, also, this
design is very simple with low cost. In the other side, the security system is very important to detect the
intruders and send a snapshot through the email to the occupant every 3 seconds to store a database about all
the steps of the intruders and also if a fire occurs in the building it will be very easy to know the reason for
the fire and also to take emergency steps to stop the firing. For the future scope, it is necessary to design a
wireless sensor network and connected it with a GPS map to get an idea about the situation of all the places
using IoT.
REFERENCES
[1] N. Deepika, M. Anand, F. Jerald, “A novel three tier internet of things health monitoring system,” Indonesian
Journal of Electrical Engineering and Computer Science, vol. 15, no. 2, pp. 631-637, 2019.
[2] B. M. Eskofier, et al., “An Overview of Smart Shoes in the Internet of Health Things: Gait and Mobility
Assessment in Health Promotion and Disease Monitoring,” Applied Sciences, vol. 7, no. 10, pp. 1-17, 2017.
[3] A. Mayub, et al., “Implementation smart home using internet of things,” TELKOMNIKA (Telecommunication,
Computing, Electronics and Control), vol. 17, no. 6, pp. 3126-3136, 2019.
[4] S. I. Abdullahi, M. H. Habaebi, N. A. Malik, “Intelligent flood disaster warning on the fly: developing IoT-based
management platform and using 2-class neural network to predict flood status,” Bulleting of Electrical Engineering
and Informatics, vol. 8, no. 2, pp. 450-459, 2019.
[5] D. Giusto, et al., “The Internet of Things,” Springer, 2010.
[6] L. D. Xu, et al. “Internet of Things in Industries: A Survey,” IEEE Transactions on Industrial Informatics, vol. 10,
no. 4, pp. 2233-2243, Nov. 2014.
[7] K. Luechaphonthara and A. Vijayalakshmi, “IoT based application for monitoring electricity power consumption in
home appliances,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 6,
pp. 4988-4992, 2019.
[8] W. E. Audette, et al., “Improved Intruder Detection Using Seismic Sensors and Adaptive Noise Cancellation,”
Human, Light Vehicle, and Tunnel Detection Workshop, the Army Research Laboratory and the National Center
for Physical Acoustics, pp. 1-11, 2009.
[9] Nwalozie G. C., et al., “Enhancing Home Security Using SMS-based Intruder Detection System,” International
Journal of Computer Science and Mobile Computing, vol. 4, no. 6, pp. 1177-1184, Jun. 2015.
[10] M. Saifuzzaman, “Smart Security for an Organization based on IoT,” International Journal of Computer
Applications, vol. 165, no. 10, pp. 33-38, May 2017.
[11] J. Bangali and A. Shaligram, “Design and Implementation of Security Systems for Smart Home based on GSM
technology,” International Journal of Smart Home, vol. 7, no. 6, pp. 201-208, 2013.
Int J Elec & Comp Eng ISSN: 2088-8708 
Design and implement a smart system to detect intruders and firing using IOT (Hussam Jawad Kadhim)
5939
[12] T. S. Gunawan, et al., “Performance Evaluation of Smart Home System using Internet of Things,” International
Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 1, pp. 400-411, Feb. 2018.
[13] C. Kim, Y. Kim, and H. Jung, “IoT task management system using control board,” Indonesian Journal of Electrical
Engineering and Computer Science (IJEECS), vol. 13, no. 1, pp. 155-161, Jan. 2019.
[14] T. Adiono, et al., “Curtain Control Systems Development on Mesh Wireless Network of the Smart Home,” Bulletin
of Electrical Engineering and Informatics, vol. 7, no. 4, pp. 615-625, Dec. 2018.
[15] H. J. Kadhim, “Controlling Home and Office Appliances with the Bluetooth of Smartphone,” International Journal
of Computer Applications, vol. 152, no. 3, pp. 25-28, Oct. 2016.
[16] Mathworks. [Online], Available: https://www.mathworks.com
[17] R. Mitra and R. Ganiga, “A novel approach to sensor implementation for healthcare systems using internet of
things,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 6, pp. 5031-5045, 2019.
[18] S. G. Priyadharshini, et al., “An IoT based smart metering development for energy management system,”
International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 4, pp. 3041-3050, 2019.
[19] A. J. Samuel and S. Sebastian, “An algorithm for IoT based vehicle verification system using RFID,” International
Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 5, pp. 3751-3758, 2019.
[20] D. Javale, et al., “Smart Detection of Parking Rates and Determining the Occupancy,” in Proceeding of
International Conference on Computational Science and Applications, pp. 381-390, 2020.
[21] K. Gautam, et al., “Internet of Things (IoT) and Deep Neural Network-Based Intelligent and Conceptual Model for
Smart City,” Frontiers in Intelligent Computing: Theory and Applications, pp. 287-300, 2020.
[22] M. Swatha and K. Pooja, “Smart Car Parking with Monitoring System,” 2018 IEEE International Conference on
System, Computation, Automation and Networking (ICSCA), pp. 1-5, 2018.
[23] M. I. Younis and T. F. Hussein, “Design and Implementation of a Contactless Smart House Network System,”
International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 6, pp. 4663-4672, 2018.
[24] A. H. Ali, et al., “Smart Monitoring System for Pressure Regulator based on IoT,” International Journal of
Electrical and Computer Engineering (IJECE), vol. 9, no. 5, pp. 3450-3456, 2019.
[25] Rajeev Piyare, “Internet of Things: Ubiquitous Home Control and Monitoring System using Android based Smart
Phone,” International Journal of Internet of Things, pp. 5–11, 2013.
BIOGRAPHIES OF AUTHORS
Hussam Jawad Kadhim was born in Hillah-Iraq. He received a B. Se degree in electrical
engineering from the University of Babylon in 2007 and an M. tech degree in Communication
System Engineering in SHIATS-DU, Allahabad 2014. He is working as a lecturer in the college
of science of women /computer department at Babylon University. He is currently studying for
a Ph.D. degree at the electrical engineering department in the college of engineering at
the University of Babylon. His research interests include IoT, power consumption, etc
Mohammed Jabbar Mohammed Ameen was born in Hillah-Iraq. He received a B.Se degree in
electrical engineering from the University of Babylon in 2007 and an MSc degree in
communications engineering from Al-Ahliyya Amman University in 2017, Jordon. He is
working as a lecturer in the college of engineering/electrical department at Babylon University.
He is currently working his Ph.D. degree at the electrical engineering department in the college
of engineering at the University of Babylon. His research interests include IoT, MIMO, OFDM,
FEC, and 5G, etc.

More Related Content

What's hot

Biometric Identification using Opencv Based on Arduino
Biometric Identification using Opencv Based on ArduinoBiometric Identification using Opencv Based on Arduino
Biometric Identification using Opencv Based on ArduinoIRJET Journal
 
A zigbee and embedded based security
A zigbee and embedded based securityA zigbee and embedded based security
A zigbee and embedded based securityijistjournal
 
Design and Implementation of Soft-i-Robot for face Detection and Obstacle Avo...
Design and Implementation of Soft-i-Robot for face Detection and Obstacle Avo...Design and Implementation of Soft-i-Robot for face Detection and Obstacle Avo...
Design and Implementation of Soft-i-Robot for face Detection and Obstacle Avo...Associate Professor in VSB Coimbatore
 
IRJET- Home Automation System for Disable People using Bluetooth Technology a...
IRJET- Home Automation System for Disable People using Bluetooth Technology a...IRJET- Home Automation System for Disable People using Bluetooth Technology a...
IRJET- Home Automation System for Disable People using Bluetooth Technology a...IRJET Journal
 
Design and implementation home security system and monitoring by using wirele...
Design and implementation home security system and monitoring by using wirele...Design and implementation home security system and monitoring by using wirele...
Design and implementation home security system and monitoring by using wirele...IJECEIAES
 
Smart and Secure Home using IoT
Smart and Secure Home using IoTSmart and Secure Home using IoT
Smart and Secure Home using IoTIRJET Journal
 
Controlling Home Appliances by using Universal Remote Control System (IoT and...
Controlling Home Appliances by using Universal Remote Control System (IoT and...Controlling Home Appliances by using Universal Remote Control System (IoT and...
Controlling Home Appliances by using Universal Remote Control System (IoT and...IRJET Journal
 
Embedded systems: Future perspectives
Embedded systems: Future perspectivesEmbedded systems: Future perspectives
Embedded systems: Future perspectivesGiuseppe La Torre
 
Development of wireless and intelligent home automation system
Development of wireless and intelligent home automation systemDevelopment of wireless and intelligent home automation system
Development of wireless and intelligent home automation systemTELKOMNIKA JOURNAL
 
Home Automation using IOT and Mobile App
Home Automation using IOT and Mobile AppHome Automation using IOT and Mobile App
Home Automation using IOT and Mobile AppIRJET Journal
 
IRJET- Wireless Sensor Network Based Internet of things for Environmental...
IRJET-  	  Wireless Sensor Network Based Internet of things for Environmental...IRJET-  	  Wireless Sensor Network Based Internet of things for Environmental...
IRJET- Wireless Sensor Network Based Internet of things for Environmental...IRJET Journal
 
137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)Karteek Irukulla
 
IRJET- A Review on: Smart and Advanced Living Technology (SALT)
IRJET- A Review on: Smart and Advanced Living Technology (SALT)IRJET- A Review on: Smart and Advanced Living Technology (SALT)
IRJET- A Review on: Smart and Advanced Living Technology (SALT)IRJET Journal
 
IRJET- Multi Plug Control using Internet of Things
IRJET- Multi Plug Control using Internet of ThingsIRJET- Multi Plug Control using Internet of Things
IRJET- Multi Plug Control using Internet of ThingsIRJET Journal
 

What's hot (19)

Biometric Identification using Opencv Based on Arduino
Biometric Identification using Opencv Based on ArduinoBiometric Identification using Opencv Based on Arduino
Biometric Identification using Opencv Based on Arduino
 
A zigbee and embedded based security
A zigbee and embedded based securityA zigbee and embedded based security
A zigbee and embedded based security
 
Design and Implementation of Soft-i-Robot for face Detection and Obstacle Avo...
Design and Implementation of Soft-i-Robot for face Detection and Obstacle Avo...Design and Implementation of Soft-i-Robot for face Detection and Obstacle Avo...
Design and Implementation of Soft-i-Robot for face Detection and Obstacle Avo...
 
IRJET- Home Automation System for Disable People using Bluetooth Technology a...
IRJET- Home Automation System for Disable People using Bluetooth Technology a...IRJET- Home Automation System for Disable People using Bluetooth Technology a...
IRJET- Home Automation System for Disable People using Bluetooth Technology a...
 
Design and implementation home security system and monitoring by using wirele...
Design and implementation home security system and monitoring by using wirele...Design and implementation home security system and monitoring by using wirele...
Design and implementation home security system and monitoring by using wirele...
 
Smart and Secure Home using IoT
Smart and Secure Home using IoTSmart and Secure Home using IoT
Smart and Secure Home using IoT
 
IMAGE PROCESSING BASED INTRUDER DETECTION USING RASPBERRY PI
IMAGE PROCESSING BASED INTRUDER DETECTION USING RASPBERRY PIIMAGE PROCESSING BASED INTRUDER DETECTION USING RASPBERRY PI
IMAGE PROCESSING BASED INTRUDER DETECTION USING RASPBERRY PI
 
Controlling Home Appliances by using Universal Remote Control System (IoT and...
Controlling Home Appliances by using Universal Remote Control System (IoT and...Controlling Home Appliances by using Universal Remote Control System (IoT and...
Controlling Home Appliances by using Universal Remote Control System (IoT and...
 
Embedded systems: Future perspectives
Embedded systems: Future perspectivesEmbedded systems: Future perspectives
Embedded systems: Future perspectives
 
Development of wireless and intelligent home automation system
Development of wireless and intelligent home automation systemDevelopment of wireless and intelligent home automation system
Development of wireless and intelligent home automation system
 
Home Automation using IOT and Mobile App
Home Automation using IOT and Mobile AppHome Automation using IOT and Mobile App
Home Automation using IOT and Mobile App
 
IRJET- Wireless Sensor Network Based Internet of things for Environmental...
IRJET-  	  Wireless Sensor Network Based Internet of things for Environmental...IRJET-  	  Wireless Sensor Network Based Internet of things for Environmental...
IRJET- Wireless Sensor Network Based Internet of things for Environmental...
 
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
 
137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)
 
IRJET- A Review on: Smart and Advanced Living Technology (SALT)
IRJET- A Review on: Smart and Advanced Living Technology (SALT)IRJET- A Review on: Smart and Advanced Living Technology (SALT)
IRJET- A Review on: Smart and Advanced Living Technology (SALT)
 
IRJET- Multi Plug Control using Internet of Things
IRJET- Multi Plug Control using Internet of ThingsIRJET- Multi Plug Control using Internet of Things
IRJET- Multi Plug Control using Internet of Things
 
Kv2518941899
Kv2518941899Kv2518941899
Kv2518941899
 
ATM (1)
ATM (1)ATM (1)
ATM (1)
 
MONITORING FIXTURES OF CNC MACHINE
MONITORING FIXTURES OF CNC MACHINEMONITORING FIXTURES OF CNC MACHINE
MONITORING FIXTURES OF CNC MACHINE
 

Similar to Design and implement a smart system to detect intruders and firing using IoT

Design and implementation of a smart home system with two levels of security ...
Design and implementation of a smart home system with two levels of security ...Design and implementation of a smart home system with two levels of security ...
Design and implementation of a smart home system with two levels of security ...nooriasukmaningtyas
 
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...IRJET Journal
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTIJRTEMJOURNAL
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT journal ijrtem
 
Energy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoTEnergy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoTIJEACS
 
Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...journalBEEI
 
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOTVEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOTIRJET Journal
 
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...IRJET Journal
 
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol IJECEIAES
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...IJECEIAES
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
A Short Review on the Perspective of Home Automation Technology
A Short Review on the Perspective of Home Automation TechnologyA Short Review on the Perspective of Home Automation Technology
A Short Review on the Perspective of Home Automation TechnologyIRJET Journal
 
IRJET- Earthquake Early Warning System for Android
IRJET-  	  Earthquake Early Warning System for AndroidIRJET-  	  Earthquake Early Warning System for Android
IRJET- Earthquake Early Warning System for AndroidIRJET Journal
 
Intelligent Device TO Device Communication Using IoT
 Intelligent Device TO Device Communication Using IoT Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoTIJCERT
 
Office Automation System using Internet of Things
Office Automation System using Internet of ThingsOffice Automation System using Internet of Things
Office Automation System using Internet of ThingsIRJET Journal
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIJERA Editor
 
IOT Based Soldier Position Tracking and Health Monitoring System
IOT Based Soldier Position Tracking and Health Monitoring SystemIOT Based Soldier Position Tracking and Health Monitoring System
IOT Based Soldier Position Tracking and Health Monitoring SystemIRJET Journal
 
Bluetooth Based Automatic Hotel Service System Using Python
Bluetooth Based Automatic Hotel Service System Using PythonBluetooth Based Automatic Hotel Service System Using Python
Bluetooth Based Automatic Hotel Service System Using PythonIOSR Journals
 
Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Implementation of vehicle ventilation system using node mcu esp8266 for remot...Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Implementation of vehicle ventilation system using node mcu esp8266 for remot...Journal Papers
 

Similar to Design and implement a smart system to detect intruders and firing using IoT (20)

Design and implementation of a smart home system with two levels of security ...
Design and implementation of a smart home system with two levels of security ...Design and implementation of a smart home system with two levels of security ...
Design and implementation of a smart home system with two levels of security ...
 
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
Energy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoTEnergy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoT
 
Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...
 
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOTVEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
 
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
 
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
A Short Review on the Perspective of Home Automation Technology
A Short Review on the Perspective of Home Automation TechnologyA Short Review on the Perspective of Home Automation Technology
A Short Review on the Perspective of Home Automation Technology
 
IRJET- Earthquake Early Warning System for Android
IRJET-  	  Earthquake Early Warning System for AndroidIRJET-  	  Earthquake Early Warning System for Android
IRJET- Earthquake Early Warning System for Android
 
Intelligent Device TO Device Communication Using IoT
 Intelligent Device TO Device Communication Using IoT Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoT
 
Office Automation System using Internet of Things
Office Automation System using Internet of ThingsOffice Automation System using Internet of Things
Office Automation System using Internet of Things
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
IOT Based Soldier Position Tracking and Health Monitoring System
IOT Based Soldier Position Tracking and Health Monitoring SystemIOT Based Soldier Position Tracking and Health Monitoring System
IOT Based Soldier Position Tracking and Health Monitoring System
 
Bluetooth Based Automatic Hotel Service System Using Python
Bluetooth Based Automatic Hotel Service System Using PythonBluetooth Based Automatic Hotel Service System Using Python
Bluetooth Based Automatic Hotel Service System Using Python
 
Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Implementation of vehicle ventilation system using node mcu esp8266 for remot...Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Implementation of vehicle ventilation system using node mcu esp8266 for remot...
 

More from IJECEIAES

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionIJECEIAES
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...IJECEIAES
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningIJECEIAES
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...IJECEIAES
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...IJECEIAES
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...IJECEIAES
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...IJECEIAES
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyIJECEIAES
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationIJECEIAES
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceIJECEIAES
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...IJECEIAES
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...IJECEIAES
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...IJECEIAES
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...IJECEIAES
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...IJECEIAES
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...IJECEIAES
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...IJECEIAES
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...IJECEIAES
 

More from IJECEIAES (20)

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regression
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learning
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancy
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimization
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performance
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
 

Recently uploaded

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 

Recently uploaded (20)

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 

Design and implement a smart system to detect intruders and firing using IoT

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 10, No. 6, December 2020, pp. 5932~5939 ISSN: 2088-8708, DOI: 10.11591/ijece.v10i6.pp5932-5939  5932 Journal homepage: http://ijece.iaescore.com/index.php/IJECE Design and implement a smart system to detect intruders and firing using IoT Hussam Jawad Kadhim1 , Mohammed Jabbar Mohammed Ameen2 1 Collage of Science for Women, Department of Computer, University of Babylon, Iraq 2 Collage of Engineering, Department of Electrical Engineering, University of Babylon, Iraq Article Info ABSTRACT Article history: Received Apr 6, 2020 Revised May 15, 2020 Accepted May 28, 2020 The security system is essential for occupants' convenience and protection from intruders and fire. Theft and fire are the most important requirement for the security system. The advancement of wireless sensor networks using IoTs increased the features in a security system and play an important role in daily life. In this paper, the proposed system is divided into two units. The first one about security which use to take snapshots by a camera whenever there is fire or intruders in the security zone and mail it to the owner every three seconds by using Arduino configured with MATLAB program. MATLAB program plays the main role to coordinate between sensors and to turn on/off the cameras. The second unit is about controlling the appliances and also the main door by using AVR microcontroller configured by CVAVR software that connected with Bluetooth sensor and controlled by a smartphone by using the implementation software built-up in the smartphone. To arrival of the control unit, the user should send code from the software implementation to the framework that use to turn on/off the devices or open/close the door. This proposed system is designed and implemented in details in this paper. Keywords: Appliance control system AVR atmeg8 Communication system IoT Remote control Security system Copyright © 2020 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Hussam Jawad Kadhim, Collage of Science for Women, Department of Computer, University of Babylon, 60th street, Alhilla, Babylon, Iraq. Email: hussamjwd@yahoo.com 1. INTRODUCTION Nowadays the risk of fire and intruder has been increased. In general, the security system is defined as a network of devices that contain a trigger and alarm. The features of the security system have been increased with the advancement in the internet field. The concept of the internet of things (IoT) is introduced where the appliances can communicate with humans [1-3]. Nowadays the Internet of Things is a fastly growing technology [4, 5]. Explain that IoT is consist of a physical device, software, network, sensors, wired or unwired technology, etc. This is essentially due to the instilling of sensors on them. These sensors are connected by wired and wireless networks using Internet Protocol that link-up the Internet [6, 7]. Internet as aforesaid has become a part of the daily habit that most of the people in different countries who have the incoming to it. These people have become contingent on having an Internet connection in their daily lives to be able to really carry on with their life for some cause. Because of the increasing risk of burglary and robbery and the busy lifestyle the technology of safety and security system has been increased [8]. In [9] the author designs a smart system to detect intruders using short message service, this system consists of a sensor circuit, controller, and receiver. When an intruder passes through the PIR, SMS is sent to the mobile phone numbers. In [10] Arduino configured with the gas module, motion sensor, laser sensor to detect intruders and unwanted occurrences that controlled by Bluetooth when the owner indoor and GSM when the owner
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708  Design and implement a smart system to detect intruders and firing using IOT (Hussam Jawad Kadhim) 5933 outdoor. [11] The author suggests two methods to apply the security system for the home. The first one uses a Webcam. A mail is delivered to the owner whenever there is a motion in front of the camera. The second one sends SMS. Also, the control of home appliances by code are very important so in [12, 13] the author explain how to control home appliances using AVR microcontroller by the Bluetooth of smartphone. In this paper, if an intruder or the fire occurred a snapshot is taken by the camera which connects with the server and controlled by Matlab program which use SMTP protocol to send e-mail include a photo of the fire for the first time or to the intruders which give an idea to the occupant about the case of the place at that time. Also, for more safety, the door will be controlled automatically by sending a code from the smartphone to the Bluetooth sensor which configured by AVR microcontroller and connected to a DC motor to open or close the door and also to turn on/off the appliances. 2. RESEARCH METHOD 2.1. Arduino Arduino is an open exporter stand that used to build an electronics circuits project. This platform consists of a physical programmable circuit board as shown in Figure 1 and software, or (IDE) that works on your computer and used to write down and transfer code to the physical board. This podium has become a popular with world and used widely in electronics circuits because it does not need an independent piece of hardware (called a programmer), like most previous programmable circuit boards. To programming the Arduino board, you can plainly use USB-USB cable to upload the code. The programming language that used with Arduino software is a simplified version of C++, making it easier to learn and programming [14]. Figure 1. Arduino platform 2.2. AVR Microcotroller The AVR microcontroller has a CPU and ROM, RAM, I/O ports, and timer all embedded together on a single chip as shown in Figure 2. So, the designer cannot annex any external I/O pins, memory, or timer to it. The AVR with these facilities makes it perfect for many of applications which the cost and space are critical. ATmega 8 is used in this project which provides 23 I/O lines, 512 bytes of EEPROM, 8 Kbytes of System Programmable Flash, 1 KB of SRAM, and USART [15]. Figure 2. AVR microcontroller (Atmega8)
  • 3.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 5932 - 5939 5934 2.3. CVAVR Code Vision AVRis a software that is used to write the code for programming the AVR microcontroller on Windows. To inject the code to the AVR microcontrooler SinaProg program is used. The CVAVR is a very good Code Wizard that generates codes automatically [15]. 2.4. MATLAB MATLAB is a 4th generation programming language and it used for numerical analysis. It includes matrix calculations, running algorithms, data visualization, and creating user interfaces. MATLAB environment as shown in Figure 3 allows developers to interface it with other programs in different languages. MATLAB is used in many fields by engineers and scientists such as signal and image processing, control systems for industry, communications, robotics, smart grid design [16]. Figure 3. Matlab programming 2.5. Smoke detector Analogy Smoke Sensor or MQ2 module is sensitive to smoke and it has a protection resistor with an adjustable resistor on board. It could be used for fire or smoke detection, also, it used in gas leakage detecting equipment in family and industry. The resistance of the sensor changes as the concentricity of the target smoke changes [17]. 2.6. PIR sensor PIR is a motion sensor and it used to detect whether a human has moved in the security zone or through the sensor range. The PIR sensor as shown in Figure 4 is small, simple to use, low-power, cheap, and doesn't wear out. Because of that why the PIR sensor found in the used systems in homes or businesses [18]. PIR used for many projects that need to detect intruders or when a person has left the security zone. PIR sensors are low cost and low power, pretty rugged and have a wide lens range [19]. Figure 4. PIR sensor 2.7. Webcam A webcam is a video camera used to flow its image in real-time by means of a personal computer to the internet. When there are intruders or fire throw the security zone the camera takes a snapshot and sends it to throw the network via systems such as the internet, and email as an attachment to the owner. A webcam is generally built into computer hardware or connected by a USB cable [20]. 2.8. E-mail or email Electronic mail is the exchanging of digital messages by telecommunication between people using digital devices such as mobile phones, computers, and tablets. Electronic mail first uses in the 1960s and by the mid-1970s had taken the form now recognized as email [21]. Email systems required both the sender and the recipient online to receive the snapshot at the same time.
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708  Design and implement a smart system to detect intruders and firing using IOT (Hussam Jawad Kadhim) 5935 2.9. LCD Liquid Crystal Display screen is an electronic display module as shown in Figure 5 and used in various devices and circuits.16x2 LCD means it can display 16 characters per line and there are 2 lines. Each character is displayed in a 5x7 pixel matrix. The command register stores the command directive given to the LCD which predefined tasks like preface it, setting the cursor position, controlling a display, clearing its screen, etc. [22]. Figure 5. LCD display 2.10. Relay A relay is an electrical switch use dc input for receiving a signal and the output is AC to operate appliances and other devices, so, in this project, the relay will receive the signal from microcontroller which connects to the C-port and (NO) port will be connected to the AC device [23]. 2.11. Bluetooth module To remote control the AVR microcontroller over a short distance, the Bluetooth sensor is used to receive data from the smartphone. HC-06 module is used and the connection pins are TX to TXD to send data to the microcontroller and RX to RXD to receive data from the microcontroller, VCC with VCC for power, and GND to GND for ground. For generality, use states the HC-06 is sufficient, as typically I want to have a wireless UART joining to my devices from my smartphone [24, 25]. 2.12. BTInterface BT The software that is used to control the appliances is BTInterface and it is easy to install on the smartphone from the android store, so, by using this software it will be possible to control all devices that connected with the proposed system and used an ID for each device, so, to turn on/off any controlled device just send the ID number from this application show in Figure 6. Figure 6. Bluetooth interface in smart phone 3. RESULTS AND DISCUSSION In this section the proposed system performance will evaluate, in the ability to turn on/off appliances, open and close the door, receive a snapshot of fire or intruder in the email. Figure 7 shows the proposed system.
  • 5.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 5932 - 5939 5936 Figure 7. Image of project 3.1. Configure the AVR microcontroller with the outdoor The security system is designing for the outdoor by using AVR microcontroller configured with a Bluetooth sensor as shown in Figure 8 and connected with a DC motor to open and close the door. By sending a code from the smartphone to the sensor the microcontroller will match the code, if the code is correct the outdoor will open and a welcome message will display in the LCD, else the outdoor will not be opened. Open and close the outdoor using a code sent by a smartphone through the Bluetooth will allow the occupant to easily controlling the door and also it will be secure. Figure 8. Configured the AVR microcontroller 3.2. Configure the AVR microcontroller The steps to configure the AVR microcontroller CVAVR software will be used and following this steps: 1) To receive a signal from the smartphone application USART is used. 2) To display each case LCD will be configured. 3) Configure each Port that depends on the number received from the smartphone. The microcontroller pins connecting as shown in Figure 9 and details below: 1) Connect Bluetooth module (HC-06) Rx to Tx of the AVR microcontroller and Tx of the Bluetooth sensor to Rx of the AVR microcontroller, also, complete VCC-VCC and GND-GND. 2) Relay to PortB.4 3) AC device to Relay 4) PortB.0,.1, .2, .3 to the DC motor drive. 5) Turn on the software application (BTInterface) on the smartphone. 6) Connect to Bluetooth sensor HC-06. 7) Type the number of password (1234). 8) Press the terminal key and type the number which a sign in the configuration of the microcontroller for each device, for example, No. 1 to close the door and 2 to open the door also 3 to switch on the light, and 4 switches off the light. The controlling of DC motor is done by giving a period to drive the DC motor for example 1000 msec to drive the DC motor and open the door, also the same time is given to drive the DC motor in the opposite direction to close the door. The port B.4 connects to any appliances to controlling it by the Bluetooth of the smartphone.
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708  Design and implement a smart system to detect intruders and firing using IOT (Hussam Jawad Kadhim) 5937 Figure 9. The proposed syetm for the outdoor controlling 3.3. Configure the Arduino with MATLAB First, start MATLAB and install Arduino packages by clicking the Add-Ons drop-down menu and click Get Hardware Support Packages. The package will start download. To establish a connection between MATLAB and Arduino boards, the following command can be used with MATLAB after the Arduino package installed. ard=arduino ('port no.') The PIN (2 & 8) used as an input which received the signal from the PIR and MQ-2 sensors respectively. The pin no. (13) used to send the signal to the camera and to turn on the light when the sensors detect intruders or fire readDigitalPin(ard,2) readDigitalPin(ard,8) writeDigitalPin(ard,13,1) writeDigitalPin(ard,13,0) In this project, the camera will be connected directly with the server and configured with the Matlab program as shown in Figure 10. So, if there are any intruders to the security zone the sensor sends a signal to the Arduino which configured with Matlab program to take a snapshot for the introduces and send it by email to the occupant. Figure 10. Design of the smart system
  • 7.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 5932 - 5939 5938 The SMTP protocol code is written in the Matlab program to send a snapshot of the fire or intruders to the occupant's email every 10 seconds. From the received images it is possible to build a database about all the steps of fire and to know how it happens, by a trigger of an electricity or by intruders, and also to take emergency steps by the owner. To display the cases in each time, the following code is written as if(a==1) writeDigitalPin(ard,13,1); disp('intro'); else writeDigitalPin(ard,13,0); disp('ok'); if(b==1) writeDigitalPin(ard,13,1); disp('fair'); else writeDigitalPin(ard,13,0); disp('ok'); end If there are no intruders and fire (OK) will display, else if there are intruders or fires then (Intruders) or (Fires) will display and an email will send to the occupant. 4. CONCLUSION In this paper, the proposed system has been designed using microcontroller AVR Atmega 8 microcontrollers to control the appliances and the main door, also, a security system is done by using Arduino programmed using Matlab to detect firing and intruders. The performance of the designed system has been tested and it's work found very comfortable for the occupant to controlling office or home appliances via Bluetooth with the software application on a smartphone, also, the smartphone using for calling, games, internet, that is mean in the future the smartphone using for controlling devices, also, this design is very simple with low cost. In the other side, the security system is very important to detect the intruders and send a snapshot through the email to the occupant every 3 seconds to store a database about all the steps of the intruders and also if a fire occurs in the building it will be very easy to know the reason for the fire and also to take emergency steps to stop the firing. For the future scope, it is necessary to design a wireless sensor network and connected it with a GPS map to get an idea about the situation of all the places using IoT. REFERENCES [1] N. Deepika, M. Anand, F. Jerald, “A novel three tier internet of things health monitoring system,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 15, no. 2, pp. 631-637, 2019. [2] B. M. Eskofier, et al., “An Overview of Smart Shoes in the Internet of Health Things: Gait and Mobility Assessment in Health Promotion and Disease Monitoring,” Applied Sciences, vol. 7, no. 10, pp. 1-17, 2017. [3] A. Mayub, et al., “Implementation smart home using internet of things,” TELKOMNIKA (Telecommunication, Computing, Electronics and Control), vol. 17, no. 6, pp. 3126-3136, 2019. [4] S. I. Abdullahi, M. H. Habaebi, N. A. Malik, “Intelligent flood disaster warning on the fly: developing IoT-based management platform and using 2-class neural network to predict flood status,” Bulleting of Electrical Engineering and Informatics, vol. 8, no. 2, pp. 450-459, 2019. [5] D. Giusto, et al., “The Internet of Things,” Springer, 2010. [6] L. D. Xu, et al. “Internet of Things in Industries: A Survey,” IEEE Transactions on Industrial Informatics, vol. 10, no. 4, pp. 2233-2243, Nov. 2014. [7] K. Luechaphonthara and A. Vijayalakshmi, “IoT based application for monitoring electricity power consumption in home appliances,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 6, pp. 4988-4992, 2019. [8] W. E. Audette, et al., “Improved Intruder Detection Using Seismic Sensors and Adaptive Noise Cancellation,” Human, Light Vehicle, and Tunnel Detection Workshop, the Army Research Laboratory and the National Center for Physical Acoustics, pp. 1-11, 2009. [9] Nwalozie G. C., et al., “Enhancing Home Security Using SMS-based Intruder Detection System,” International Journal of Computer Science and Mobile Computing, vol. 4, no. 6, pp. 1177-1184, Jun. 2015. [10] M. Saifuzzaman, “Smart Security for an Organization based on IoT,” International Journal of Computer Applications, vol. 165, no. 10, pp. 33-38, May 2017. [11] J. Bangali and A. Shaligram, “Design and Implementation of Security Systems for Smart Home based on GSM technology,” International Journal of Smart Home, vol. 7, no. 6, pp. 201-208, 2013.
  • 8. Int J Elec & Comp Eng ISSN: 2088-8708  Design and implement a smart system to detect intruders and firing using IOT (Hussam Jawad Kadhim) 5939 [12] T. S. Gunawan, et al., “Performance Evaluation of Smart Home System using Internet of Things,” International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 1, pp. 400-411, Feb. 2018. [13] C. Kim, Y. Kim, and H. Jung, “IoT task management system using control board,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 13, no. 1, pp. 155-161, Jan. 2019. [14] T. Adiono, et al., “Curtain Control Systems Development on Mesh Wireless Network of the Smart Home,” Bulletin of Electrical Engineering and Informatics, vol. 7, no. 4, pp. 615-625, Dec. 2018. [15] H. J. Kadhim, “Controlling Home and Office Appliances with the Bluetooth of Smartphone,” International Journal of Computer Applications, vol. 152, no. 3, pp. 25-28, Oct. 2016. [16] Mathworks. [Online], Available: https://www.mathworks.com [17] R. Mitra and R. Ganiga, “A novel approach to sensor implementation for healthcare systems using internet of things,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 6, pp. 5031-5045, 2019. [18] S. G. Priyadharshini, et al., “An IoT based smart metering development for energy management system,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 4, pp. 3041-3050, 2019. [19] A. J. Samuel and S. Sebastian, “An algorithm for IoT based vehicle verification system using RFID,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 5, pp. 3751-3758, 2019. [20] D. Javale, et al., “Smart Detection of Parking Rates and Determining the Occupancy,” in Proceeding of International Conference on Computational Science and Applications, pp. 381-390, 2020. [21] K. Gautam, et al., “Internet of Things (IoT) and Deep Neural Network-Based Intelligent and Conceptual Model for Smart City,” Frontiers in Intelligent Computing: Theory and Applications, pp. 287-300, 2020. [22] M. Swatha and K. Pooja, “Smart Car Parking with Monitoring System,” 2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA), pp. 1-5, 2018. [23] M. I. Younis and T. F. Hussein, “Design and Implementation of a Contactless Smart House Network System,” International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 6, pp. 4663-4672, 2018. [24] A. H. Ali, et al., “Smart Monitoring System for Pressure Regulator based on IoT,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 5, pp. 3450-3456, 2019. [25] Rajeev Piyare, “Internet of Things: Ubiquitous Home Control and Monitoring System using Android based Smart Phone,” International Journal of Internet of Things, pp. 5–11, 2013. BIOGRAPHIES OF AUTHORS Hussam Jawad Kadhim was born in Hillah-Iraq. He received a B. Se degree in electrical engineering from the University of Babylon in 2007 and an M. tech degree in Communication System Engineering in SHIATS-DU, Allahabad 2014. He is working as a lecturer in the college of science of women /computer department at Babylon University. He is currently studying for a Ph.D. degree at the electrical engineering department in the college of engineering at the University of Babylon. His research interests include IoT, power consumption, etc Mohammed Jabbar Mohammed Ameen was born in Hillah-Iraq. He received a B.Se degree in electrical engineering from the University of Babylon in 2007 and an MSc degree in communications engineering from Al-Ahliyya Amman University in 2017, Jordon. He is working as a lecturer in the college of engineering/electrical department at Babylon University. He is currently working his Ph.D. degree at the electrical engineering department in the college of engineering at the University of Babylon. His research interests include IoT, MIMO, OFDM, FEC, and 5G, etc.