SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2867
AUTOMATIVE IMPREGNABLE DRIVING SYSTEM
P.Prapthi1, K,Raghavi2, M.Sandhiya3
1,2,3 Student , Dept. of Information Technology, Valliammai Engineering College ,Chennai ,Tamil Nadu
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Cloud computing and Internet of Things (IoT)
are two different technologies that are already a part of our
life, their application and use is expected to be more and more
pervasive that enables an ubiquitous access to the sharedpool
of resources and services. Internet of Things (IoT) is becoming
increasingly important for Vehicle Monitoring, Medical
Treatment, Home Automation and other industrial
applications.The system proposed continuously monitors the
status of the vehicle and overcomes issues like theft on the
parking , driving insecurity and rise in death due to accidents.
The safe of vehicles is extremely essential for public .
Therefore, several research groups and major motorcycle
manufacturers have developed safety devices toprotectriders
from accidental injuries. However, good safety device for
vehicle is difficult to implement and very expensive. In this
system, authentication of drivers is provided by meansofRFID
and Fingerprint sensor. Also for driver security, we have
integrated IR sensor (seat belt) and Alcohol sensor (alcohol
consumption). For each module, voice output would be
triggered. Proposed system involves authentication of drivers
& provide solutions to overcome the vehicle thefts. In
fingerprint authentication, only the authorized person is
passed and vehicle ignition will be initiated. For fingerprint
feature extraction, we used Orientation Map algorithm.
Keypad is been integrated to Enroll, Identify and Delete. Ifany
other person rather than the authorized person is trying
to access the vehicle, responsive GSM will be initiated and
only the authorized person can give the permission rights.
After this the vehicle ignition is switched ON / OFF. Finally,the
sensor data and driver personal details like name and license
number are transmitted to the IoT server. The result of the
proposed system includes various parameters such as data
type, speed of transmission, coverage of system, size of the
coverage area and the number of vehicles to be closely
monitored.
Key Words: IoT (Internet of Things), Cloud computing,
RFID, Fingerprint sensor, IR sensor, Alcohol sensor, GSM,
Orientation Map Algorithm.
INTRODUCTION
World population has increased enormously with some
growth in technology. Nowadays more death is happening
because of accidents . A system is proposed in order to
detect an accident. Currently almost all the public own a
vehicle. Theft is happening on parking and constraints
driving securities. Vehicle accidentsand theftsare themajor
issues faced by the public. Violating the safety precautions,
traffic rules and regulations are the major causes . Though
many acts have been developed for preventing the vehicle
accidents, many of us are not obeying it. safe of the vehicle
is essential for the public .therefore several research group
and major motor cycle manufacturershave developedsafety
devices to protect riders from accidental injuries. however
good safety device for vehicle is difficult to implement andis
often expensive.
In current scenario, vehicle security is provided by
means of remote control access technology where a
keyless entry system (RKS) is used. A keyless entry system
is an electronic lock that control access to a vehicle
without using traditional mechanical key. It is widely used
in automobiles.
RKS (remote keyless system) performs the function of
standard car key without physical contact. Within few
yards the car can lock or unlock the doors by pressing a
button. The major disadvantage of this technology is that
the vehicle can be accessed by any person when the key
is stolen.
In the existing system various sensors are operating
independently whereas in our proposed system sensors
are operated in a sequence. These sensor operations are
implemented using embedded system. AnEmbeddedsystem
is a special purpose computer controlled electro-mechanical
system in which the computer is completelyencapsulatedby
the device it controls. An embedded system has specific
requirements and performs pre-defined task unlike a
general-purpose personal computer.
The core of any embedded system is a microprocessor
which is programmed to perform a few tasks (often just
one task). This is to be compared to other computer
systems with general purpose hardware and externally
loaded software . Embedded systems are often designed for
mass production.
Apart from these sensor operations fingerprint
authentication along with responsive GSM is used. This
technique provides strong anti-spoofing capabilities when
compared to other technologies. Asfingerprints are internal
to the body, it is difficult to duplicate. In responsive GSM
authorized person can give access rights to others.
A low cost vehicle authentication system is designed to
reduce loss of human lives and prevent thefts. Thus this
system reduces the probability of a severe injury or an
accident.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2868
RELATED WORK:
In [1] K . A . Manum , Z . Ashraf (2015) “ANTI-THEFT
VEHICLE SECURITY SYSTEM WITH PREVENTIVE ACTION”
Computer Science and Engineering(APWConCSE)Computer
Science and Engineering (APWC on CSE), intelligent,reliable,
effective and economical system for protection of vehiclesis
explained . The Anti- Theft Vehicle Security System (ATV2S)
has been designed and implemented utilizing sensor –
network system which employ Global Positioning System
(GPS) and Global system for mobile communication (GSM)
technology to track the vehicle. The cutting edge technology
of ATV2S is capable of protecting , monitoring and tracking
the vehicle within a minute. It is designed in such a way that
it will automatically inform the owner of the vehicle if
someone tries to access the vehicle. The owner receives the
phone call and he can lock the engine of the vehicle by
entering the predefined password to system. Theenginewill
unlock if and only if another password from the owner is
sent through mobile to the ATV2S. This self-monitoring
system is affordable and cost effective for personalusersnot
necessarily for vehicle but also for other security systems.
In [2] P. Jyothi , G. Harish (2016) “Design And
Implementation Of Real Time Vehicle Monitoring, Tracking
And Controlling System” International Conference on
Communication and Electronic Systems (ICCES) , an
advanced vehicle monitoring andtrackingsystemthatworks
on GPS / GSMmodule wherein the position is determinedon
the web page and monitored.The GPS is used to track the
current location of the vehicle while the GSM is used to send
the alert message to the owners mobile. If the driver drives
the vehicle on the wrong path or if the speed goes beyond a
specified value, an alert message will be sent from the
system to the owner’s mobile and speakers are driven for
alert. The vehicle speed is controlled using PWM pulses. To
protect the vehicle from over engine heat and gas leakages,
two sensors are used namely, LM35 sensorandgasdetection
sensor. If any one of the senor is being activated, authorized
person is alerted along with the GPS values.
In [3] Longhua Guo , Mianxiong Dong , Kaoru Ota , Quina Li ,
Tianpeng Ye, Jun Wu and Jianhua Li (2017)” A Secure
Mechanism for Big Data Collection in Large Scale Internet of
Vehicle” IEEE Internet of Thing, a secure mechanism for big
data collection in large scale Iov is proposed for improved
security performance and efficiency. The vehicles need to
register inorder to connect into the network and exchange
necessary information with the data center. These vehicles
associate with the big data center via mutual authentication
and single sign-on algorithm. Big data is collected by
employing two different secure protocols and stored in
distributed system using Hadoop architecture. In the
initialization phase, authentication towards all new adding
vehicle nodes forms the first security line of defense against
illegal nodes. After the initialization phase, the proposed
secure single sign-on algorithm improves the efficiency of
the logon protocol. Besides, the collected information is
transferred under protection until logout.
In [4] M.F. Saaid, M.A. Kamaludin, M.S.A. Megat Ali(2014)
“Vehicle Location Finder Using Global Position System and
Global System for Mobile” IEEE 5th Control and System
Graduate Research Colloquium , a controllable system that
can display the location of vehicle using Global position
system (GPS) to pin point the location and GlobalSystem for
Mobile (GSM) asa mean for communicating withthe vehicle
for ease of locating after a theft attempt. The system can be
used as location detector and guarding tool against vehicle
theft by combining a micro controller with GPS and GSM.
In [5] Mrinmoy Dey , Md. Akteruzzama Arif , Md. Asif
Mahmud (2017) “Anti-theft Protection of Vehicle by GSM &
GPS with Fingerprint Verification” InternationalConference
on Electrical, Computer and Communication Engineering
(ECCE) , single-board embedded system equipped with
global system for mobile (GSM) and global positioning
system (GPS) along with a microcontroller installed in the
vehicle. The use of GSM and GPS technologiesallowstotrack
the vehicle and provides the up-to date information. GPS
receiver receives messagesfrom satellites andthatisusedto
determine the satellite positions and time sent. Moreover,
fingerprint sensor is used for biometric verification which
ensures the driving of correct person. Optical sensor
technology is used for this purpose. Captured fingerimageis
digitally processed and stored in memory as a template.
Fingerprint matching algorithm is used to compare the
previously enrolled image for authentication. If vehicle’s
location is changed without fingerprint verification, the GPS
engine will collect the co-ordinate of thatplaceandsendSMS
to the owner of the vehicle. The implemented system is very
simple with greater security against vehicletheftandisalow
cost technique compared to others.
In [6] Liu , Anqi Zhang , Shaojun Li (2013) "Vehicle anti-theft
tracking system based on Internet of things" , Vehicular
Electronics and Safety (ICVES) ,IEEE International
Conference , Anti-theft monitoring system based on GPS,
GSM system and android application, controlled by an RFID
module to swirch ON / OFF . When the car is stolen, the
vibration sensors and pyroelectricinfraredsensorsmounted
inside the vehicle are triggered and GSM module will send
the location information to the owners mobile phone. This
system uses android mobile phones as terminal which is
more convenient and flexible to locate andmonitorthecarin
real time. Thusthe owner can check and track thepositionof
car immediately with androidmobilephoneapplicationonce
the car is stolen .
PROPOSED SYSTEM:
For driver security, we have integrated IR sensor and
Alcohol sensor. IR sensor is used for detection of seat belt.
While alcohol sensor will return the alcohol concentration.
The driver will be alerted once the concentration reaches
beyond the threshold value. For each module, voice output
would be triggered. If ignored, relay is being activatedwhich
will then stop down the car. To overcome vehicle thefts,
proposed system involves authentication by means of RFID
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2869
and fingerprint sensor where only the authorized person is
passed and vehicle ignition will be initiated. For fingerprint
feature extraction, we used OrientationMapAlgorithm(OM).
Keypad is been integrated to Enroll, Identify and Delete the
fingerprint images. If any other person other than the
authorized person is trying to access the vehicle,
responsive GSM will be initiated and only the authorized
person can give the permission rights. The vehicle ignition
is then switched ON / OFF. The driver authentication details
like fingerprint and license numbers are stored on the local
kit. For updating into IoT server we are using GSM module.
For microcontroller we are using PIC microcontroller.These
sensor data are being monitored on the website by the
owner of the vehicle.
METHEDOLOGY:
Orientation map technique represents the direction of
the ridges. The fingerprint image is divided into number of
non-overlapping blocksand an orientation representativeof
the ridges in the block is assigned to the block based on
analysis of grayscale gradients in the block. The block size
depends on the inter ridge distance.
Overall 95% of the fingerprint can be classified in five
classed. The five classes are as follows, arch (A), tented arch
(T), right loop (R), left loop (L) and whorl (W). The T and A
classes may be combined into one single class resulting in
four classes. The orientation algorithm provides pattern
which are easy to identify the classes.
A core point is the turning point of an inner-mostridgeanda
delta point is a place where two ridges running side by side
diverge. Orientation field, dominant ridge flow and singular
points are useful features for classification. An orientation
field contains information about the local dominant
orientations of fingerprint ridges, from which featuressuch
as singular points and dominant ridge line flow can be
derived. The dominant ridge flow is represented by a set of
curves running parallel to the ridgeslinesbutnotnecessarily
coinciding with ridges and valleys. Singular points of the
fingerprints, called core and delta, are marked as filled
circles and triangles, respectively.
Three dominant ridge flow curves and the orientation field
consisting of fingerprint local orientations is representedby
short lines.
CONCLUSIONS
This system provides a novel safety function for predictive
prevention of accidentsand loss of vehicle. Measuressuchas
alcohol consumption detection, seat belt detection and
biometric authentication are being implemented. The
sensors will collect data from the environment. If the data
obtained reaches beyond the threshold value, the relay is
being activated while simultaneously the voiceo/pwouldbe
triggered. This accident avoidance frameworkensuresthatit
is mandatory for the user to wear a seat belt while driving
and prohibits unauthorized access towards the vehicle.
FUTURE ENHANCEMENT
The reliable intelligent driver assistance system and safety
warning system is a long way to go. New sensing
technologies can be highly beneficial to the system
environment. As computing power, sensing capacity and
wireless connectivity for vehicles rapidly increases, the
concept of assisted driving and proactive safety warning is
heading towardsreality. The system can befurtherextended
to include different maneuvers to make the driving system
capable of dealing with various driving environment. With
current and growing awareness towards the importance of
security, trustworthy vehicle autonomous system can be
deployed.
Rfid reader
Fingerprint
sensor
Alcohol sensor
IR sensor
PIC16F877A
MICRO-
CONTROLLER
Power Supply
LCD Display
Gsm Iot
Voice
IC
Speaker
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2870
Vision sensors and SAS’s or drivers physiological signals
such as ECG or PPG and the driving behavior of individual
drivers can be monitored. This may require furtherresearch
on analog signals processing techniques since physiological
signals are weak and are vulnerable to noise and
interferences. These technologies will further reduce
accidents due to driversincapacitation andenhancesafetyof
automobile users.
REFERENCES
[1] K . A . Manum , Z . Ashraf (2015) “Anti-theft vehicle
security system with preventive action” Computer
Science and Engineerig(APWC on CSE)
[2] P. Jyothi , G. Harish (2016) “Design And Implementation
Of Real Time Vehicle Monitoring, Tracking And
Controlling System” International Conference on
Communication and Electronic Systems (ICCES)
[3] Longhua Guo, Mianxiong Dong, Quina Li, Tianpeng Ye,
Jun Wu and Jianhua Li (2017) “ A Secure Mechanism for
Big Data Collection in Large Scale Internet of Vehicles”
IEEE Internet of Things Journal
[4] M.F. Saaid, M.A. Kamaludin, M.S.A. Megat Ali(2014)
“Vehicle Location Finder Using Global Position System
and Global System for Mobile” IEEE 5th Control and
System Graduate Research Colloquium
[5] Mrinmoy Dey , Md. Akteruzzama Arif , Md. Asif Mahmud
(2017) “Anti-theft Protection of Vehicle by GSM & GPS
with Fingerprint Verification” International Conference
on Electrical, Computer and Communication
Engineering (ECCE)
[6] Liu , Anqi Zhang , Shaojun Li (2013) "Vehicle anti-theft
tracking system based on Internet of things" , Vehicular
Electronics and Safety (ICVES), IEEE International
Conference

More Related Content

What's hot

IRJET- Review Paper on Iot Based Technology in Automobiles
IRJET-  	  Review Paper on Iot Based Technology in AutomobilesIRJET-  	  Review Paper on Iot Based Technology in Automobiles
IRJET- Review Paper on Iot Based Technology in AutomobilesIRJET Journal
 
Vehicle anti theft system based on an embedded platform
Vehicle anti theft system based on an embedded platformVehicle anti theft system based on an embedded platform
Vehicle anti theft system based on an embedded platformeSAT Journals
 
A PROPOSED MODEL FOR TRAFFIC SIGNAL PREEMPTION USING GLOBAL POSITIONING SYSTE...
A PROPOSED MODEL FOR TRAFFIC SIGNAL PREEMPTION USING GLOBAL POSITIONING SYSTE...A PROPOSED MODEL FOR TRAFFIC SIGNAL PREEMPTION USING GLOBAL POSITIONING SYSTE...
A PROPOSED MODEL FOR TRAFFIC SIGNAL PREEMPTION USING GLOBAL POSITIONING SYSTE...csandit
 
Mobile safety systems for automobiles
Mobile safety systems for automobilesMobile safety systems for automobiles
Mobile safety systems for automobilesIAEME Publication
 
Mobile safety systems for automobiles
Mobile safety systems for automobilesMobile safety systems for automobiles
Mobile safety systems for automobilesiaemedu
 
IRJET- Smart Helmet for Accident Prevention
IRJET- Smart Helmet for Accident PreventionIRJET- Smart Helmet for Accident Prevention
IRJET- Smart Helmet for Accident PreventionIRJET Journal
 
Real Time Driver Monitoring and Accident Avoidence Alerting System
 	  Real Time Driver Monitoring and Accident Avoidence Alerting System 	  Real Time Driver Monitoring and Accident Avoidence Alerting System
Real Time Driver Monitoring and Accident Avoidence Alerting SystemIRJET Journal
 
IRJET- Smart Vehicle with Crash Detection and Emergency Vehicle Dispatch with...
IRJET- Smart Vehicle with Crash Detection and Emergency Vehicle Dispatch with...IRJET- Smart Vehicle with Crash Detection and Emergency Vehicle Dispatch with...
IRJET- Smart Vehicle with Crash Detection and Emergency Vehicle Dispatch with...IRJET Journal
 
Ieeepro techno solutions ieee 2013 embedded project gravity lock next gen...
Ieeepro techno solutions    ieee 2013 embedded project  gravity lock next gen...Ieeepro techno solutions    ieee 2013 embedded project  gravity lock next gen...
Ieeepro techno solutions ieee 2013 embedded project gravity lock next gen...srinivasanece7
 
Traffic Monitoring and Control System Using IoT
Traffic Monitoring and Control System Using IoTTraffic Monitoring and Control System Using IoT
Traffic Monitoring and Control System Using IoTijtsrd
 
An Automatic Car Engine Startup and Brake Oil Monitoring Using Sensors
An Automatic Car Engine Startup and Brake Oil Monitoring Using SensorsAn Automatic Car Engine Startup and Brake Oil Monitoring Using Sensors
An Automatic Car Engine Startup and Brake Oil Monitoring Using SensorsIJRES Journal
 
IRJET - Intelligent Safety Helmet
IRJET -  	  Intelligent Safety HelmetIRJET -  	  Intelligent Safety Helmet
IRJET - Intelligent Safety HelmetIRJET Journal
 
1. 10077 12326-1-pb
1. 10077 12326-1-pb1. 10077 12326-1-pb
1. 10077 12326-1-pbIAESIJEECS
 
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemInginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemIJSRED
 
Smart automobile security system using labview
Smart automobile security system using labviewSmart automobile security system using labview
Smart automobile security system using labvieweSAT Publishing House
 
IRJET- Implementation of Smart Secure System in Motorbike using Bluetooth...
IRJET-  	  Implementation of Smart Secure System in Motorbike using Bluetooth...IRJET-  	  Implementation of Smart Secure System in Motorbike using Bluetooth...
IRJET- Implementation of Smart Secure System in Motorbike using Bluetooth...IRJET Journal
 
THE SMART PARKING MANAGEMENT SYSTEM
THE SMART PARKING MANAGEMENT SYSTEMTHE SMART PARKING MANAGEMENT SYSTEM
THE SMART PARKING MANAGEMENT SYSTEMijcsit
 
SMART MONITORING OF AUTOMOBILE USING IOT
SMART MONITORING OF AUTOMOBILE USING IOTSMART MONITORING OF AUTOMOBILE USING IOT
SMART MONITORING OF AUTOMOBILE USING IOTJournal For Research
 
IRJET- High Responsive Smart Parking System using IoT
IRJET- High Responsive Smart Parking System using IoTIRJET- High Responsive Smart Parking System using IoT
IRJET- High Responsive Smart Parking System using IoTIRJET Journal
 

What's hot (20)

IRJET- Review Paper on Iot Based Technology in Automobiles
IRJET-  	  Review Paper on Iot Based Technology in AutomobilesIRJET-  	  Review Paper on Iot Based Technology in Automobiles
IRJET- Review Paper on Iot Based Technology in Automobiles
 
Vehicle anti theft system based on an embedded platform
Vehicle anti theft system based on an embedded platformVehicle anti theft system based on an embedded platform
Vehicle anti theft system based on an embedded platform
 
A PROPOSED MODEL FOR TRAFFIC SIGNAL PREEMPTION USING GLOBAL POSITIONING SYSTE...
A PROPOSED MODEL FOR TRAFFIC SIGNAL PREEMPTION USING GLOBAL POSITIONING SYSTE...A PROPOSED MODEL FOR TRAFFIC SIGNAL PREEMPTION USING GLOBAL POSITIONING SYSTE...
A PROPOSED MODEL FOR TRAFFIC SIGNAL PREEMPTION USING GLOBAL POSITIONING SYSTE...
 
Mobile safety systems for automobiles
Mobile safety systems for automobilesMobile safety systems for automobiles
Mobile safety systems for automobiles
 
Mobile safety systems for automobiles
Mobile safety systems for automobilesMobile safety systems for automobiles
Mobile safety systems for automobiles
 
IRJET- Smart Helmet for Accident Prevention
IRJET- Smart Helmet for Accident PreventionIRJET- Smart Helmet for Accident Prevention
IRJET- Smart Helmet for Accident Prevention
 
Real Time Driver Monitoring and Accident Avoidence Alerting System
 	  Real Time Driver Monitoring and Accident Avoidence Alerting System 	  Real Time Driver Monitoring and Accident Avoidence Alerting System
Real Time Driver Monitoring and Accident Avoidence Alerting System
 
Algorithm for Security in Autonomous Cars
Algorithm for Security in Autonomous CarsAlgorithm for Security in Autonomous Cars
Algorithm for Security in Autonomous Cars
 
IRJET- Smart Vehicle with Crash Detection and Emergency Vehicle Dispatch with...
IRJET- Smart Vehicle with Crash Detection and Emergency Vehicle Dispatch with...IRJET- Smart Vehicle with Crash Detection and Emergency Vehicle Dispatch with...
IRJET- Smart Vehicle with Crash Detection and Emergency Vehicle Dispatch with...
 
Ieeepro techno solutions ieee 2013 embedded project gravity lock next gen...
Ieeepro techno solutions    ieee 2013 embedded project  gravity lock next gen...Ieeepro techno solutions    ieee 2013 embedded project  gravity lock next gen...
Ieeepro techno solutions ieee 2013 embedded project gravity lock next gen...
 
Traffic Monitoring and Control System Using IoT
Traffic Monitoring and Control System Using IoTTraffic Monitoring and Control System Using IoT
Traffic Monitoring and Control System Using IoT
 
An Automatic Car Engine Startup and Brake Oil Monitoring Using Sensors
An Automatic Car Engine Startup and Brake Oil Monitoring Using SensorsAn Automatic Car Engine Startup and Brake Oil Monitoring Using Sensors
An Automatic Car Engine Startup and Brake Oil Monitoring Using Sensors
 
IRJET - Intelligent Safety Helmet
IRJET -  	  Intelligent Safety HelmetIRJET -  	  Intelligent Safety Helmet
IRJET - Intelligent Safety Helmet
 
1. 10077 12326-1-pb
1. 10077 12326-1-pb1. 10077 12326-1-pb
1. 10077 12326-1-pb
 
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemInginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition System
 
Smart automobile security system using labview
Smart automobile security system using labviewSmart automobile security system using labview
Smart automobile security system using labview
 
IRJET- Implementation of Smart Secure System in Motorbike using Bluetooth...
IRJET-  	  Implementation of Smart Secure System in Motorbike using Bluetooth...IRJET-  	  Implementation of Smart Secure System in Motorbike using Bluetooth...
IRJET- Implementation of Smart Secure System in Motorbike using Bluetooth...
 
THE SMART PARKING MANAGEMENT SYSTEM
THE SMART PARKING MANAGEMENT SYSTEMTHE SMART PARKING MANAGEMENT SYSTEM
THE SMART PARKING MANAGEMENT SYSTEM
 
SMART MONITORING OF AUTOMOBILE USING IOT
SMART MONITORING OF AUTOMOBILE USING IOTSMART MONITORING OF AUTOMOBILE USING IOT
SMART MONITORING OF AUTOMOBILE USING IOT
 
IRJET- High Responsive Smart Parking System using IoT
IRJET- High Responsive Smart Parking System using IoTIRJET- High Responsive Smart Parking System using IoT
IRJET- High Responsive Smart Parking System using IoT
 

Similar to IRJET- Automative Impregnable Driving System

An Overview of Traffic Accident Detection System using IoT
An Overview of Traffic Accident Detection System using IoTAn Overview of Traffic Accident Detection System using IoT
An Overview of Traffic Accident Detection System using IoTIRJET Journal
 
A review study on Vehicle Anti-Theft Immobilization System using Face Recogni...
A review study on Vehicle Anti-Theft Immobilization System using Face Recogni...A review study on Vehicle Anti-Theft Immobilization System using Face Recogni...
A review study on Vehicle Anti-Theft Immobilization System using Face Recogni...IRJET Journal
 
GPS GSM Based Vehicle Tracking & Locking System
GPS GSM Based Vehicle Tracking  &  Locking SystemGPS GSM Based Vehicle Tracking  &  Locking System
GPS GSM Based Vehicle Tracking & Locking SystemIRJET Journal
 
Smart theft detection of vehicles by GSM and GPS with fingerprint verification
Smart theft detection of vehicles by GSM and GPS with fingerprint verificationSmart theft detection of vehicles by GSM and GPS with fingerprint verification
Smart theft detection of vehicles by GSM and GPS with fingerprint verificationIRJET Journal
 
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET Journal
 
Smart Parking with Multi layered Security
Smart Parking with Multi layered SecuritySmart Parking with Multi layered Security
Smart Parking with Multi layered SecurityIRJET Journal
 
Vehicle anti theft system based on an embedded
Vehicle anti theft system based on an embeddedVehicle anti theft system based on an embedded
Vehicle anti theft system based on an embeddedeSAT Publishing House
 
Intelligent vehicle using embedded system
Intelligent vehicle using embedded systemIntelligent vehicle using embedded system
Intelligent vehicle using embedded systemijiert bestjournal
 
Personalized Driver Alerting System using object detection
Personalized Driver Alerting System using object detectionPersonalized Driver Alerting System using object detection
Personalized Driver Alerting System using object detectionIRJET Journal
 
IoT Based Accident Avoidance and Detection System for Two Wheelers
IoT Based Accident Avoidance and Detection System for Two WheelersIoT Based Accident Avoidance and Detection System for Two Wheelers
IoT Based Accident Avoidance and Detection System for Two WheelersIJASRD Journal
 
IRJET- Vehicle Monitoring System using Internet of Things
IRJET- Vehicle Monitoring System using Internet of ThingsIRJET- Vehicle Monitoring System using Internet of Things
IRJET- Vehicle Monitoring System using Internet of ThingsIRJET Journal
 
ADVANCED BIKE SECURITY SYSTEM USING GSM AND GPS
ADVANCED BIKE SECURITY SYSTEM USING GSM AND GPSADVANCED BIKE SECURITY SYSTEM USING GSM AND GPS
ADVANCED BIKE SECURITY SYSTEM USING GSM AND GPSEG TECHNOLOGIES
 
IRJET - Smart Transportation Monitoring System
IRJET - Smart Transportation Monitoring SystemIRJET - Smart Transportation Monitoring System
IRJET - Smart Transportation Monitoring SystemIRJET Journal
 
Smart Security System for Automobiles using IoT
Smart Security System for Automobiles using IoTSmart Security System for Automobiles using IoT
Smart Security System for Automobiles using IoTijtsrd
 
Internet of Things Based Vehicle Monitoring System
Internet of Things Based Vehicle Monitoring SystemInternet of Things Based Vehicle Monitoring System
Internet of Things Based Vehicle Monitoring SystemIRJET Journal
 
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationAdvanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationIRJET Journal
 
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationAdvanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationIRJET Journal
 

Similar to IRJET- Automative Impregnable Driving System (20)

An Overview of Traffic Accident Detection System using IoT
An Overview of Traffic Accident Detection System using IoTAn Overview of Traffic Accident Detection System using IoT
An Overview of Traffic Accident Detection System using IoT
 
A review study on Vehicle Anti-Theft Immobilization System using Face Recogni...
A review study on Vehicle Anti-Theft Immobilization System using Face Recogni...A review study on Vehicle Anti-Theft Immobilization System using Face Recogni...
A review study on Vehicle Anti-Theft Immobilization System using Face Recogni...
 
GPS GSM Based Vehicle Tracking & Locking System
GPS GSM Based Vehicle Tracking  &  Locking SystemGPS GSM Based Vehicle Tracking  &  Locking System
GPS GSM Based Vehicle Tracking & Locking System
 
Smart theft detection of vehicles by GSM and GPS with fingerprint verification
Smart theft detection of vehicles by GSM and GPS with fingerprint verificationSmart theft detection of vehicles by GSM and GPS with fingerprint verification
Smart theft detection of vehicles by GSM and GPS with fingerprint verification
 
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’S
 
Smart Parking with Multi layered Security
Smart Parking with Multi layered SecuritySmart Parking with Multi layered Security
Smart Parking with Multi layered Security
 
Vehicle anti theft system based on an embedded
Vehicle anti theft system based on an embeddedVehicle anti theft system based on an embedded
Vehicle anti theft system based on an embedded
 
Intelligent vehicle using embedded system
Intelligent vehicle using embedded systemIntelligent vehicle using embedded system
Intelligent vehicle using embedded system
 
Personalized Driver Alerting System using object detection
Personalized Driver Alerting System using object detectionPersonalized Driver Alerting System using object detection
Personalized Driver Alerting System using object detection
 
IoT Based Accident Avoidance and Detection System for Two Wheelers
IoT Based Accident Avoidance and Detection System for Two WheelersIoT Based Accident Avoidance and Detection System for Two Wheelers
IoT Based Accident Avoidance and Detection System for Two Wheelers
 
IRJET- Vehicle Monitoring System using Internet of Things
IRJET- Vehicle Monitoring System using Internet of ThingsIRJET- Vehicle Monitoring System using Internet of Things
IRJET- Vehicle Monitoring System using Internet of Things
 
ADVANCED BIKE SECURITY SYSTEM USING GSM AND GPS
ADVANCED BIKE SECURITY SYSTEM USING GSM AND GPSADVANCED BIKE SECURITY SYSTEM USING GSM AND GPS
ADVANCED BIKE SECURITY SYSTEM USING GSM AND GPS
 
40120140504005
4012014050400540120140504005
40120140504005
 
40120140504005 2
40120140504005 240120140504005 2
40120140504005 2
 
Final report
Final reportFinal report
Final report
 
IRJET - Smart Transportation Monitoring System
IRJET - Smart Transportation Monitoring SystemIRJET - Smart Transportation Monitoring System
IRJET - Smart Transportation Monitoring System
 
Smart Security System for Automobiles using IoT
Smart Security System for Automobiles using IoTSmart Security System for Automobiles using IoT
Smart Security System for Automobiles using IoT
 
Internet of Things Based Vehicle Monitoring System
Internet of Things Based Vehicle Monitoring SystemInternet of Things Based Vehicle Monitoring System
Internet of Things Based Vehicle Monitoring System
 
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationAdvanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle Communication
 
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationAdvanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle Communication
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 

Recently uploaded (20)

Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 

IRJET- Automative Impregnable Driving System

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2867 AUTOMATIVE IMPREGNABLE DRIVING SYSTEM P.Prapthi1, K,Raghavi2, M.Sandhiya3 1,2,3 Student , Dept. of Information Technology, Valliammai Engineering College ,Chennai ,Tamil Nadu ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud computing and Internet of Things (IoT) are two different technologies that are already a part of our life, their application and use is expected to be more and more pervasive that enables an ubiquitous access to the sharedpool of resources and services. Internet of Things (IoT) is becoming increasingly important for Vehicle Monitoring, Medical Treatment, Home Automation and other industrial applications.The system proposed continuously monitors the status of the vehicle and overcomes issues like theft on the parking , driving insecurity and rise in death due to accidents. The safe of vehicles is extremely essential for public . Therefore, several research groups and major motorcycle manufacturers have developed safety devices toprotectriders from accidental injuries. However, good safety device for vehicle is difficult to implement and very expensive. In this system, authentication of drivers is provided by meansofRFID and Fingerprint sensor. Also for driver security, we have integrated IR sensor (seat belt) and Alcohol sensor (alcohol consumption). For each module, voice output would be triggered. Proposed system involves authentication of drivers & provide solutions to overcome the vehicle thefts. In fingerprint authentication, only the authorized person is passed and vehicle ignition will be initiated. For fingerprint feature extraction, we used Orientation Map algorithm. Keypad is been integrated to Enroll, Identify and Delete. Ifany other person rather than the authorized person is trying to access the vehicle, responsive GSM will be initiated and only the authorized person can give the permission rights. After this the vehicle ignition is switched ON / OFF. Finally,the sensor data and driver personal details like name and license number are transmitted to the IoT server. The result of the proposed system includes various parameters such as data type, speed of transmission, coverage of system, size of the coverage area and the number of vehicles to be closely monitored. Key Words: IoT (Internet of Things), Cloud computing, RFID, Fingerprint sensor, IR sensor, Alcohol sensor, GSM, Orientation Map Algorithm. INTRODUCTION World population has increased enormously with some growth in technology. Nowadays more death is happening because of accidents . A system is proposed in order to detect an accident. Currently almost all the public own a vehicle. Theft is happening on parking and constraints driving securities. Vehicle accidentsand theftsare themajor issues faced by the public. Violating the safety precautions, traffic rules and regulations are the major causes . Though many acts have been developed for preventing the vehicle accidents, many of us are not obeying it. safe of the vehicle is essential for the public .therefore several research group and major motor cycle manufacturershave developedsafety devices to protect riders from accidental injuries. however good safety device for vehicle is difficult to implement andis often expensive. In current scenario, vehicle security is provided by means of remote control access technology where a keyless entry system (RKS) is used. A keyless entry system is an electronic lock that control access to a vehicle without using traditional mechanical key. It is widely used in automobiles. RKS (remote keyless system) performs the function of standard car key without physical contact. Within few yards the car can lock or unlock the doors by pressing a button. The major disadvantage of this technology is that the vehicle can be accessed by any person when the key is stolen. In the existing system various sensors are operating independently whereas in our proposed system sensors are operated in a sequence. These sensor operations are implemented using embedded system. AnEmbeddedsystem is a special purpose computer controlled electro-mechanical system in which the computer is completelyencapsulatedby the device it controls. An embedded system has specific requirements and performs pre-defined task unlike a general-purpose personal computer. The core of any embedded system is a microprocessor which is programmed to perform a few tasks (often just one task). This is to be compared to other computer systems with general purpose hardware and externally loaded software . Embedded systems are often designed for mass production. Apart from these sensor operations fingerprint authentication along with responsive GSM is used. This technique provides strong anti-spoofing capabilities when compared to other technologies. Asfingerprints are internal to the body, it is difficult to duplicate. In responsive GSM authorized person can give access rights to others. A low cost vehicle authentication system is designed to reduce loss of human lives and prevent thefts. Thus this system reduces the probability of a severe injury or an accident.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2868 RELATED WORK: In [1] K . A . Manum , Z . Ashraf (2015) “ANTI-THEFT VEHICLE SECURITY SYSTEM WITH PREVENTIVE ACTION” Computer Science and Engineering(APWConCSE)Computer Science and Engineering (APWC on CSE), intelligent,reliable, effective and economical system for protection of vehiclesis explained . The Anti- Theft Vehicle Security System (ATV2S) has been designed and implemented utilizing sensor – network system which employ Global Positioning System (GPS) and Global system for mobile communication (GSM) technology to track the vehicle. The cutting edge technology of ATV2S is capable of protecting , monitoring and tracking the vehicle within a minute. It is designed in such a way that it will automatically inform the owner of the vehicle if someone tries to access the vehicle. The owner receives the phone call and he can lock the engine of the vehicle by entering the predefined password to system. Theenginewill unlock if and only if another password from the owner is sent through mobile to the ATV2S. This self-monitoring system is affordable and cost effective for personalusersnot necessarily for vehicle but also for other security systems. In [2] P. Jyothi , G. Harish (2016) “Design And Implementation Of Real Time Vehicle Monitoring, Tracking And Controlling System” International Conference on Communication and Electronic Systems (ICCES) , an advanced vehicle monitoring andtrackingsystemthatworks on GPS / GSMmodule wherein the position is determinedon the web page and monitored.The GPS is used to track the current location of the vehicle while the GSM is used to send the alert message to the owners mobile. If the driver drives the vehicle on the wrong path or if the speed goes beyond a specified value, an alert message will be sent from the system to the owner’s mobile and speakers are driven for alert. The vehicle speed is controlled using PWM pulses. To protect the vehicle from over engine heat and gas leakages, two sensors are used namely, LM35 sensorandgasdetection sensor. If any one of the senor is being activated, authorized person is alerted along with the GPS values. In [3] Longhua Guo , Mianxiong Dong , Kaoru Ota , Quina Li , Tianpeng Ye, Jun Wu and Jianhua Li (2017)” A Secure Mechanism for Big Data Collection in Large Scale Internet of Vehicle” IEEE Internet of Thing, a secure mechanism for big data collection in large scale Iov is proposed for improved security performance and efficiency. The vehicles need to register inorder to connect into the network and exchange necessary information with the data center. These vehicles associate with the big data center via mutual authentication and single sign-on algorithm. Big data is collected by employing two different secure protocols and stored in distributed system using Hadoop architecture. In the initialization phase, authentication towards all new adding vehicle nodes forms the first security line of defense against illegal nodes. After the initialization phase, the proposed secure single sign-on algorithm improves the efficiency of the logon protocol. Besides, the collected information is transferred under protection until logout. In [4] M.F. Saaid, M.A. Kamaludin, M.S.A. Megat Ali(2014) “Vehicle Location Finder Using Global Position System and Global System for Mobile” IEEE 5th Control and System Graduate Research Colloquium , a controllable system that can display the location of vehicle using Global position system (GPS) to pin point the location and GlobalSystem for Mobile (GSM) asa mean for communicating withthe vehicle for ease of locating after a theft attempt. The system can be used as location detector and guarding tool against vehicle theft by combining a micro controller with GPS and GSM. In [5] Mrinmoy Dey , Md. Akteruzzama Arif , Md. Asif Mahmud (2017) “Anti-theft Protection of Vehicle by GSM & GPS with Fingerprint Verification” InternationalConference on Electrical, Computer and Communication Engineering (ECCE) , single-board embedded system equipped with global system for mobile (GSM) and global positioning system (GPS) along with a microcontroller installed in the vehicle. The use of GSM and GPS technologiesallowstotrack the vehicle and provides the up-to date information. GPS receiver receives messagesfrom satellites andthatisusedto determine the satellite positions and time sent. Moreover, fingerprint sensor is used for biometric verification which ensures the driving of correct person. Optical sensor technology is used for this purpose. Captured fingerimageis digitally processed and stored in memory as a template. Fingerprint matching algorithm is used to compare the previously enrolled image for authentication. If vehicle’s location is changed without fingerprint verification, the GPS engine will collect the co-ordinate of thatplaceandsendSMS to the owner of the vehicle. The implemented system is very simple with greater security against vehicletheftandisalow cost technique compared to others. In [6] Liu , Anqi Zhang , Shaojun Li (2013) "Vehicle anti-theft tracking system based on Internet of things" , Vehicular Electronics and Safety (ICVES) ,IEEE International Conference , Anti-theft monitoring system based on GPS, GSM system and android application, controlled by an RFID module to swirch ON / OFF . When the car is stolen, the vibration sensors and pyroelectricinfraredsensorsmounted inside the vehicle are triggered and GSM module will send the location information to the owners mobile phone. This system uses android mobile phones as terminal which is more convenient and flexible to locate andmonitorthecarin real time. Thusthe owner can check and track thepositionof car immediately with androidmobilephoneapplicationonce the car is stolen . PROPOSED SYSTEM: For driver security, we have integrated IR sensor and Alcohol sensor. IR sensor is used for detection of seat belt. While alcohol sensor will return the alcohol concentration. The driver will be alerted once the concentration reaches beyond the threshold value. For each module, voice output would be triggered. If ignored, relay is being activatedwhich will then stop down the car. To overcome vehicle thefts, proposed system involves authentication by means of RFID
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2869 and fingerprint sensor where only the authorized person is passed and vehicle ignition will be initiated. For fingerprint feature extraction, we used OrientationMapAlgorithm(OM). Keypad is been integrated to Enroll, Identify and Delete the fingerprint images. If any other person other than the authorized person is trying to access the vehicle, responsive GSM will be initiated and only the authorized person can give the permission rights. The vehicle ignition is then switched ON / OFF. The driver authentication details like fingerprint and license numbers are stored on the local kit. For updating into IoT server we are using GSM module. For microcontroller we are using PIC microcontroller.These sensor data are being monitored on the website by the owner of the vehicle. METHEDOLOGY: Orientation map technique represents the direction of the ridges. The fingerprint image is divided into number of non-overlapping blocksand an orientation representativeof the ridges in the block is assigned to the block based on analysis of grayscale gradients in the block. The block size depends on the inter ridge distance. Overall 95% of the fingerprint can be classified in five classed. The five classes are as follows, arch (A), tented arch (T), right loop (R), left loop (L) and whorl (W). The T and A classes may be combined into one single class resulting in four classes. The orientation algorithm provides pattern which are easy to identify the classes. A core point is the turning point of an inner-mostridgeanda delta point is a place where two ridges running side by side diverge. Orientation field, dominant ridge flow and singular points are useful features for classification. An orientation field contains information about the local dominant orientations of fingerprint ridges, from which featuressuch as singular points and dominant ridge line flow can be derived. The dominant ridge flow is represented by a set of curves running parallel to the ridgeslinesbutnotnecessarily coinciding with ridges and valleys. Singular points of the fingerprints, called core and delta, are marked as filled circles and triangles, respectively. Three dominant ridge flow curves and the orientation field consisting of fingerprint local orientations is representedby short lines. CONCLUSIONS This system provides a novel safety function for predictive prevention of accidentsand loss of vehicle. Measuressuchas alcohol consumption detection, seat belt detection and biometric authentication are being implemented. The sensors will collect data from the environment. If the data obtained reaches beyond the threshold value, the relay is being activated while simultaneously the voiceo/pwouldbe triggered. This accident avoidance frameworkensuresthatit is mandatory for the user to wear a seat belt while driving and prohibits unauthorized access towards the vehicle. FUTURE ENHANCEMENT The reliable intelligent driver assistance system and safety warning system is a long way to go. New sensing technologies can be highly beneficial to the system environment. As computing power, sensing capacity and wireless connectivity for vehicles rapidly increases, the concept of assisted driving and proactive safety warning is heading towardsreality. The system can befurtherextended to include different maneuvers to make the driving system capable of dealing with various driving environment. With current and growing awareness towards the importance of security, trustworthy vehicle autonomous system can be deployed. Rfid reader Fingerprint sensor Alcohol sensor IR sensor PIC16F877A MICRO- CONTROLLER Power Supply LCD Display Gsm Iot Voice IC Speaker
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2870 Vision sensors and SAS’s or drivers physiological signals such as ECG or PPG and the driving behavior of individual drivers can be monitored. This may require furtherresearch on analog signals processing techniques since physiological signals are weak and are vulnerable to noise and interferences. These technologies will further reduce accidents due to driversincapacitation andenhancesafetyof automobile users. REFERENCES [1] K . A . Manum , Z . Ashraf (2015) “Anti-theft vehicle security system with preventive action” Computer Science and Engineerig(APWC on CSE) [2] P. Jyothi , G. Harish (2016) “Design And Implementation Of Real Time Vehicle Monitoring, Tracking And Controlling System” International Conference on Communication and Electronic Systems (ICCES) [3] Longhua Guo, Mianxiong Dong, Quina Li, Tianpeng Ye, Jun Wu and Jianhua Li (2017) “ A Secure Mechanism for Big Data Collection in Large Scale Internet of Vehicles” IEEE Internet of Things Journal [4] M.F. Saaid, M.A. Kamaludin, M.S.A. Megat Ali(2014) “Vehicle Location Finder Using Global Position System and Global System for Mobile” IEEE 5th Control and System Graduate Research Colloquium [5] Mrinmoy Dey , Md. Akteruzzama Arif , Md. Asif Mahmud (2017) “Anti-theft Protection of Vehicle by GSM & GPS with Fingerprint Verification” International Conference on Electrical, Computer and Communication Engineering (ECCE) [6] Liu , Anqi Zhang , Shaojun Li (2013) "Vehicle anti-theft tracking system based on Internet of things" , Vehicular Electronics and Safety (ICVES), IEEE International Conference