SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1529
RAT Trap: Home Surveillance System Using IoT & AI
Raj Chauhan1, Aditya Gidh1, Trisha Gupta1, Dr. Sanjay Sharma2
1Graduate Student, Dept. of Computer Engineering, New Horizon Institute of Technology and Management
Mumbai, India
2 Head Of Department, Dept. of Computer Engineering, New Horizon Institute of Technology and Management
Mumbai, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - We live in a world where breaking and entering,
burglary and trespassing are increasing day byday. Keepinga
check at home while giving security measures to the
homeowner and complete control of what is happeninginand
around the house is very important at this time. Because of
the increasing number of threats and disruptionsthatoccur in
the community, all residential households needasecurityplan
to live a better life with safety. Home automation is about
comfort, efficiency, and savings, improving one's standard of
living. Home security has made major changes in the last few
decades and will continue to improve gradually in future.
Previously home security systems meant having an alarm
sounded when someone broke in butasmartsecurehomedoes
more than that. The proposedsystemcomprisesacombination
of a unique wedge lock mechanism, a Linear Actuator,
Raspberry Pi, Camera Module attached to it. The system will
help users to protect their homes with facial recognition by
installing it on doors or windows and monitor activities with
their smartphones. Using the concept of Internet of Things
(IoT), we can develop a Smart Home Security System, which
would be efficient enough and take necessary actions
accordingly. The proposed system canbethefirststeptowards
safer housing facilities.
Key Words: Raspberry Pi, IoT, Facial Recognition, Wedge
Lock Mechanism, Linear Actuator, Camera Module
1. INTRODUCTION
Smart Homes is the beginning of a new era in the field of
home Security. With an integrated alarm system, the user
can easily arm and disarm the home to the convenience of
their smartphones no matter where the user is. Automating
the tasks or jobs without human intervention is needed
these days. With the recent invention of the voice assistants
and the flexibility, it is providing us to connect any
electronics things have become popular these days. The
Internet of Things can be used to describe physical objects
(or groups of such objects) embedded with sensors,
processing ability, and software. A good locking mechanism
makes the house more secure for any Intrusion as well as
loss. A huge advantage of linear actuator design is that when
a perpendicular external forceisappliedtheactuatordoesn’t
feel any kind of force as the cosine component of that force
becomes zero.
Artificial Intelligence plays a prerequisite role in smart
homes. Specific applications of AI include expert systems,
natural language processing, speech recognition and
computer vision. It is the venturetocloneorsimulatehuman
intelligence in machines. AI algorithm is an extended subset
of machine learning that informs the computer how to learn
to operate on its own. In turn, the device continues to
acquire knowledge to improveprocessesandruntasksmore
efficiently. AI allows organizations to make better decisions
at identifying the intruder, improving core security by
increasing both the speed and accuracyofstrategicdecision-
making processes.
Facial recognition is one of the advanced forms of
authentication capable of identifying and verifying a person
using facial features in an image or video from a database.
Modern facial recognition algorithms approach theproblem
of one-shot learning via face recognition by learning a rich
low-dimensional feature representation, called face
embedding, that can be calculated for faces smoothly and
compared for verification and identification tasks.
2. LITERATURE SURVEY
Xin Zhang, Won-Jae Yi and Jafar Saniie introduced a home
surveillance system that utilizes computervisiontechniques
to recognize intrusions and detailed threat information
including classifying types of trespassers and specific
weapons used. Process of identifying intrusions is achieved
by our Smart Intruder Detection and Surveillance System
(SIDSS) which involves 3-stages of computer vision
algorithms.3-stage SIDSS includes an optimized
convolutional neural network (CNN)forthreatandintrusion
detections, cascading classifiers for locating any potential
intruders with correcting mechanism to overcome
undetected threats from the previous stage, and principal
component analysis (PCA) to efficiently train the facial
recognizer to accurately differentiate passersby from
potential intruders. Our system is scalable for various
surveillance events and can be expanded with additional
pre-processed datasets added to the SIDSS model tomanage
greater surveillance areas. Through this enhanced
configuration, the system can achieve enhanced accuracy of
recognizing broad range of weapons used and intruders. [1]
Arshith Suresh, Aina P Subeer, Ann Mary Philip, Jini Shaji
Varughese and Er. Justin Mathew proposed a system which
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1530
featured a system having a frontal face recognition at door
step that assists in monitoring who and when someone has
visited the house with alerts being sent if an unknown
person is found to be at the doorstep. Algorithms that are
fast and accurate are used for this purpose. This paper also
introduces a feature that enables the user(owner) tocontrol
the entry of vehicles by adding a RFIDbasedauthorization of
vehicles and allowing the user to add and delete authorized
vehicles. The system also presents a motion detection
sensing device that is efficient and accurate by using Passive
Infrared Radiation Sensor and assisted by a machine
learning algorithm to detect if a person has entered the
house premises during security hours. The whole system is
controlled and monitored via a mobile app that features
facilities to get Alerts, monitor activities and other functions
mentioned in this paper. The system thus provides
automation with security focused to elderly people residing
in the house.[2]
S.Srikanth, SK.saddamhussainandP.Siva Prasadputforward
that now a day to secure your home using voice commands
alexa can be used. It is widely used to control home
appliances, background lights and colors .If you often worry
that you forgot to lock your front door, a smart lock is one
way around the problem. You can check the status of the
door lock if your phone door is locked or unlocked remotely
and let your dog walker, delivery service, or friend inside
when you’re not around. Also unknown persons haven’t
come far enough in terms of security, so beware of the pros
and cons before you ditch your analog lock. Several smart
lock manufacturers are making devices that integrate with
alexa and voice commands. So you can call “Alexa lock my
front door” and your Echo would connect to your device or
reply with a status update is useful. If you’re in the shower
and you suddenly can’t remember if your front door is
locked or not.[3]
Anitha A proposed a system which will inform the owner
about any unauthorized entry or whenever the door is
opened by sending a notification to the user. After the user
gets the notification, he can take the necessary actions. The
security system will use a microcontrollerknownasArduino
Uno to interface between the components, a magnetic Reed
sensor to monitor the status, a buzzer for sounding the
alarm, and a WiFi module, ESP8266 to connect and
communicate using the Internet. The main advantages of
such a system includes the ease of setting up, lower costs
and low maintenance.[4]
Rohan Namdeo, Sahil Sharma, Varun Anand and Chanchal
Lohi proposed an IoT based surveillance security system
that can be accessed remotely with the use of the internet.
This framework can be used in homes and personal offices.
The framework works best in confined spaces and when the
space in which it is being used has the absence of the owner.
This is because the system will detect any movement
occurring in the space.[5]
Jessamyn Dahmen, Diane J. Cook, Xiaobo Wang and Wang
Honglei proposed robust smart home technologies that are
commonly used by large segments of the population in a
variety of settings. Recent smart home applications are
focused on activity recognition, health monitoring, and
automation. In this paper, we take a look at another
important role for smart homes: security. We first explore
the numerous ways smart homes can and do provide
protection for their residents. Next, we provide a
comparative analysis of the alternative tools and research
that has been developed for this purpose. Weinvestigatenot
only existing commercial products that have been
introduced but also discuss the numerous research that has
been focused on detecting and identifying potential threats.
Finally, we close with open challenges and ideas for future
research that will keep individuals secure and healthy while
in their own homes.[6]
Qasim Mahmood Rajpoot and Christian Damsgaard Jensen
presented a general model of videosurveillancesystemsthat
will help identify the major security and privacy
requirements for a videosurveillancesystemand weusethis
model to identify practical challenges in ensuring the
security of video surveillance data in all stages (in transit
and at rest). Our study shows a gap between the identified
security requirements and the proposed security solutions
where future research efforts may focus in this domain.[7]
3. PROPOSED SYSTEM AND METHODOLOGY
This system can be divided into four phases:
Phase 1: It is the initial phase in which the device is ON, but
there is no face in front of the camera. The locking
mechanism is also in its unlocked state.
Phase 2: A person enters the room by opening the door. The
camera module captures the face of the personentering.The
Raspberry Pi performs face detection and recognition of the
face captured and classifies if the person entered is an
intruder or not.
Phase 3: Depending on the condition,thelockingmechanism
is turned ENABLED. If the person is an intruder, the locking
mechanism is ENABLED, 10-second video evidence is
captured and uploaded to the cloud storage and the owner
and the security guard are notified about the event.
Phase 4: It is the final phase where the owner candisable the
locking mechanism, in case a known person who is
authorized by the owner but not the system is trapped or
when the owner is there with the police and wants to open
the door and confront the thief.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1531
Fig -1: Proposed System Architecture
Raspberry Pi 4B - The Raspberry Pi is a small single-board
computer. It is based on Broadcom BCM2711, quad-core
Cortex-A72. It supports various types of Operating Systems
like RaspbianOS, Linux and Windows as well as high-level
programming languages like Python, whichmakesitsuitable
to run ML applications. It has various connectivity options
like Gigabit Ethernet, 802.11 LAN,Bluetooth 5.0,USB2.0and
3.0 and two micro HDMIs.
Linear Actuator - This Miniature Linear Actuator is an
electric push rod and an ideal solution for industrial,
agricultural machinery, construction, clean sweeping
vehicles, vessels, cargo and many other applications. This
electric push rod is a kind of electric driving device which
transforms the rotary motion of the motor into the linear
reciprocating motion of the pushrod. It can be used in
various simple or complex processes such as executive
machinery to realize remote control, centralized control or
automatic control. The electric push rod is composed of the
drive motor which operates on 12V DC, reduction gear
applying 100N of force with a speed of 90 mm per second,
screw, nut, guide sleeve,pushrodof50mm,slidingseat,shell,
micro-motion control switch, etc.
Fig -2: Raspberry Pi 4B
Fig -3: Linear Actuator
Locking Mechanism - The locking mechanism is designed in
house by us. It is a simple yet effective method to lock the
door. It is constructed by using 2 prism-shaped pieces of
wood, locally machined and strategically assembled such
that when the linear actuator pushes the bottom prism
horizontally, the other prism is pushed vertically. This
results in the door being locked and can'tbeunlockedunless
the lock is disabled. The best part about thisisthateven with
a lot of force applied the mechanism doesn't fail as virtually
no force is applied to the linear actuator as it is
perpendicular to the forceappliedontotheverticallymoving
prism lock.
Fig -4: Locking Mechanism (Unlocked)
Reinforced Door - The door is reinforced with steel at the
bottom which makes it harder to break the door, which in
turn increases the time required for the intruders to escape
the scene. This time is sufficient for the security guard to
come to the scene and call law enforcement if required.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1532
Fig -5: Reinforced Door
Camera Module - The C270 HD Webcam gives you sharp,
smooth conference calls (720p/30fps) in a widescreen
format. Automatic light correction shows you in lifelike,
natural colors. We use this to capture facial information
which helps the Raspberry Pi to makedecisionsbasedonthe
face detected and recognized. Otherwiseanycamera module
can be used that supports USB, Ethernet or Wireless
Connectivity.
Fig -6: Camera Module
Dual Channel Relay Module - This modulecontainstworelay
switches that are electrically isolated from the controlling
input. The relays can be used to switch higher voltage and
current loads than a microcontroller can traditionally
accomplish. Here we are using it to switch the polarity ofthe
motor. It is powered from 5V. Each relay has 1 input and
receives from the microcontroller. There are 2 pairs
of switching ports Normally Open(NO) and NormallyClosed
(NC) which provide the current to be switchedintherelay.A
comm port (COM) is connected to the linear actuator.
RAT TRAP App - For remotely controlling the device and
accessing the video recordingsuploadedtothecloudstorage
by the Raspberry Pi. The cloud storage used is Google
Firebase. Firebase also providesauthenticationfortheusers.
The app is built using the Flutter framework, which makesit
usable on Android as well iOS. Fig. 8 and 9 shows the user
interface of the application with firebase authentication.
Fig -7: Dual Channel Relay Module
Fig -8: Login Screen of Application (Left) System is
enabled with no intruder (Middle) and when intruder is
trapped (Right)
4. PROPOSED SYSTEM AND METHODOLOGY
When an intruder is detected, the following operations
perform simultaneously:
a) The locking mechanism instantlygetsenabled,locking the
exit routes. Fig. 11 shows the enabled locking mechanism
b) A 10 second video evidence is capturedandisuploaded to
Firebase Storage. This step is done even if the person
entered is not an intruder.
c) An alert sent to the owner's and security guard's phone
via SMS using Twilio about the incident.
The owner can then check the "View Recordings" section,
which shows him who has entered. If the person trapped is
an actual intruder, the owner can contact the law
enforcement. If the person trapped is a known person and is
not an intruder, the owner can disable the system by
switching the toggle switch off. Same can be done when the
police arrive to nab the intruder, the locking mechanism can
be disabled so that the police can open the door and get hold
of the intruder for further investigation.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1533
Fig -9: Enabled Locking Mechanism
Fig -10: Video Uploaded on the Firebase Storage shown in
the RATTRAP app
Networkability plays a vital role. Due to the complete
installation of the operating system on raspberry pi, there
comes the division on the processing power but if onlythere
could be a dedicated unit only made for facial recognition
and GPIO, it can be more efficient such that the entire power
of the system is concentrated on the facial recognitionmodel
and there would be less load and more accuracy. Once the
lock is activated the surfaces of thewedgesarethrustedwith
the help of linear actuator and due to controlled speed the
friction created is of adequate amount and there is no wear
and tear of the wedges.
One of the advantages of this mechanism is that any force
applied is nullified as itsvertical componentgetsabsorbed in
the ground and horizontal component by the reinforced
door.
Out of a total 2000 test runs the system passed 1902 times.
The face recognition had an accuracy of around 95.1%. The
remaining 4.9% unsuccessful test cases are due to certain
conditions and circumstances like darkness near the
detection and recognition zone. In these cases, the lock will
be activated but can be manually deactivated by the owner.
Fig -9: SMS Alert on the phone via SMS using Twilio
5. CONCLUSIONS AND FUTURE SCOPE
The purpose of the system is to provide a measure of
security to avoid burglary or trespassing. Based on the
results, it is concluded that the system assures the
bifurcation between an intruder and an authorized person.
Also, it creates a confinement area preventing the intruder
from fleeing. The algorithm and method are independent of
both the application and the backend domain. An integrated
approach to the hardware and the software has been
developed. The application would greatly benefit the
development of such systems, which have widespread
applications.
The developed system can also be used in industrial and
commercial applications such as offices, warehouses and
other areas where some areas are reserved for authorized
personnel only such as the internet server room of
Multinational Companies. The system can also be easily
upgraded to add extra safety featuressuchasirisandmotion
detection sensors and a robust processing unit forincreased
safety. The system can also further be developed by adding
an Radio Frequency Identity (RFID) scanner so that the
authorized users need only to carry an RFID tag with them.
The RFID scanner will work by scanning the tag wirelessly
and if the user is authorized to enter, the alarm system will
be disabled for some time so that the user can enter.
ACKNOWLEDGEMENT
We would like to thank New Horizon Instituteof Technology
and Management for providing us a stage to do this exciting
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1534
project. This project helped us sharpen our skills in the
technologies used here. We also acquired a lot of new skills
which we never thought we would ever learn. Wewouldlike
to express our sincere gratitude to Dr. Sanjay Sharma for
guiding us throughout the life of this project. Without his
valuable guidance and support, this project would not have
been possible.
REFERENCES
[1] Xin Zhang, Won-Jae Yi and Jafar Saniie,“Home
surveillance system using Computer Vision and
Convolutional Neural Network”, 2019 IEEE
International Conference on Electro Information
Technology (EIT), 10.1109/EIT.2019.8833773.
[2] Arshith Suresh, Aina P Subeer,AnnMaryPhilip,JiniShaji
Varughese, Justin Mathew,“Comprehensive home
security for elderly people using IoT and Artificial
Intelligence”,2020 IEEE International Conference for
Innovation in Technology
(INOCON),10.1109/INOCON50539.2020.9298445.
[3] S. Srikanth, SK. Saddam Hussein, P. Siva Prasad,“Home
anti-theft powered by Alexa”, 2019 International
Conference on Vision Towards Emerging Trends in
Communication and Networking (ViTECoN),
10.1109/ViTECoN.2019.8899464.
[4] A Anitha,“Home security system using internet of
things”,IOP Conference Series: Materials Science and
Engineering, Volume 263, Issue 4.
[5] Rohan Namdeo, Sahil Sharma, Varun Anand, Chanchal
Lohi, “Smart Automated Surveillance System using
Raspberry Pi”,International Journal of Recent
Technology and Engineering (IJRTE).
[6] Jessamyn Dahmen, Diane J. Cook1, Xiaobo Wang, Wang
Honglei,”Smart secure homes: a survey of smart home
technologies that sense, assess, and respond to security
threats”, Journal of Reliable Intelligent Environments
volume 3, pages83–98 (2017), 10.1007/s40860-017-
0035-0.
[7] Qasim Mahmood Rajpoot, Christian Damsgaard
Jensen,”Security and Privacy in Video Surveillance:
Requirements and Challenges”, IFIP Advances in
Information and Communication Technology book
series (IFIPAICT,volume 428). M. Young, The Technical
Writer’s Handbook. Mill Valley, CA: University Science,
1989.

More Related Content

Similar to RAT Trap: Home Surveillance System Using IoT & AI

IRJET - Safety and Security Aspects of Smart Home Applications using Face...
IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...
IRJET - Safety and Security Aspects of Smart Home Applications using Face...IRJET Journal
 
IRJET - Smart Door System
IRJET - Smart Door SystemIRJET - Smart Door System
IRJET - Smart Door SystemIRJET Journal
 
IRJET- Implementation of Smart Surveillance System Based on Bio-Metrics
IRJET-  	  Implementation of Smart Surveillance System Based on Bio-MetricsIRJET-  	  Implementation of Smart Surveillance System Based on Bio-Metrics
IRJET- Implementation of Smart Surveillance System Based on Bio-MetricsIRJET Journal
 
IRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing Review
IRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing ReviewIRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing Review
IRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing ReviewIRJET Journal
 
Home security based on Internet of things Review paper
Home security based on Internet of things Review paperHome security based on Internet of things Review paper
Home security based on Internet of things Review paperIRJET Journal
 
Smart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionSmart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionIRJET Journal
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMIRJET Journal
 
20563-38910-2-PB.pdf
20563-38910-2-PB.pdf20563-38910-2-PB.pdf
20563-38910-2-PB.pdfIjictTeam
 
Smart and Secure Home using IoT
Smart and Secure Home using IoTSmart and Secure Home using IoT
Smart and Secure Home using IoTIRJET Journal
 
IRJET- An Alert System for Home Security based on Internet of Thing
IRJET- An Alert System for Home Security based on Internet of ThingIRJET- An Alert System for Home Security based on Internet of Thing
IRJET- An Alert System for Home Security based on Internet of ThingIRJET Journal
 
IRJET- A Survey on Secure Protocols of Communication for IoT Components i...
IRJET-  	  A Survey on Secure Protocols of Communication for IoT Components i...IRJET-  	  A Survey on Secure Protocols of Communication for IoT Components i...
IRJET- A Survey on Secure Protocols of Communication for IoT Components i...IRJET Journal
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET Journal
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET Journal
 
IRJET- Smart Home Automation using IoT and Deep Learning
IRJET-  	  Smart Home Automation using IoT and Deep LearningIRJET-  	  Smart Home Automation using IoT and Deep Learning
IRJET- Smart Home Automation using IoT and Deep LearningIRJET Journal
 
[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...
[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...
[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...PUBLISHERJOURNAL
 
[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...
[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...
[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...PUBLISHERJOURNAL
 
Design and Implementation of a Smart Surveillance Security System.pdf
Design and Implementation of a Smart Surveillance Security System.pdfDesign and Implementation of a Smart Surveillance Security System.pdf
Design and Implementation of a Smart Surveillance Security System.pdfssuser793b4e
 
IRJET - Raspberry Pi based Intelligent Security System
IRJET -  	  Raspberry Pi based Intelligent Security SystemIRJET -  	  Raspberry Pi based Intelligent Security System
IRJET - Raspberry Pi based Intelligent Security SystemIRJET Journal
 
Smart Door Monitoring and Locking system
Smart Door Monitoring and Locking systemSmart Door Monitoring and Locking system
Smart Door Monitoring and Locking systemIRJET Journal
 
Home Security System and Door Access Control Based on Face Recognition
Home Security System and Door Access Control Based on Face RecognitionHome Security System and Door Access Control Based on Face Recognition
Home Security System and Door Access Control Based on Face RecognitionIRJET Journal
 

Similar to RAT Trap: Home Surveillance System Using IoT & AI (20)

IRJET - Safety and Security Aspects of Smart Home Applications using Face...
IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
 
IRJET - Smart Door System
IRJET - Smart Door SystemIRJET - Smart Door System
IRJET - Smart Door System
 
IRJET- Implementation of Smart Surveillance System Based on Bio-Metrics
IRJET-  	  Implementation of Smart Surveillance System Based on Bio-MetricsIRJET-  	  Implementation of Smart Surveillance System Based on Bio-Metrics
IRJET- Implementation of Smart Surveillance System Based on Bio-Metrics
 
IRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing Review
IRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing ReviewIRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing Review
IRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing Review
 
Home security based on Internet of things Review paper
Home security based on Internet of things Review paperHome security based on Internet of things Review paper
Home security based on Internet of things Review paper
 
Smart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionSmart Surveillance System through Computer Vision
Smart Surveillance System through Computer Vision
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
 
20563-38910-2-PB.pdf
20563-38910-2-PB.pdf20563-38910-2-PB.pdf
20563-38910-2-PB.pdf
 
Smart and Secure Home using IoT
Smart and Secure Home using IoTSmart and Secure Home using IoT
Smart and Secure Home using IoT
 
IRJET- An Alert System for Home Security based on Internet of Thing
IRJET- An Alert System for Home Security based on Internet of ThingIRJET- An Alert System for Home Security based on Internet of Thing
IRJET- An Alert System for Home Security based on Internet of Thing
 
IRJET- A Survey on Secure Protocols of Communication for IoT Components i...
IRJET-  	  A Survey on Secure Protocols of Communication for IoT Components i...IRJET-  	  A Survey on Secure Protocols of Communication for IoT Components i...
IRJET- A Survey on Secure Protocols of Communication for IoT Components i...
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
 
IRJET- Smart Home Automation using IoT and Deep Learning
IRJET-  	  Smart Home Automation using IoT and Deep LearningIRJET-  	  Smart Home Automation using IoT and Deep Learning
IRJET- Smart Home Automation using IoT and Deep Learning
 
[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...
[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...
[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...
 
[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...
[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...
[[IDOSR JST 9(1)98-106, 2023.Design and Implementation of a Smart Surveillanc...
 
Design and Implementation of a Smart Surveillance Security System.pdf
Design and Implementation of a Smart Surveillance Security System.pdfDesign and Implementation of a Smart Surveillance Security System.pdf
Design and Implementation of a Smart Surveillance Security System.pdf
 
IRJET - Raspberry Pi based Intelligent Security System
IRJET -  	  Raspberry Pi based Intelligent Security SystemIRJET -  	  Raspberry Pi based Intelligent Security System
IRJET - Raspberry Pi based Intelligent Security System
 
Smart Door Monitoring and Locking system
Smart Door Monitoring and Locking systemSmart Door Monitoring and Locking system
Smart Door Monitoring and Locking system
 
Home Security System and Door Access Control Based on Face Recognition
Home Security System and Door Access Control Based on Face RecognitionHome Security System and Door Access Control Based on Face Recognition
Home Security System and Door Access Control Based on Face Recognition
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Recently uploaded (20)

UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 

RAT Trap: Home Surveillance System Using IoT & AI

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1529 RAT Trap: Home Surveillance System Using IoT & AI Raj Chauhan1, Aditya Gidh1, Trisha Gupta1, Dr. Sanjay Sharma2 1Graduate Student, Dept. of Computer Engineering, New Horizon Institute of Technology and Management Mumbai, India 2 Head Of Department, Dept. of Computer Engineering, New Horizon Institute of Technology and Management Mumbai, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - We live in a world where breaking and entering, burglary and trespassing are increasing day byday. Keepinga check at home while giving security measures to the homeowner and complete control of what is happeninginand around the house is very important at this time. Because of the increasing number of threats and disruptionsthatoccur in the community, all residential households needasecurityplan to live a better life with safety. Home automation is about comfort, efficiency, and savings, improving one's standard of living. Home security has made major changes in the last few decades and will continue to improve gradually in future. Previously home security systems meant having an alarm sounded when someone broke in butasmartsecurehomedoes more than that. The proposedsystemcomprisesacombination of a unique wedge lock mechanism, a Linear Actuator, Raspberry Pi, Camera Module attached to it. The system will help users to protect their homes with facial recognition by installing it on doors or windows and monitor activities with their smartphones. Using the concept of Internet of Things (IoT), we can develop a Smart Home Security System, which would be efficient enough and take necessary actions accordingly. The proposed system canbethefirststeptowards safer housing facilities. Key Words: Raspberry Pi, IoT, Facial Recognition, Wedge Lock Mechanism, Linear Actuator, Camera Module 1. INTRODUCTION Smart Homes is the beginning of a new era in the field of home Security. With an integrated alarm system, the user can easily arm and disarm the home to the convenience of their smartphones no matter where the user is. Automating the tasks or jobs without human intervention is needed these days. With the recent invention of the voice assistants and the flexibility, it is providing us to connect any electronics things have become popular these days. The Internet of Things can be used to describe physical objects (or groups of such objects) embedded with sensors, processing ability, and software. A good locking mechanism makes the house more secure for any Intrusion as well as loss. A huge advantage of linear actuator design is that when a perpendicular external forceisappliedtheactuatordoesn’t feel any kind of force as the cosine component of that force becomes zero. Artificial Intelligence plays a prerequisite role in smart homes. Specific applications of AI include expert systems, natural language processing, speech recognition and computer vision. It is the venturetocloneorsimulatehuman intelligence in machines. AI algorithm is an extended subset of machine learning that informs the computer how to learn to operate on its own. In turn, the device continues to acquire knowledge to improveprocessesandruntasksmore efficiently. AI allows organizations to make better decisions at identifying the intruder, improving core security by increasing both the speed and accuracyofstrategicdecision- making processes. Facial recognition is one of the advanced forms of authentication capable of identifying and verifying a person using facial features in an image or video from a database. Modern facial recognition algorithms approach theproblem of one-shot learning via face recognition by learning a rich low-dimensional feature representation, called face embedding, that can be calculated for faces smoothly and compared for verification and identification tasks. 2. LITERATURE SURVEY Xin Zhang, Won-Jae Yi and Jafar Saniie introduced a home surveillance system that utilizes computervisiontechniques to recognize intrusions and detailed threat information including classifying types of trespassers and specific weapons used. Process of identifying intrusions is achieved by our Smart Intruder Detection and Surveillance System (SIDSS) which involves 3-stages of computer vision algorithms.3-stage SIDSS includes an optimized convolutional neural network (CNN)forthreatandintrusion detections, cascading classifiers for locating any potential intruders with correcting mechanism to overcome undetected threats from the previous stage, and principal component analysis (PCA) to efficiently train the facial recognizer to accurately differentiate passersby from potential intruders. Our system is scalable for various surveillance events and can be expanded with additional pre-processed datasets added to the SIDSS model tomanage greater surveillance areas. Through this enhanced configuration, the system can achieve enhanced accuracy of recognizing broad range of weapons used and intruders. [1] Arshith Suresh, Aina P Subeer, Ann Mary Philip, Jini Shaji Varughese and Er. Justin Mathew proposed a system which
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1530 featured a system having a frontal face recognition at door step that assists in monitoring who and when someone has visited the house with alerts being sent if an unknown person is found to be at the doorstep. Algorithms that are fast and accurate are used for this purpose. This paper also introduces a feature that enables the user(owner) tocontrol the entry of vehicles by adding a RFIDbasedauthorization of vehicles and allowing the user to add and delete authorized vehicles. The system also presents a motion detection sensing device that is efficient and accurate by using Passive Infrared Radiation Sensor and assisted by a machine learning algorithm to detect if a person has entered the house premises during security hours. The whole system is controlled and monitored via a mobile app that features facilities to get Alerts, monitor activities and other functions mentioned in this paper. The system thus provides automation with security focused to elderly people residing in the house.[2] S.Srikanth, SK.saddamhussainandP.Siva Prasadputforward that now a day to secure your home using voice commands alexa can be used. It is widely used to control home appliances, background lights and colors .If you often worry that you forgot to lock your front door, a smart lock is one way around the problem. You can check the status of the door lock if your phone door is locked or unlocked remotely and let your dog walker, delivery service, or friend inside when you’re not around. Also unknown persons haven’t come far enough in terms of security, so beware of the pros and cons before you ditch your analog lock. Several smart lock manufacturers are making devices that integrate with alexa and voice commands. So you can call “Alexa lock my front door” and your Echo would connect to your device or reply with a status update is useful. If you’re in the shower and you suddenly can’t remember if your front door is locked or not.[3] Anitha A proposed a system which will inform the owner about any unauthorized entry or whenever the door is opened by sending a notification to the user. After the user gets the notification, he can take the necessary actions. The security system will use a microcontrollerknownasArduino Uno to interface between the components, a magnetic Reed sensor to monitor the status, a buzzer for sounding the alarm, and a WiFi module, ESP8266 to connect and communicate using the Internet. The main advantages of such a system includes the ease of setting up, lower costs and low maintenance.[4] Rohan Namdeo, Sahil Sharma, Varun Anand and Chanchal Lohi proposed an IoT based surveillance security system that can be accessed remotely with the use of the internet. This framework can be used in homes and personal offices. The framework works best in confined spaces and when the space in which it is being used has the absence of the owner. This is because the system will detect any movement occurring in the space.[5] Jessamyn Dahmen, Diane J. Cook, Xiaobo Wang and Wang Honglei proposed robust smart home technologies that are commonly used by large segments of the population in a variety of settings. Recent smart home applications are focused on activity recognition, health monitoring, and automation. In this paper, we take a look at another important role for smart homes: security. We first explore the numerous ways smart homes can and do provide protection for their residents. Next, we provide a comparative analysis of the alternative tools and research that has been developed for this purpose. Weinvestigatenot only existing commercial products that have been introduced but also discuss the numerous research that has been focused on detecting and identifying potential threats. Finally, we close with open challenges and ideas for future research that will keep individuals secure and healthy while in their own homes.[6] Qasim Mahmood Rajpoot and Christian Damsgaard Jensen presented a general model of videosurveillancesystemsthat will help identify the major security and privacy requirements for a videosurveillancesystemand weusethis model to identify practical challenges in ensuring the security of video surveillance data in all stages (in transit and at rest). Our study shows a gap between the identified security requirements and the proposed security solutions where future research efforts may focus in this domain.[7] 3. PROPOSED SYSTEM AND METHODOLOGY This system can be divided into four phases: Phase 1: It is the initial phase in which the device is ON, but there is no face in front of the camera. The locking mechanism is also in its unlocked state. Phase 2: A person enters the room by opening the door. The camera module captures the face of the personentering.The Raspberry Pi performs face detection and recognition of the face captured and classifies if the person entered is an intruder or not. Phase 3: Depending on the condition,thelockingmechanism is turned ENABLED. If the person is an intruder, the locking mechanism is ENABLED, 10-second video evidence is captured and uploaded to the cloud storage and the owner and the security guard are notified about the event. Phase 4: It is the final phase where the owner candisable the locking mechanism, in case a known person who is authorized by the owner but not the system is trapped or when the owner is there with the police and wants to open the door and confront the thief.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1531 Fig -1: Proposed System Architecture Raspberry Pi 4B - The Raspberry Pi is a small single-board computer. It is based on Broadcom BCM2711, quad-core Cortex-A72. It supports various types of Operating Systems like RaspbianOS, Linux and Windows as well as high-level programming languages like Python, whichmakesitsuitable to run ML applications. It has various connectivity options like Gigabit Ethernet, 802.11 LAN,Bluetooth 5.0,USB2.0and 3.0 and two micro HDMIs. Linear Actuator - This Miniature Linear Actuator is an electric push rod and an ideal solution for industrial, agricultural machinery, construction, clean sweeping vehicles, vessels, cargo and many other applications. This electric push rod is a kind of electric driving device which transforms the rotary motion of the motor into the linear reciprocating motion of the pushrod. It can be used in various simple or complex processes such as executive machinery to realize remote control, centralized control or automatic control. The electric push rod is composed of the drive motor which operates on 12V DC, reduction gear applying 100N of force with a speed of 90 mm per second, screw, nut, guide sleeve,pushrodof50mm,slidingseat,shell, micro-motion control switch, etc. Fig -2: Raspberry Pi 4B Fig -3: Linear Actuator Locking Mechanism - The locking mechanism is designed in house by us. It is a simple yet effective method to lock the door. It is constructed by using 2 prism-shaped pieces of wood, locally machined and strategically assembled such that when the linear actuator pushes the bottom prism horizontally, the other prism is pushed vertically. This results in the door being locked and can'tbeunlockedunless the lock is disabled. The best part about thisisthateven with a lot of force applied the mechanism doesn't fail as virtually no force is applied to the linear actuator as it is perpendicular to the forceappliedontotheverticallymoving prism lock. Fig -4: Locking Mechanism (Unlocked) Reinforced Door - The door is reinforced with steel at the bottom which makes it harder to break the door, which in turn increases the time required for the intruders to escape the scene. This time is sufficient for the security guard to come to the scene and call law enforcement if required.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1532 Fig -5: Reinforced Door Camera Module - The C270 HD Webcam gives you sharp, smooth conference calls (720p/30fps) in a widescreen format. Automatic light correction shows you in lifelike, natural colors. We use this to capture facial information which helps the Raspberry Pi to makedecisionsbasedonthe face detected and recognized. Otherwiseanycamera module can be used that supports USB, Ethernet or Wireless Connectivity. Fig -6: Camera Module Dual Channel Relay Module - This modulecontainstworelay switches that are electrically isolated from the controlling input. The relays can be used to switch higher voltage and current loads than a microcontroller can traditionally accomplish. Here we are using it to switch the polarity ofthe motor. It is powered from 5V. Each relay has 1 input and receives from the microcontroller. There are 2 pairs of switching ports Normally Open(NO) and NormallyClosed (NC) which provide the current to be switchedintherelay.A comm port (COM) is connected to the linear actuator. RAT TRAP App - For remotely controlling the device and accessing the video recordingsuploadedtothecloudstorage by the Raspberry Pi. The cloud storage used is Google Firebase. Firebase also providesauthenticationfortheusers. The app is built using the Flutter framework, which makesit usable on Android as well iOS. Fig. 8 and 9 shows the user interface of the application with firebase authentication. Fig -7: Dual Channel Relay Module Fig -8: Login Screen of Application (Left) System is enabled with no intruder (Middle) and when intruder is trapped (Right) 4. PROPOSED SYSTEM AND METHODOLOGY When an intruder is detected, the following operations perform simultaneously: a) The locking mechanism instantlygetsenabled,locking the exit routes. Fig. 11 shows the enabled locking mechanism b) A 10 second video evidence is capturedandisuploaded to Firebase Storage. This step is done even if the person entered is not an intruder. c) An alert sent to the owner's and security guard's phone via SMS using Twilio about the incident. The owner can then check the "View Recordings" section, which shows him who has entered. If the person trapped is an actual intruder, the owner can contact the law enforcement. If the person trapped is a known person and is not an intruder, the owner can disable the system by switching the toggle switch off. Same can be done when the police arrive to nab the intruder, the locking mechanism can be disabled so that the police can open the door and get hold of the intruder for further investigation.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1533 Fig -9: Enabled Locking Mechanism Fig -10: Video Uploaded on the Firebase Storage shown in the RATTRAP app Networkability plays a vital role. Due to the complete installation of the operating system on raspberry pi, there comes the division on the processing power but if onlythere could be a dedicated unit only made for facial recognition and GPIO, it can be more efficient such that the entire power of the system is concentrated on the facial recognitionmodel and there would be less load and more accuracy. Once the lock is activated the surfaces of thewedgesarethrustedwith the help of linear actuator and due to controlled speed the friction created is of adequate amount and there is no wear and tear of the wedges. One of the advantages of this mechanism is that any force applied is nullified as itsvertical componentgetsabsorbed in the ground and horizontal component by the reinforced door. Out of a total 2000 test runs the system passed 1902 times. The face recognition had an accuracy of around 95.1%. The remaining 4.9% unsuccessful test cases are due to certain conditions and circumstances like darkness near the detection and recognition zone. In these cases, the lock will be activated but can be manually deactivated by the owner. Fig -9: SMS Alert on the phone via SMS using Twilio 5. CONCLUSIONS AND FUTURE SCOPE The purpose of the system is to provide a measure of security to avoid burglary or trespassing. Based on the results, it is concluded that the system assures the bifurcation between an intruder and an authorized person. Also, it creates a confinement area preventing the intruder from fleeing. The algorithm and method are independent of both the application and the backend domain. An integrated approach to the hardware and the software has been developed. The application would greatly benefit the development of such systems, which have widespread applications. The developed system can also be used in industrial and commercial applications such as offices, warehouses and other areas where some areas are reserved for authorized personnel only such as the internet server room of Multinational Companies. The system can also be easily upgraded to add extra safety featuressuchasirisandmotion detection sensors and a robust processing unit forincreased safety. The system can also further be developed by adding an Radio Frequency Identity (RFID) scanner so that the authorized users need only to carry an RFID tag with them. The RFID scanner will work by scanning the tag wirelessly and if the user is authorized to enter, the alarm system will be disabled for some time so that the user can enter. ACKNOWLEDGEMENT We would like to thank New Horizon Instituteof Technology and Management for providing us a stage to do this exciting
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1534 project. This project helped us sharpen our skills in the technologies used here. We also acquired a lot of new skills which we never thought we would ever learn. Wewouldlike to express our sincere gratitude to Dr. Sanjay Sharma for guiding us throughout the life of this project. Without his valuable guidance and support, this project would not have been possible. REFERENCES [1] Xin Zhang, Won-Jae Yi and Jafar Saniie,“Home surveillance system using Computer Vision and Convolutional Neural Network”, 2019 IEEE International Conference on Electro Information Technology (EIT), 10.1109/EIT.2019.8833773. [2] Arshith Suresh, Aina P Subeer,AnnMaryPhilip,JiniShaji Varughese, Justin Mathew,“Comprehensive home security for elderly people using IoT and Artificial Intelligence”,2020 IEEE International Conference for Innovation in Technology (INOCON),10.1109/INOCON50539.2020.9298445. [3] S. Srikanth, SK. Saddam Hussein, P. Siva Prasad,“Home anti-theft powered by Alexa”, 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN), 10.1109/ViTECoN.2019.8899464. [4] A Anitha,“Home security system using internet of things”,IOP Conference Series: Materials Science and Engineering, Volume 263, Issue 4. [5] Rohan Namdeo, Sahil Sharma, Varun Anand, Chanchal Lohi, “Smart Automated Surveillance System using Raspberry Pi”,International Journal of Recent Technology and Engineering (IJRTE). [6] Jessamyn Dahmen, Diane J. Cook1, Xiaobo Wang, Wang Honglei,”Smart secure homes: a survey of smart home technologies that sense, assess, and respond to security threats”, Journal of Reliable Intelligent Environments volume 3, pages83–98 (2017), 10.1007/s40860-017- 0035-0. [7] Qasim Mahmood Rajpoot, Christian Damsgaard Jensen,”Security and Privacy in Video Surveillance: Requirements and Challenges”, IFIP Advances in Information and Communication Technology book series (IFIPAICT,volume 428). M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989.