SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2767
WEB-BASED ONLINE EMBEDDED SECURITY SYSTEM AND ALERTNESS
VIA SOCIAL MEDIA
MEHARAJ BEGUM.R[1], PRIYADHARSHINI.K [2], SWATHI.K[3], ANUSHA.P.M [4], SOFIYA JENIFER.J[5]
Students[1, 2, 3], Assistant Professor[4, 5], Dept. of Electronics and Communication Engineering, Parisutham
Institute of Technology & Science, Tamil Nadu, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - This paper presents about providing more
security to BANK from intruder. Now a day protecting the
BANK from the intruder became very difficult. Sofarproviding
the security, plenty of technology has been developed. These
existing technologies cannot give the security properly. So we
have introduced new technology to provide a moresecurityby
using rotatable camera.
Key Words: HMM algorithm, Raspberry pi, Optical flow,
Median filter, Kalman filter, Cmeans, Canny edge
detection, Whatsapp
1. INTRODUCTION
Security is most important in every place; without
security it leads to greater loss; especially providingsecurity
to the bank is must to save all of our money; the motivation
of this paper is to provide the better security to the bank by
using new technology with latest equipment called
Raspberrypi and it follows Hidden Markov model algorithm.
1.1 Background
The featuresandcolorsofcomputervisual detection
and vision always been an area of interest for popular
companies can invest in costly high-level technology and
machinery, but with the advent of cheap and small
sized(debit-card computers such as the Raspberry Pi has a
greater role in society. The RaspberryPimicrocomputer was
developed for the sole purpose of commercial and
academicals use. The applications of any sort of computer
vision or feature detection software in general are
numerous. Examples: people tracking at shopping mall,
surveillance systems with face recognition,helpingrobotsto
pick up objects and to navigate, are monitoring the
equipment. The idea behind this is to form a foundation of
knowledge regarding embedded systems, visual detectionof
objects and the basics of real-time image processing (or
other features), upon which it is possible to add some layers
of complexity and have to undergo further research with
which to modulate projects ranging from less cost and face
recognition or small real-time systems for simple object
detection to high complex systems such as intelligent
machines with self-learning robots with the capability of
visual feedback.
1.2 Aim of thesis
The main goal is to write a python application, with
the help of Open CV libraries, which can be used on an
embedded system, specifically a Raspberry Pi to:
 Capture the coloured blobs from web camera feed
 considering these blobs are objects, and save them
in memory to keep track of their coordinates and
other properties
 Attempt to confirm the linear and realistic
movement of these objects
 Send helpful message about these objects and its
movement continuously as datagram’s (using UDP
protocol of network sockets) to any softwarewhich
makes information requests.
1.2.1 Existing system
In current state CCTV camera is used in all places
especially in Bank for securitypurposeandCCTVcamera has
been checked to find the movement or fault in the bank.
Consider the situation like the intruder is coming to bank by
today night to steal the money and this can be detected by
tomorrow morning only and then we will be checking the
CCTV camera to find the intruder.
1.2.1.1 Disadvantage
 It fails to provide the high security
 It requires large memory space to store the images
 It fails to protect the money from the intruder.
1.2.2 Proposed system
This proposed system is to provide the proper
security to the bank by using raspberry pi kit and it follows
the HMM algorithm .web camera captures the movement of
object and send those images to thebank managerandtothe
police station via whatsapp for security alertness .and it
helps to catch the intruder before he departure from the
bank with money.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2768
2. BLOCK DIAGRAM
Fig.1 Description of block diagram:
The block diagram consist of various components
such as web camera ,raspberrypikitanddisplaymonitorand
power unit and the process is shown in the figure 1. The
camera is to monitors the bank and captures the images of it
and these images are given as input to the video acquisition
block, this will convert the images into video format.Andthis
video is given as input to the frame separation part; this will
convert the video into number of frames and the output of
the frame separation block is given as input to the raspberry
pi kit. Here it follows one algorithm called hidden Markov
model (HMM) all theimageprocessingprocessisdonebythis
algorithm. it gets the frames and it takes the two frames at
first, in that the first frame is considered as reference image
and the second frame is called as processing image, here the
changes can be detected by cmeans, that is it compares the
two frames(reference and processing images) and finds the
changes in it ,this process is done by cmeans.
And the output of the cmeans is given as input to the
various filters .at first the noise in this image can be reduced
by median filter and output of this filter is given to the
kalman filter. This filter used to find the pixel variation by
comparing the two frames. Then this output is given to the
canny edge detection; this detectstheedgesoftheimage.And
the back ground subtraction (bgs) is used to fix thethreshold
value which can be used to detect the movement changes
when it exceeds the threshold value. And the optical flow is
used to track the movement of the object flow (direction of
movement). Thefinal detected image can send via whatsapp
for alertness. This can be done by whatsapp library which
will make communication between python language and the
high level language used in the whatsapp. And the display
monitoris connected to the raspberrypi to view the detected
image. The raspberry pi requires power unit of five volt and
2amps.and it requires LAN/WIFI connection to send the
image via whatsapp and open CV contains all the functions
related to the raspberry pi and pi kit works by rasbian OS.
2.1 Hardware used:
Raspberrypi kit, web camera, power unit
2.2 Software used:
Geany, python (language), HMM (algorithm), open CV,
whatsapp library.
3. COMPONENTS DESCRIPTION:
3.1 Raspberry Pi
Raspberry Pi is a better choice when taking into
account of relatively high performance requirements of
image processing and the equipment currently available for
image processing, are the relatively inexpensive and
powerful embedded platform. Raspberrypi has the
availability of the Pi camera module,whichcancapturehigh-
clarity video as well as snaps which are another factor for
chosen RaspberryPi and this requires a continues updating
of Raspberrypi firmwaretothelatestversion.It worksbetter
with OpenCV based applications. Even though using the
officially supported camera module, It can be accessed
through the V4L APIs and MMAL and it is accepted by the
numerous third-party libraries, It can use any USB web-
camera.
 It works by rasbian OS
 It act as micro controller as well as micro processor
 It is inbuilt with blue tooth, WIFI/LAN
 It has ARM11 processor
 It has 1gb RAM
 It can accept 32 GB memory card
3.2 Web camera
Continuous monitoring and pixel support of 16
mega pixels
3.3 video acquisition
The video capture process is to convert the analog
image into the digital image by the analog to digital
converter. Next, the chrominance is been demodulated to
produce color difference video data. It converts the images
into video format.
3.4 Background subtraction
It is used for detecting the moving objects from
the difference between the current frame and a reference
frame by fixing the threshold. It helps to fix the threshold
to track the movement.
3.5 Hidden Markov model (HMM)
In a hidden Markov model, the state is not been
directly visible, but the output whichdependentonthestate,
is visible. Hidden Markov models are especially used for the
application such as speech, gesture recognition, part-of-
speech tagging, musical score following, partial discharges
and bioinformatics. A hidden Markov model can be
considered as generalization of a mixture model where the
hidden variables are considered for observation.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2769
3.6 Median filter
Median filtering technique often used to remove
noise from the images such noise reduction is a typical pre-
processing step to develop the resultsforfurther processing.
3.7 Fuzzy c-means
(FCM) is a data clustering technique in which a
dataset is grouped into n clusters with every data point.This
is used to compare the two images to find the changes.
3.8 Kalman filtering
It is also known as linear quadratic
estimation (LQE) filter .which is used to find the pixel
variation by comparing the reference and processing image.
The Kalman filter has variety of applicationsintechnology.A
common application is for guidance, navigation, and
control of vehicles, particularly aircraft and spacecraft.
Furthermore, the Kalman filter is a widely applied concept
in time series.
3.9 Canny edge detector
It was developed by Jhon F.Canny in 1986 it is
an edge detection operator that uses a multi-
stage algorithm to detect a wide range of edges in images.
3.10 Optical flow
It detects the motion of objects, surfaces, and edges
in a visual scene caused by the relative motion between an
observer and a scene. It is also called as scene flow. Which
detects the flow of movement.The idea of optical flow was
created by the American psychologist James J. Gibson in the
1940.
3.11 OpenCV (Open Source Computer Vision Library)
It is an open source computer vision and machine
learning software library. OpenCV was developed toprovide
a common infrastructure for computer vision applications
and to accelerate the use of machine perception in the
commercial products. It has C++, C, Python, Java and
MATLAB interfaces and supports Windows, Linux, Android
and Mac OS. It has all the functions relatedto raspberrypi kit.
Advantages
 It provides high security
 It requires very less memory space to store the
images
 Less cost
 Small in size
Applications
 Bank
 Jewellery shop
 Expensive exhibition
4. CONCLUSION
In this paper a web camera is used to detect the
movement of object by using raspberrypi kit and sending
alertness messages via whatsapp and thus provides the
perfect security.
ACKNOWLEDGEMENT
The authors are gratefullyacknowledgingthesupport extent
by the respective institute in bringing out this article.
We also thankful to faculties of Electronics and
Communication Engineering department
REFERENCES
[1] ‘Motion video sensor in the compressed domain'. SCS
Euro media Conf., Valencia, Spain, 2001.
[2] GieseandT.Poggio (2003) Neural mechanisms for the
Recognition of Biological movement sand action.
Nature Reviews Neuro science 4:179–192.
[3] “Neural Networks for 3D Motion Detection From a
Sequence of Image Frames,” Chan Lai Wan and Yip
Pak Ching, IEEE, computer Science Dept., The Chinese
University of Hong Kong, 1991.
[4] Ferster and K.D. Miller. (2000). Neural mechanisms of
orientation Selectivity in the visual cortex. Annual
Review of Neuroscience, 23:441–471.
BIOGRAPHIES
Meharaj Begum.R pursuing her B.E degree in Electronics
and Communication Engineering in Parisutham Institute of
Technology and Science.
Priyadharshini.K pursuing her B.E degree in Electronics
and Communication Engineering in Parisutham Institute of
Technology and Science.
Swathi.K pursuing her B.E degree in Electronics and
Communication Engineering in Parisutham Institute of
Technology and Science.
Anusha.P.M completed her ME in VLSI Design in Kings
College of Engineering and completed her BE in Electronics
and Communication Engineering in Periyar Maniyammai
University. She is working as Assistant Professor in
Parisutham Institute of Technology and Science.
Sofiya Jenifer.J completed her ME in VLSI Design in Kings
College of Engineering and completed her BE in Electronics
and Communication Engineering in Anjalai Ammal
Mahalingam EngineeringCollege.Sheisworkingas Assistant
Professor in Parisutham Instituteof TechnologyandScience.

More Related Content

What's hot

Two Step Design for Personal Authentication Using Finger Vein Recognition and...
Two Step Design for Personal Authentication Using Finger Vein Recognition and...Two Step Design for Personal Authentication Using Finger Vein Recognition and...
Two Step Design for Personal Authentication Using Finger Vein Recognition and...IJTET Journal
 
B.tech.cse r15 regulations_3rd-4th_year-course_structure_and_syllabus
B.tech.cse r15 regulations_3rd-4th_year-course_structure_and_syllabusB.tech.cse r15 regulations_3rd-4th_year-course_structure_and_syllabus
B.tech.cse r15 regulations_3rd-4th_year-course_structure_and_syllabusBharathiMudiyam
 
RRD Tool and Network Monitoring
RRD Tool and Network MonitoringRRD Tool and Network Monitoring
RRD Tool and Network Monitoringsweta dargad
 
Automated Security Surveillance System in Real Time World
Automated Security Surveillance System in Real Time WorldAutomated Security Surveillance System in Real Time World
Automated Security Surveillance System in Real Time WorldIRJET Journal
 
A Framework for Wireless LAN Monitoring and Its Applications 
A Framework for Wireless LAN Monitoring and Its Applications A Framework for Wireless LAN Monitoring and Its Applications 
A Framework for Wireless LAN Monitoring and Its Applications 2012engg
 
Architecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring SystemArchitecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring Systemsweta dargad
 
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE cscpconf
 
Surveillance using Video Analytics
Surveillance using Video AnalyticsSurveillance using Video Analytics
Surveillance using Video Analyticsidescitation
 
IRJET- Data Hiding in Digital Image using Steganography
IRJET-  	  Data Hiding in Digital Image using Steganography IRJET-  	  Data Hiding in Digital Image using Steganography
IRJET- Data Hiding in Digital Image using Steganography IRJET Journal
 
Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Implementation of vehicle ventilation system using node mcu esp8266 for remot...Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Implementation of vehicle ventilation system using node mcu esp8266 for remot...Journal Papers
 
Software engineering model based smart indoor localization system using deep-...
Software engineering model based smart indoor localization system using deep-...Software engineering model based smart indoor localization system using deep-...
Software engineering model based smart indoor localization system using deep-...TELKOMNIKA JOURNAL
 
Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...
Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...
Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...IOSR Journals
 
IRJET- Optimization of Surveillance Camera for Low Cost Storage Device
IRJET- Optimization of Surveillance Camera for Low Cost Storage DeviceIRJET- Optimization of Surveillance Camera for Low Cost Storage Device
IRJET- Optimization of Surveillance Camera for Low Cost Storage DeviceIRJET Journal
 
OBSERVATIONAL DISCRETE LINES FOR THE DETECTION OF MOVING VEHICLES IN ROAD TRA...
OBSERVATIONAL DISCRETE LINES FOR THE DETECTION OF MOVING VEHICLES IN ROAD TRA...OBSERVATIONAL DISCRETE LINES FOR THE DETECTION OF MOVING VEHICLES IN ROAD TRA...
OBSERVATIONAL DISCRETE LINES FOR THE DETECTION OF MOVING VEHICLES IN ROAD TRA...ijcseit
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET Journal
 
Online Intrusion Alert Aggregation with Generative Data Stream Modeling
Online Intrusion Alert Aggregation with Generative Data Stream  ModelingOnline Intrusion Alert Aggregation with Generative Data Stream  Modeling
Online Intrusion Alert Aggregation with Generative Data Stream ModelingIJMER
 
Snmp based network monitoring system
Snmp based network monitoring systemSnmp based network monitoring system
Snmp based network monitoring systemsweta dargad
 
Dq3211691171
Dq3211691171Dq3211691171
Dq3211691171IJMER
 
IRJET- Collision Avoidance based on Obstacle Detection using OpenCV
IRJET-  	  Collision Avoidance based on Obstacle Detection using OpenCVIRJET-  	  Collision Avoidance based on Obstacle Detection using OpenCV
IRJET- Collision Avoidance based on Obstacle Detection using OpenCVIRJET Journal
 

What's hot (19)

Two Step Design for Personal Authentication Using Finger Vein Recognition and...
Two Step Design for Personal Authentication Using Finger Vein Recognition and...Two Step Design for Personal Authentication Using Finger Vein Recognition and...
Two Step Design for Personal Authentication Using Finger Vein Recognition and...
 
B.tech.cse r15 regulations_3rd-4th_year-course_structure_and_syllabus
B.tech.cse r15 regulations_3rd-4th_year-course_structure_and_syllabusB.tech.cse r15 regulations_3rd-4th_year-course_structure_and_syllabus
B.tech.cse r15 regulations_3rd-4th_year-course_structure_and_syllabus
 
RRD Tool and Network Monitoring
RRD Tool and Network MonitoringRRD Tool and Network Monitoring
RRD Tool and Network Monitoring
 
Automated Security Surveillance System in Real Time World
Automated Security Surveillance System in Real Time WorldAutomated Security Surveillance System in Real Time World
Automated Security Surveillance System in Real Time World
 
A Framework for Wireless LAN Monitoring and Its Applications 
A Framework for Wireless LAN Monitoring and Its Applications A Framework for Wireless LAN Monitoring and Its Applications 
A Framework for Wireless LAN Monitoring and Its Applications 
 
Architecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring SystemArchitecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring System
 
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
 
Surveillance using Video Analytics
Surveillance using Video AnalyticsSurveillance using Video Analytics
Surveillance using Video Analytics
 
IRJET- Data Hiding in Digital Image using Steganography
IRJET-  	  Data Hiding in Digital Image using Steganography IRJET-  	  Data Hiding in Digital Image using Steganography
IRJET- Data Hiding in Digital Image using Steganography
 
Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Implementation of vehicle ventilation system using node mcu esp8266 for remot...Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Implementation of vehicle ventilation system using node mcu esp8266 for remot...
 
Software engineering model based smart indoor localization system using deep-...
Software engineering model based smart indoor localization system using deep-...Software engineering model based smart indoor localization system using deep-...
Software engineering model based smart indoor localization system using deep-...
 
Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...
Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...
Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...
 
IRJET- Optimization of Surveillance Camera for Low Cost Storage Device
IRJET- Optimization of Surveillance Camera for Low Cost Storage DeviceIRJET- Optimization of Surveillance Camera for Low Cost Storage Device
IRJET- Optimization of Surveillance Camera for Low Cost Storage Device
 
OBSERVATIONAL DISCRETE LINES FOR THE DETECTION OF MOVING VEHICLES IN ROAD TRA...
OBSERVATIONAL DISCRETE LINES FOR THE DETECTION OF MOVING VEHICLES IN ROAD TRA...OBSERVATIONAL DISCRETE LINES FOR THE DETECTION OF MOVING VEHICLES IN ROAD TRA...
OBSERVATIONAL DISCRETE LINES FOR THE DETECTION OF MOVING VEHICLES IN ROAD TRA...
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
 
Online Intrusion Alert Aggregation with Generative Data Stream Modeling
Online Intrusion Alert Aggregation with Generative Data Stream  ModelingOnline Intrusion Alert Aggregation with Generative Data Stream  Modeling
Online Intrusion Alert Aggregation with Generative Data Stream Modeling
 
Snmp based network monitoring system
Snmp based network monitoring systemSnmp based network monitoring system
Snmp based network monitoring system
 
Dq3211691171
Dq3211691171Dq3211691171
Dq3211691171
 
IRJET- Collision Avoidance based on Obstacle Detection using OpenCV
IRJET-  	  Collision Avoidance based on Obstacle Detection using OpenCVIRJET-  	  Collision Avoidance based on Obstacle Detection using OpenCV
IRJET- Collision Avoidance based on Obstacle Detection using OpenCV
 

Similar to Web-Based Online Embedded Security System And Alertness Via Social Media

IRJET - Gesture Controlled Home Automation using CNN
IRJET -  	  Gesture Controlled Home Automation using CNNIRJET -  	  Gesture Controlled Home Automation using CNN
IRJET - Gesture Controlled Home Automation using CNNIRJET Journal
 
Classroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-PiClassroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-PiIRJET Journal
 
Secured Spy for Highly Secured Areas
Secured Spy for Highly Secured AreasSecured Spy for Highly Secured Areas
Secured Spy for Highly Secured AreasIRJET Journal
 
IRJET- Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry PiIRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET- Iot Based Home Visitor Monitoring System using Raspberry PiIRJET Journal
 
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemIRJET Journal
 
IRJET- Smart Surveillance Cam using Face Recongition Alogrithm
IRJET-  	  Smart Surveillance Cam using Face Recongition AlogrithmIRJET-  	  Smart Surveillance Cam using Face Recongition Alogrithm
IRJET- Smart Surveillance Cam using Face Recongition AlogrithmIRJET Journal
 
IRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually ImpairedIRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually ImpairedIRJET Journal
 
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...IRJET Journal
 
Comparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi TechnologyComparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi TechnologyIRJET Journal
 
Human Action Recognition using Contour History Images and Neural Networks Cla...
Human Action Recognition using Contour History Images and Neural Networks Cla...Human Action Recognition using Contour History Images and Neural Networks Cla...
Human Action Recognition using Contour History Images and Neural Networks Cla...IRJET Journal
 
IRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
IRJET- Implementation of Gender Detection with Notice Board using Raspberry PiIRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
IRJET- Implementation of Gender Detection with Notice Board using Raspberry PiIRJET Journal
 
IRJET- Real Time Video Surveillance Architecture for Secured City Automation
IRJET-  	  Real Time Video Surveillance Architecture for Secured City AutomationIRJET-  	  Real Time Video Surveillance Architecture for Secured City Automation
IRJET- Real Time Video Surveillance Architecture for Secured City AutomationIRJET Journal
 
IRJET - Cardless ATM
IRJET -  	  Cardless ATMIRJET -  	  Cardless ATM
IRJET - Cardless ATMIRJET Journal
 
IRJET- ROI based Automated Meter Reading System using Python
IRJET-  	  ROI based Automated Meter Reading System using PythonIRJET-  	  ROI based Automated Meter Reading System using Python
IRJET- ROI based Automated Meter Reading System using PythonIRJET Journal
 
Conceptual Framework for Anthropomorphic Simulation of Human Face for Interac...
Conceptual Framework for Anthropomorphic Simulation of Human Face for Interac...Conceptual Framework for Anthropomorphic Simulation of Human Face for Interac...
Conceptual Framework for Anthropomorphic Simulation of Human Face for Interac...IRJESJOURNAL
 
IRJET- Pick and Place Robot for Color based Sorting
IRJET-  	  Pick and Place Robot for Color based SortingIRJET-  	  Pick and Place Robot for Color based Sorting
IRJET- Pick and Place Robot for Color based SortingIRJET Journal
 
IRJET- VISITX: Face Recognition Visitor Management System
IRJET-  	  VISITX: Face Recognition Visitor Management SystemIRJET-  	  VISITX: Face Recognition Visitor Management System
IRJET- VISITX: Face Recognition Visitor Management SystemIRJET Journal
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTIJRTEMJOURNAL
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT journal ijrtem
 

Similar to Web-Based Online Embedded Security System And Alertness Via Social Media (20)

IRJET - Gesture Controlled Home Automation using CNN
IRJET -  	  Gesture Controlled Home Automation using CNNIRJET -  	  Gesture Controlled Home Automation using CNN
IRJET - Gesture Controlled Home Automation using CNN
 
Classroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-PiClassroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-Pi
 
Secured Spy for Highly Secured Areas
Secured Spy for Highly Secured AreasSecured Spy for Highly Secured Areas
Secured Spy for Highly Secured Areas
 
IRJET- Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry PiIRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET- Iot Based Home Visitor Monitoring System using Raspberry Pi
 
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
 
IRJET- Smart Surveillance Cam using Face Recongition Alogrithm
IRJET-  	  Smart Surveillance Cam using Face Recongition AlogrithmIRJET-  	  Smart Surveillance Cam using Face Recongition Alogrithm
IRJET- Smart Surveillance Cam using Face Recongition Alogrithm
 
IRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually ImpairedIRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually Impaired
 
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
 
Comparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi TechnologyComparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi Technology
 
Human Action Recognition using Contour History Images and Neural Networks Cla...
Human Action Recognition using Contour History Images and Neural Networks Cla...Human Action Recognition using Contour History Images and Neural Networks Cla...
Human Action Recognition using Contour History Images and Neural Networks Cla...
 
IRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
IRJET- Implementation of Gender Detection with Notice Board using Raspberry PiIRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
IRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
 
IRJET- Real Time Video Surveillance Architecture for Secured City Automation
IRJET-  	  Real Time Video Surveillance Architecture for Secured City AutomationIRJET-  	  Real Time Video Surveillance Architecture for Secured City Automation
IRJET- Real Time Video Surveillance Architecture for Secured City Automation
 
S0102297102
S0102297102S0102297102
S0102297102
 
IRJET - Cardless ATM
IRJET -  	  Cardless ATMIRJET -  	  Cardless ATM
IRJET - Cardless ATM
 
IRJET- ROI based Automated Meter Reading System using Python
IRJET-  	  ROI based Automated Meter Reading System using PythonIRJET-  	  ROI based Automated Meter Reading System using Python
IRJET- ROI based Automated Meter Reading System using Python
 
Conceptual Framework for Anthropomorphic Simulation of Human Face for Interac...
Conceptual Framework for Anthropomorphic Simulation of Human Face for Interac...Conceptual Framework for Anthropomorphic Simulation of Human Face for Interac...
Conceptual Framework for Anthropomorphic Simulation of Human Face for Interac...
 
IRJET- Pick and Place Robot for Color based Sorting
IRJET-  	  Pick and Place Robot for Color based SortingIRJET-  	  Pick and Place Robot for Color based Sorting
IRJET- Pick and Place Robot for Color based Sorting
 
IRJET- VISITX: Face Recognition Visitor Management System
IRJET-  	  VISITX: Face Recognition Visitor Management SystemIRJET-  	  VISITX: Face Recognition Visitor Management System
IRJET- VISITX: Face Recognition Visitor Management System
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 

Web-Based Online Embedded Security System And Alertness Via Social Media

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2767 WEB-BASED ONLINE EMBEDDED SECURITY SYSTEM AND ALERTNESS VIA SOCIAL MEDIA MEHARAJ BEGUM.R[1], PRIYADHARSHINI.K [2], SWATHI.K[3], ANUSHA.P.M [4], SOFIYA JENIFER.J[5] Students[1, 2, 3], Assistant Professor[4, 5], Dept. of Electronics and Communication Engineering, Parisutham Institute of Technology & Science, Tamil Nadu, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - This paper presents about providing more security to BANK from intruder. Now a day protecting the BANK from the intruder became very difficult. Sofarproviding the security, plenty of technology has been developed. These existing technologies cannot give the security properly. So we have introduced new technology to provide a moresecurityby using rotatable camera. Key Words: HMM algorithm, Raspberry pi, Optical flow, Median filter, Kalman filter, Cmeans, Canny edge detection, Whatsapp 1. INTRODUCTION Security is most important in every place; without security it leads to greater loss; especially providingsecurity to the bank is must to save all of our money; the motivation of this paper is to provide the better security to the bank by using new technology with latest equipment called Raspberrypi and it follows Hidden Markov model algorithm. 1.1 Background The featuresandcolorsofcomputervisual detection and vision always been an area of interest for popular companies can invest in costly high-level technology and machinery, but with the advent of cheap and small sized(debit-card computers such as the Raspberry Pi has a greater role in society. The RaspberryPimicrocomputer was developed for the sole purpose of commercial and academicals use. The applications of any sort of computer vision or feature detection software in general are numerous. Examples: people tracking at shopping mall, surveillance systems with face recognition,helpingrobotsto pick up objects and to navigate, are monitoring the equipment. The idea behind this is to form a foundation of knowledge regarding embedded systems, visual detectionof objects and the basics of real-time image processing (or other features), upon which it is possible to add some layers of complexity and have to undergo further research with which to modulate projects ranging from less cost and face recognition or small real-time systems for simple object detection to high complex systems such as intelligent machines with self-learning robots with the capability of visual feedback. 1.2 Aim of thesis The main goal is to write a python application, with the help of Open CV libraries, which can be used on an embedded system, specifically a Raspberry Pi to:  Capture the coloured blobs from web camera feed  considering these blobs are objects, and save them in memory to keep track of their coordinates and other properties  Attempt to confirm the linear and realistic movement of these objects  Send helpful message about these objects and its movement continuously as datagram’s (using UDP protocol of network sockets) to any softwarewhich makes information requests. 1.2.1 Existing system In current state CCTV camera is used in all places especially in Bank for securitypurposeandCCTVcamera has been checked to find the movement or fault in the bank. Consider the situation like the intruder is coming to bank by today night to steal the money and this can be detected by tomorrow morning only and then we will be checking the CCTV camera to find the intruder. 1.2.1.1 Disadvantage  It fails to provide the high security  It requires large memory space to store the images  It fails to protect the money from the intruder. 1.2.2 Proposed system This proposed system is to provide the proper security to the bank by using raspberry pi kit and it follows the HMM algorithm .web camera captures the movement of object and send those images to thebank managerandtothe police station via whatsapp for security alertness .and it helps to catch the intruder before he departure from the bank with money.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2768 2. BLOCK DIAGRAM Fig.1 Description of block diagram: The block diagram consist of various components such as web camera ,raspberrypikitanddisplaymonitorand power unit and the process is shown in the figure 1. The camera is to monitors the bank and captures the images of it and these images are given as input to the video acquisition block, this will convert the images into video format.Andthis video is given as input to the frame separation part; this will convert the video into number of frames and the output of the frame separation block is given as input to the raspberry pi kit. Here it follows one algorithm called hidden Markov model (HMM) all theimageprocessingprocessisdonebythis algorithm. it gets the frames and it takes the two frames at first, in that the first frame is considered as reference image and the second frame is called as processing image, here the changes can be detected by cmeans, that is it compares the two frames(reference and processing images) and finds the changes in it ,this process is done by cmeans. And the output of the cmeans is given as input to the various filters .at first the noise in this image can be reduced by median filter and output of this filter is given to the kalman filter. This filter used to find the pixel variation by comparing the two frames. Then this output is given to the canny edge detection; this detectstheedgesoftheimage.And the back ground subtraction (bgs) is used to fix thethreshold value which can be used to detect the movement changes when it exceeds the threshold value. And the optical flow is used to track the movement of the object flow (direction of movement). Thefinal detected image can send via whatsapp for alertness. This can be done by whatsapp library which will make communication between python language and the high level language used in the whatsapp. And the display monitoris connected to the raspberrypi to view the detected image. The raspberry pi requires power unit of five volt and 2amps.and it requires LAN/WIFI connection to send the image via whatsapp and open CV contains all the functions related to the raspberry pi and pi kit works by rasbian OS. 2.1 Hardware used: Raspberrypi kit, web camera, power unit 2.2 Software used: Geany, python (language), HMM (algorithm), open CV, whatsapp library. 3. COMPONENTS DESCRIPTION: 3.1 Raspberry Pi Raspberry Pi is a better choice when taking into account of relatively high performance requirements of image processing and the equipment currently available for image processing, are the relatively inexpensive and powerful embedded platform. Raspberrypi has the availability of the Pi camera module,whichcancapturehigh- clarity video as well as snaps which are another factor for chosen RaspberryPi and this requires a continues updating of Raspberrypi firmwaretothelatestversion.It worksbetter with OpenCV based applications. Even though using the officially supported camera module, It can be accessed through the V4L APIs and MMAL and it is accepted by the numerous third-party libraries, It can use any USB web- camera.  It works by rasbian OS  It act as micro controller as well as micro processor  It is inbuilt with blue tooth, WIFI/LAN  It has ARM11 processor  It has 1gb RAM  It can accept 32 GB memory card 3.2 Web camera Continuous monitoring and pixel support of 16 mega pixels 3.3 video acquisition The video capture process is to convert the analog image into the digital image by the analog to digital converter. Next, the chrominance is been demodulated to produce color difference video data. It converts the images into video format. 3.4 Background subtraction It is used for detecting the moving objects from the difference between the current frame and a reference frame by fixing the threshold. It helps to fix the threshold to track the movement. 3.5 Hidden Markov model (HMM) In a hidden Markov model, the state is not been directly visible, but the output whichdependentonthestate, is visible. Hidden Markov models are especially used for the application such as speech, gesture recognition, part-of- speech tagging, musical score following, partial discharges and bioinformatics. A hidden Markov model can be considered as generalization of a mixture model where the hidden variables are considered for observation.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2769 3.6 Median filter Median filtering technique often used to remove noise from the images such noise reduction is a typical pre- processing step to develop the resultsforfurther processing. 3.7 Fuzzy c-means (FCM) is a data clustering technique in which a dataset is grouped into n clusters with every data point.This is used to compare the two images to find the changes. 3.8 Kalman filtering It is also known as linear quadratic estimation (LQE) filter .which is used to find the pixel variation by comparing the reference and processing image. The Kalman filter has variety of applicationsintechnology.A common application is for guidance, navigation, and control of vehicles, particularly aircraft and spacecraft. Furthermore, the Kalman filter is a widely applied concept in time series. 3.9 Canny edge detector It was developed by Jhon F.Canny in 1986 it is an edge detection operator that uses a multi- stage algorithm to detect a wide range of edges in images. 3.10 Optical flow It detects the motion of objects, surfaces, and edges in a visual scene caused by the relative motion between an observer and a scene. It is also called as scene flow. Which detects the flow of movement.The idea of optical flow was created by the American psychologist James J. Gibson in the 1940. 3.11 OpenCV (Open Source Computer Vision Library) It is an open source computer vision and machine learning software library. OpenCV was developed toprovide a common infrastructure for computer vision applications and to accelerate the use of machine perception in the commercial products. It has C++, C, Python, Java and MATLAB interfaces and supports Windows, Linux, Android and Mac OS. It has all the functions relatedto raspberrypi kit. Advantages  It provides high security  It requires very less memory space to store the images  Less cost  Small in size Applications  Bank  Jewellery shop  Expensive exhibition 4. CONCLUSION In this paper a web camera is used to detect the movement of object by using raspberrypi kit and sending alertness messages via whatsapp and thus provides the perfect security. ACKNOWLEDGEMENT The authors are gratefullyacknowledgingthesupport extent by the respective institute in bringing out this article. We also thankful to faculties of Electronics and Communication Engineering department REFERENCES [1] ‘Motion video sensor in the compressed domain'. SCS Euro media Conf., Valencia, Spain, 2001. [2] GieseandT.Poggio (2003) Neural mechanisms for the Recognition of Biological movement sand action. Nature Reviews Neuro science 4:179–192. [3] “Neural Networks for 3D Motion Detection From a Sequence of Image Frames,” Chan Lai Wan and Yip Pak Ching, IEEE, computer Science Dept., The Chinese University of Hong Kong, 1991. [4] Ferster and K.D. Miller. (2000). Neural mechanisms of orientation Selectivity in the visual cortex. Annual Review of Neuroscience, 23:441–471. BIOGRAPHIES Meharaj Begum.R pursuing her B.E degree in Electronics and Communication Engineering in Parisutham Institute of Technology and Science. Priyadharshini.K pursuing her B.E degree in Electronics and Communication Engineering in Parisutham Institute of Technology and Science. Swathi.K pursuing her B.E degree in Electronics and Communication Engineering in Parisutham Institute of Technology and Science. Anusha.P.M completed her ME in VLSI Design in Kings College of Engineering and completed her BE in Electronics and Communication Engineering in Periyar Maniyammai University. She is working as Assistant Professor in Parisutham Institute of Technology and Science. Sofiya Jenifer.J completed her ME in VLSI Design in Kings College of Engineering and completed her BE in Electronics and Communication Engineering in Anjalai Ammal Mahalingam EngineeringCollege.Sheisworkingas Assistant Professor in Parisutham Instituteof TechnologyandScience.