"Technological advancements are inevitable and the field of IoT is no exception. The utilization of the technologies in various sectors is highly employed. Even though we use technology in various sectors, the employment of technology for security purposes is very low. The Existing security in various places only CCTV is used for monitoring and recording. Even there are existing security systems where an alert is sent via an email which requires a stable internet connection. It is unlikely that we expect the user to be always connected to an internet source. In the Proposed system, authorized users faces will be trained and stored in a Database. Initially, when an unknown known person enters in the zone the camera module will capture the intruders face. The captured intruder's face will be compared with the trained faces in the database. If the person's face doesn't match, the micro controller will send an alert SMS to the recognized user and also the intruder's captured image will be E mailed to the user. The authorized user should acknowledge the SMS message. If he fails to acknowledge the message within a threshold time limit, an alert call will be made to the concerned user. By this the user gets intimated in real time. Keerthanna G. S | Praveen Kumar P | Vishnu Prasad K | Ms. S. Sri Heera ""A Modern Technique for Unauthorized Human Detection and Intimation"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21659.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/21659/a-modern-technique-for-unauthorized-human-detection-and-intimation/keerthanna-g-s"
Two Step Design for Personal Authentication Using Finger Vein Recognition and...IJTET Journal
1. The document proposes a two-step personal authentication method using finger vein recognition and GSM technology. Finger vein recognition is used as the first level of security, where a person's finger vein pattern is scanned and matched with a stored database image for authentication. GSM technology is used as the second level of security, where the user sends a one-time password (OTP) via SMS to the system, which then sends a response OTP back to the user for access.
2. The system takes 0.5 seconds to authenticate a finger vein sample and has an average error rate of 0.06. It uses MATLAB processing to refine finger vein images and improve matching accuracy. If authentication is successful at both levels,
The Internet-based security Soft-i-Robot is modeled using Soft computing paradigms for problem solving and decision-making in complex and ill-structured situations. Soft-i-Robot monitors the workspace with multimedia devices and sensor using an Internet application program. The model has sensory subsystems such as Intruder detection which, detects intruder, captures image and sends to server, and an Obstacle Avoidance Unit to detect the objects in the path of the mobile robot. These multiple features with hybrid Soft computing techniques depart the developed Soft-i-Robot from the existing developments, proving that the streaming technology-based approach greatly improves the sensibility of robot tele-operation. The relatively powerful online robots available today provoke the simple question, in terms of two competing goals: recognition accuracy and computing time. Improved recognition accuracy and reduced computing time for face recognition of the intruder is obtained using Morphological Shared Weight Neural Network. To obtain a collision-free optimized path, Soft-i-Robot uses derivative free Genetic Algorithm. With rapid expansion of Robotics and Soft computing paradigms, robotic technology touches upon self-understanding of humans, socio-economic, legal and ethical issues leading to improved performance rate and information processing capabilities.
Steganography is the technique of hiding secret data within an ordinary, non-secret, file or
message in order to avoid detection; the secret data is then extracted at its destination. The use of
steganography can be combined with encryption as an extra step for hiding or protecting data. The
word steganographyis derived from the Greek words steganos(hidden or covered) and the Greek root
graph(write).Steganography is dedicated for covert communication. It changes the image in such a way
that only the sender and the intended receiver can detect the message sent through it. Since it is
invisible, the detection of secret data is not simple.
Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...IOSR Journals
The document describes a digital pen system for handwritten digit and gesture recognition using a trajectory recognition algorithm. The system uses a tri-axial accelerometer, ARM processor, and Zigbee module in a pen-like device to capture acceleration signals from hand motions. The signals are transmitted wirelessly and a trajectory recognition algorithm processes the data through steps of acquisition, preprocessing, feature generation/selection, and extraction to recognize digits and gestures written in air. The system aims to allow for flexible use without limitations of range, environment, or surface that other methods impose. It provides a portable and generalized approach to human-computer interaction through writing and gestures.
Optimized image processing and clustering to mitigate security threats in mob...TELKOMNIKA JOURNAL
Since there are provisions of many attributes that are not possible or difficult to follow by networks conventionally, mobile ad-hoc networks are extensively deployed. This application starts through the defense sectors, the sensory node presents in the hostile territories down to the gadgets for congestion communication in traffic by general transportation when travelling for adequate provision of infrastructure during disaster recovery. As a lot of importance related to (mobile ad hoc network) MANET application, one important factor in ad-hoc networks is security. Using image processing for securing MANET is the area of focus of this research. Therefore, in this article, the security threats are assessed and representative proposals are summarized in ad-hoc network’s context. The study reviewed the current situation of the art for original to security provision called mobile ad hoc network for wireless networking. The threats to security are recognized while the present solution is observed. The study additionally summarized education erudite, talks on general issues and future instructions are recognized. Also, in this study, the forecast weighted clustering algorithm (FWCA) is employed as a cluster head over weighted clustering algorithm (WCA) is examined as quality in cluster-based routing, service is highly significant with MANET.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IRJET - Deep Learning Applications and Frameworks – A ReviewIRJET Journal
This document reviews deep learning applications and frameworks. It begins by defining deep learning and discussing how deep neural networks can be used to automatically identify patterns in large datasets. It then discusses several applications of deep learning, including self-driving cars, news aggregation, natural language processing, virtual assistants, and visual recognition. The document also describes artificial neural networks and deep neural networks. Finally, it reviews several popular deep learning frameworks, including TensorFlow, PyTorch, Keras, Caffe, and Chainer.
The document discusses smart cameras as embedded vision systems. It begins by describing the advantages of smart cameras compared to traditional PC-based vision systems, such as lower cost, simplicity of use, and reliability. It then describes the architecture of a smart camera system, including image sensors, analog-to-digital conversion, embedded image processing electronics, and a microprocessor for control. As an example, it presents a static gray-scale thresholding algorithm for image processing. It also provides an example of a multi-camera web inspection system networked to a single computer. Finally, it predicts future technological advances will lead to higher resolution smart cameras and new applications in automotive, security, and other industries.
Two Step Design for Personal Authentication Using Finger Vein Recognition and...IJTET Journal
1. The document proposes a two-step personal authentication method using finger vein recognition and GSM technology. Finger vein recognition is used as the first level of security, where a person's finger vein pattern is scanned and matched with a stored database image for authentication. GSM technology is used as the second level of security, where the user sends a one-time password (OTP) via SMS to the system, which then sends a response OTP back to the user for access.
2. The system takes 0.5 seconds to authenticate a finger vein sample and has an average error rate of 0.06. It uses MATLAB processing to refine finger vein images and improve matching accuracy. If authentication is successful at both levels,
The Internet-based security Soft-i-Robot is modeled using Soft computing paradigms for problem solving and decision-making in complex and ill-structured situations. Soft-i-Robot monitors the workspace with multimedia devices and sensor using an Internet application program. The model has sensory subsystems such as Intruder detection which, detects intruder, captures image and sends to server, and an Obstacle Avoidance Unit to detect the objects in the path of the mobile robot. These multiple features with hybrid Soft computing techniques depart the developed Soft-i-Robot from the existing developments, proving that the streaming technology-based approach greatly improves the sensibility of robot tele-operation. The relatively powerful online robots available today provoke the simple question, in terms of two competing goals: recognition accuracy and computing time. Improved recognition accuracy and reduced computing time for face recognition of the intruder is obtained using Morphological Shared Weight Neural Network. To obtain a collision-free optimized path, Soft-i-Robot uses derivative free Genetic Algorithm. With rapid expansion of Robotics and Soft computing paradigms, robotic technology touches upon self-understanding of humans, socio-economic, legal and ethical issues leading to improved performance rate and information processing capabilities.
Steganography is the technique of hiding secret data within an ordinary, non-secret, file or
message in order to avoid detection; the secret data is then extracted at its destination. The use of
steganography can be combined with encryption as an extra step for hiding or protecting data. The
word steganographyis derived from the Greek words steganos(hidden or covered) and the Greek root
graph(write).Steganography is dedicated for covert communication. It changes the image in such a way
that only the sender and the intended receiver can detect the message sent through it. Since it is
invisible, the detection of secret data is not simple.
Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...IOSR Journals
The document describes a digital pen system for handwritten digit and gesture recognition using a trajectory recognition algorithm. The system uses a tri-axial accelerometer, ARM processor, and Zigbee module in a pen-like device to capture acceleration signals from hand motions. The signals are transmitted wirelessly and a trajectory recognition algorithm processes the data through steps of acquisition, preprocessing, feature generation/selection, and extraction to recognize digits and gestures written in air. The system aims to allow for flexible use without limitations of range, environment, or surface that other methods impose. It provides a portable and generalized approach to human-computer interaction through writing and gestures.
Optimized image processing and clustering to mitigate security threats in mob...TELKOMNIKA JOURNAL
Since there are provisions of many attributes that are not possible or difficult to follow by networks conventionally, mobile ad-hoc networks are extensively deployed. This application starts through the defense sectors, the sensory node presents in the hostile territories down to the gadgets for congestion communication in traffic by general transportation when travelling for adequate provision of infrastructure during disaster recovery. As a lot of importance related to (mobile ad hoc network) MANET application, one important factor in ad-hoc networks is security. Using image processing for securing MANET is the area of focus of this research. Therefore, in this article, the security threats are assessed and representative proposals are summarized in ad-hoc network’s context. The study reviewed the current situation of the art for original to security provision called mobile ad hoc network for wireless networking. The threats to security are recognized while the present solution is observed. The study additionally summarized education erudite, talks on general issues and future instructions are recognized. Also, in this study, the forecast weighted clustering algorithm (FWCA) is employed as a cluster head over weighted clustering algorithm (WCA) is examined as quality in cluster-based routing, service is highly significant with MANET.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IRJET - Deep Learning Applications and Frameworks – A ReviewIRJET Journal
This document reviews deep learning applications and frameworks. It begins by defining deep learning and discussing how deep neural networks can be used to automatically identify patterns in large datasets. It then discusses several applications of deep learning, including self-driving cars, news aggregation, natural language processing, virtual assistants, and visual recognition. The document also describes artificial neural networks and deep neural networks. Finally, it reviews several popular deep learning frameworks, including TensorFlow, PyTorch, Keras, Caffe, and Chainer.
The document discusses smart cameras as embedded vision systems. It begins by describing the advantages of smart cameras compared to traditional PC-based vision systems, such as lower cost, simplicity of use, and reliability. It then describes the architecture of a smart camera system, including image sensors, analog-to-digital conversion, embedded image processing electronics, and a microprocessor for control. As an example, it presents a static gray-scale thresholding algorithm for image processing. It also provides an example of a multi-camera web inspection system networked to a single computer. Finally, it predicts future technological advances will lead to higher resolution smart cameras and new applications in automotive, security, and other industries.
IRJET- Confidential Data Access through Deep Learning Iris BiometricsIRJET Journal
This document describes a study that explores using iris recognition and deep learning as a biometric authentication method for sensitive mobile transactions. The proposed system uses a deep neural network classifier and edge detection with adaptive contour segmentation to identify individuals from iris images. It authenticates website access through MATLAB. The system is said to enhance security compared to existing methods by fusing information from iris and surrounding eye region features. Evaluation shows it reduces computation time and improves specificity, sensitivity and accuracy compared to region-based segmentation alone.
IRJET- Intrusion Detection through Image Processing and Getting Notified ...IRJET Journal
This document describes a proposed smart home intrusion detection system that uses image processing, face recognition, and notification technologies. The system would use an infrared camera and sensors to detect intruders, capture images of their faces, compare the images to a database to identify known intruders, and immediately notify home owners via mobile app with push notifications and images of the intruders. It discusses the system architecture, use of Raspberry Pi, image processing algorithms like LBPH, challenges with current systems, and outlines the development of an Android mobile app to facilitate user notifications.
Web-Based Online Embedded Security System And Alertness Via Social MediaIRJET Journal
This document describes a proposed web-based online embedded security system and alertness via social media. The system uses a Raspberry Pi kit with a hidden Markov model algorithm to analyze frames from a web camera monitoring a bank. It detects changes and object movement to identify intruders. If an intruder is detected, alerts are sent via WhatsApp to the bank manager and police for security purposes. The system aims to provide improved bank security over existing CCTV systems by more quickly detecting intruders before they can steal money.
Deep hypersphere embedding for real-time face recognitionTELKOMNIKA JOURNAL
With the advancement of human-computer interaction capabilities of robots, computer vision surveillance systems involving security yields a large impact in the research industry by helping in digitalization of certain security processes. Recognizing a face in the computer vision involves identification and classification of which faces belongs to the same person by means of comparing face embedding vectors. In an organization that has a large and diverse labelled dataset on a large number of epoch, oftentimes, creates a training difficulties involving incompatibility in different versions of face embedding that leads to poor face recognition accuracy. In this paper, we will design and implement robotic vision security surveillance system incorporating hybrid combination of MTCNN for face detection, and FaceNet as the unified embedding for face recognition and clustering.
This document describes a project report for a GSM based e-notice board. It includes an introduction that provides an overview of the project, describing information transfer and system components. It also includes sections on literature survey, problem definition, system requirements specification, system modelling and design, implementation, testing, and conclusion. The project involved interfacing a GSM modem, LCD display, and microcontroller to allow notices to be sent via SMS and displayed on the board. It was implemented at the institute level as a proposal.
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...IRJET Journal
This document proposes an efficient model for detecting and identifying cyber attacks in wireless networks using deep learning approaches. The model is designed to perform feature selection and classification on network data to detect malicious behavior. The model architecture includes input, hidden, and output layers for feature extraction, and uses a random forest classifier trained on the NSL KDD Cup dataset. Experimental results using the KDD Cup and NSL-KDD datasets show the model can accurately classify network behaviors and detect cyber attacks with over 82% accuracy.
Recognizing of Text and Product Label from Hand Held Entity Intended for Visi...YogeshIJTSRD
Our proposed work involves recognizing text and product label reading from portable entities intended for Visionless Persons using Raspberry Pi 3, ultrasonic sensor. Raspberry Pi 3 is the controller used in the proposed device. GPS is fixed in the system and it is used to find the exact location of the person in terms of longitude and latitude, this information is sent to the caretaker through e mail. The caretaker can use the latitude and longitude to find the address on Google Maps. The camera is used to identify the obstacle or object ahead and the output is told to the blind user in speech form. The camera also identifies objects with words on them, using image processing these images are converted to text, and using Tesseract the text is converted to speech, thus giving the speech output to the blind about what is written on the object. RF ID is used to find the stick using tags. The buzzer goes ON to identify the location of the stick. A threshold value for distance between the user and the stick is set, when the distance is less than the threshold value, the buzzer sound increases. Arunkumar. V | Aswin M. D | Bhavan. S | Gopinath. V | Dr. Kishorekumar. A "Recognizing of Text and Product Label from Hand Held Entity Intended for Visionless Persons" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd39808.pdf Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/39808/recognizing-of-text-and-product-label-from-hand-held-entity-intended-for-visionless-persons/arunkumar-v
Accessing Operating System using Finger GestureIRJET Journal
This document describes a system for accessing an operating system using finger gestures captured by a webcam. The system aims to reduce costs compared to existing gesture recognition systems that use expensive sensors like Kinect. It uses image processing algorithms to detect hand gestures from webcam input, recognize gestures like number of fingers, and execute corresponding operating system commands. The system architecture first segments hand regions from background, then classifies skin pixels and detects colored tapes on fingers to identify gestures. It can open programs and navigate computer contents contactlessly using natural hand movements. The proposed system aims to provide an affordable alternative for human-computer interaction without external input devices like mice or keyboards.
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET Journal
This document discusses security techniques for data transmission in ad-hoc networks, specifically encrypted data transmission and steganography. It proposes a system that enables encrypted data transmission between nodes and uses steganography to hide encrypted data in cover files like images, audio, and video during transmission for additional security. The system architecture includes modules for user interface, embedding secret data in cover files, extracting secret data, sending files between nodes, and receiving files. It aims to securely transmit data in ad-hoc networks using both encryption and steganography to protect confidentiality and integrity of transmitted data.
IRJET- A Survey on Control of Mechanical ARM based on Hand Gesture Recognitio...IRJET Journal
This document summarizes a research paper that proposed a system using wearable IMU sensors and machine learning to recognize hand gestures and control a mechanical arm. The system uses an IMU-based wearable device to collect gesture data from hand movements. A support vector machine classifier is used to classify the gestures in real-time and control the movements of a mechanical arm. The paper reviews several related works that used different sensors and machine learning algorithms for hand gesture recognition, finding that support vector machines provided high accuracy for gesture classification. The proposed system aims to allow remote control of machines through natural hand gestures.
DISTRIBUTED SYSTEM FOR 3D REMOTE MONITORING USING KINECT DEPTH CAMERAScscpconf
This article describes the design and development ofa system for remote indoor 3D monitoring
using an undetermined number of Microsoft® Kinect sensors. In the proposed client-server
system, the Kinect cameras can be connected to different computers, addressing this way the
hardware limitation of one sensor per USB controller. The reason behind this limitation is the
high bandwidth needed by the sensor, which becomes also an issue for the distributed system
TCP/IP communications. Since traffic volume is too high, 3D data has to be compressed before
it can be sent over the network. The solution consists in self-coding the Kinect data into RGB
images and then using a standard multimedia codec to compress color maps. Information from
different sources is collected into a central client computer, where point clouds are transformed
to reconstruct the scene in 3D. An algorithm is proposed to conveniently merge the skeletons
detected locally by each Kinect, so that monitoring of people is robust to self and inter-user
occlusions. Final skeletons are labeled and trajectories of every joint can be saved for event
reconstruction or further analysis.
IRJET- A Deep Learning based Approach for Automatic Detection of Bike Rid...IRJET Journal
1) The document presents a deep learning approach for automatically detecting motorcycle riders without helmets using video surveillance.
2) It involves preprocessing video frames, extracting features from images using CNNs, and classifying whether individuals are wearing helmets or not.
3) If a person is classified as not wearing a helmet, the system will capture their license plate number and send an SMS fine notification. The goal is to help enforce traffic safety rules and prevent accidents.
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET Journal
This document proposes a hybrid approach to text and image steganography using AES encryption and LSB substitution. It begins with background on cryptography, steganography, and image steganography techniques. It then reviews related work that uses direct hiding, XOR encryption, AES encryption with LSB nibble substitution, and techniques requiring pre-agreed cover images. The proposed system first encrypts a text or image using AES before embedding it in a cover image using an improved LSB technique that can store more data while maintaining image quality. It presents the methodology, sample screenshots and concludes the technique provides improved security while being user friendly. Future work could extend it to other file types and formats.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...IJERA Editor
In today's modern world, security plays an important role. For that purpose, we proposed advance security systems for banking locker system and the bank customers. This specialized security is proposed through four different modules in combination i.e. face detection technique, Password verification, finger prints and Iris verification .All these steps are followed in the sequence if anything goes wrong he or she is unable to access the system. We are also providing some additional billing with it i.e. it will always for after 1 transaction. It will give the intimation of first transaction is complete and you are left with prescribed number transaction mentioned in system.
Machine Learning approach for Assisting Visually ImpairedIJTET Journal
Abstract- India has the largest blind population in the world. The complex Indian environment makes it difficult for the people to navigate using the present technology. In-order to navigate effectively a wearable computing system should learn the environment by itself, thus providing enough information for making visually impaired adapt to the environment. The traditional learning algorithm requires the entire percept sequence to learn. This paper will propose algorithms for learning from various sensory inputs with selected percept sequence; analyze what feature and data should be considered for real time learning and how they can be applied for autonomous navigation for blind, what are the problem parameters to be considered for the blind navigation/protection, tools and how it can be used on other application.
ABSTRACT The success of the cloud computing paradigm is due to its on-demand, self-service, and pay-by-use nature. Public key encryption with keyword search applies only to the certain circumstances that keyword cipher text can only be retrieved by a specific user and only supports single-keyword matching. In the existing searchable encryption schemes, either the communication mode is one-to-one, or only single-keyword search is supported. This paper proposes a searchable encryption that is based on attributes and supports multi-keyword search. Searchable encryption is a primitive, which not only protects data privacy of data owners but also enables data users to search over the encrypted data. Most existing searchable encryption schemes are in the single-user setting. There are only few schemes in the multiple data users setting, i.e., encrypted data sharing. Among these schemes, most of the early techniques depend on a trusted third party with interactive search protocols or need cumbersome key management. To remedy the defects, the most recent approaches borrow ideas from attribute-based encryption to enable attribute-based keyword search (ABKS
The document describes a wireless notice board system using Zigbee technology. The system allows messages to be wirelessly transmitted from a transmitter connected to a PC to multiple receiver displays. The messages are stored in EEPROM memory on the receiver boards so they can still be displayed after a power failure. This overcomes issues with existing wired and GSM-based notice boards by providing a reliable wireless solution.
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...ijwmn
This paper proposes a virtual architecture for three-dimensional (3D) wireless sensor networks (WSNs), a dynamic coordinate system, and a scalable energy-efficient training protocol for collections of nodes deployed in the space that are initially anonymous, asynchronous, and unaware of their initial location. The 3D WSNs considered comprise massively deployed tiny energy-constrained commodity sensors and one or more sink nodes that provide an interface to the outside world. The proposed architecture is a generalization of a two-dimensional virtual architecture previously proposed in the literature, in which a flexible and intuitive coordinate system is imposed onto the deployment area and the anonymous nodes are partitioned into clusters where data can be gathered from the environment and synthesized under local control. The architecture solves the hidden sensors problem that occurs because of irregularities in rugged deployment areas or environments containing buildings by training the network of nodes arbitrarily dispersed in the 3D space. In addition, we derive two simple and energy-efficient routing protocols, respectively for dense and sparse networks, based on the proposed dynamic coordinate system. They are used to minimize the power expended in collecting and routing data to the sink node, thus increasing the lifetime of the network.
Design and Implementation of Smart Bell Notification System using IoTIJRTEMJOURNAL
This document describes the design and implementation of a smart bell notification system using IoT. The system uses a camera to capture an image of a visitor when the doorbell is pressed and sends the image to the owner via SMS along with an alert. It also saves the images to a Google Drive folder. The system aims to provide home security and convenience by allowing owners to see who is at the door and take appropriate action. It uses an ARM-7 microcontroller, GSM modem, camera and cloud storage to enable this smart doorbell notification feature.
Design and Implementation of Smart Bell Notification System using IoT journal ijrtem
This document describes the design and implementation of a smart bell notification system using IoT. The system uses a camera to capture an image of a visitor when the doorbell is pressed and sends the image to the owner via SMS along with an alert. It also saves the images to a Google Drive folder. The system aims to provide home security and convenience by allowing owners to see who is at the door and take appropriate action. It uses an ARM-7 microcontroller, GSM modem, camera and cloud storage to enable this smart doorbell notification feature.
Implementation of Tiny Machine Learning Models on Arduino 33 – BLE for Gestur...Springer
This document discusses the implementation of gesture recognition and speech recognition applications using Tiny Machine Learning (TinyML) models on an Arduino Nano 33 BLE Sense board. The authors trained TinyML models using the EdgeImpulse framework to recognize hand gestures and speech commands. For gesture recognition, the model could detect wave and flex motions of the hand. For speech recognition, the model controlled an RGB LED on the Arduino board to light up red, green or blue based on the keyword spoken. Implementing machine learning capabilities on embedded devices using TinyML frameworks allows low power usage and local computing while integrating sensors for human-computer interaction applications.
IRJET- Confidential Data Access through Deep Learning Iris BiometricsIRJET Journal
This document describes a study that explores using iris recognition and deep learning as a biometric authentication method for sensitive mobile transactions. The proposed system uses a deep neural network classifier and edge detection with adaptive contour segmentation to identify individuals from iris images. It authenticates website access through MATLAB. The system is said to enhance security compared to existing methods by fusing information from iris and surrounding eye region features. Evaluation shows it reduces computation time and improves specificity, sensitivity and accuracy compared to region-based segmentation alone.
IRJET- Intrusion Detection through Image Processing and Getting Notified ...IRJET Journal
This document describes a proposed smart home intrusion detection system that uses image processing, face recognition, and notification technologies. The system would use an infrared camera and sensors to detect intruders, capture images of their faces, compare the images to a database to identify known intruders, and immediately notify home owners via mobile app with push notifications and images of the intruders. It discusses the system architecture, use of Raspberry Pi, image processing algorithms like LBPH, challenges with current systems, and outlines the development of an Android mobile app to facilitate user notifications.
Web-Based Online Embedded Security System And Alertness Via Social MediaIRJET Journal
This document describes a proposed web-based online embedded security system and alertness via social media. The system uses a Raspberry Pi kit with a hidden Markov model algorithm to analyze frames from a web camera monitoring a bank. It detects changes and object movement to identify intruders. If an intruder is detected, alerts are sent via WhatsApp to the bank manager and police for security purposes. The system aims to provide improved bank security over existing CCTV systems by more quickly detecting intruders before they can steal money.
Deep hypersphere embedding for real-time face recognitionTELKOMNIKA JOURNAL
With the advancement of human-computer interaction capabilities of robots, computer vision surveillance systems involving security yields a large impact in the research industry by helping in digitalization of certain security processes. Recognizing a face in the computer vision involves identification and classification of which faces belongs to the same person by means of comparing face embedding vectors. In an organization that has a large and diverse labelled dataset on a large number of epoch, oftentimes, creates a training difficulties involving incompatibility in different versions of face embedding that leads to poor face recognition accuracy. In this paper, we will design and implement robotic vision security surveillance system incorporating hybrid combination of MTCNN for face detection, and FaceNet as the unified embedding for face recognition and clustering.
This document describes a project report for a GSM based e-notice board. It includes an introduction that provides an overview of the project, describing information transfer and system components. It also includes sections on literature survey, problem definition, system requirements specification, system modelling and design, implementation, testing, and conclusion. The project involved interfacing a GSM modem, LCD display, and microcontroller to allow notices to be sent via SMS and displayed on the board. It was implemented at the institute level as a proposal.
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...IRJET Journal
This document proposes an efficient model for detecting and identifying cyber attacks in wireless networks using deep learning approaches. The model is designed to perform feature selection and classification on network data to detect malicious behavior. The model architecture includes input, hidden, and output layers for feature extraction, and uses a random forest classifier trained on the NSL KDD Cup dataset. Experimental results using the KDD Cup and NSL-KDD datasets show the model can accurately classify network behaviors and detect cyber attacks with over 82% accuracy.
Recognizing of Text and Product Label from Hand Held Entity Intended for Visi...YogeshIJTSRD
Our proposed work involves recognizing text and product label reading from portable entities intended for Visionless Persons using Raspberry Pi 3, ultrasonic sensor. Raspberry Pi 3 is the controller used in the proposed device. GPS is fixed in the system and it is used to find the exact location of the person in terms of longitude and latitude, this information is sent to the caretaker through e mail. The caretaker can use the latitude and longitude to find the address on Google Maps. The camera is used to identify the obstacle or object ahead and the output is told to the blind user in speech form. The camera also identifies objects with words on them, using image processing these images are converted to text, and using Tesseract the text is converted to speech, thus giving the speech output to the blind about what is written on the object. RF ID is used to find the stick using tags. The buzzer goes ON to identify the location of the stick. A threshold value for distance between the user and the stick is set, when the distance is less than the threshold value, the buzzer sound increases. Arunkumar. V | Aswin M. D | Bhavan. S | Gopinath. V | Dr. Kishorekumar. A "Recognizing of Text and Product Label from Hand Held Entity Intended for Visionless Persons" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd39808.pdf Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/39808/recognizing-of-text-and-product-label-from-hand-held-entity-intended-for-visionless-persons/arunkumar-v
Accessing Operating System using Finger GestureIRJET Journal
This document describes a system for accessing an operating system using finger gestures captured by a webcam. The system aims to reduce costs compared to existing gesture recognition systems that use expensive sensors like Kinect. It uses image processing algorithms to detect hand gestures from webcam input, recognize gestures like number of fingers, and execute corresponding operating system commands. The system architecture first segments hand regions from background, then classifies skin pixels and detects colored tapes on fingers to identify gestures. It can open programs and navigate computer contents contactlessly using natural hand movements. The proposed system aims to provide an affordable alternative for human-computer interaction without external input devices like mice or keyboards.
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET Journal
This document discusses security techniques for data transmission in ad-hoc networks, specifically encrypted data transmission and steganography. It proposes a system that enables encrypted data transmission between nodes and uses steganography to hide encrypted data in cover files like images, audio, and video during transmission for additional security. The system architecture includes modules for user interface, embedding secret data in cover files, extracting secret data, sending files between nodes, and receiving files. It aims to securely transmit data in ad-hoc networks using both encryption and steganography to protect confidentiality and integrity of transmitted data.
IRJET- A Survey on Control of Mechanical ARM based on Hand Gesture Recognitio...IRJET Journal
This document summarizes a research paper that proposed a system using wearable IMU sensors and machine learning to recognize hand gestures and control a mechanical arm. The system uses an IMU-based wearable device to collect gesture data from hand movements. A support vector machine classifier is used to classify the gestures in real-time and control the movements of a mechanical arm. The paper reviews several related works that used different sensors and machine learning algorithms for hand gesture recognition, finding that support vector machines provided high accuracy for gesture classification. The proposed system aims to allow remote control of machines through natural hand gestures.
DISTRIBUTED SYSTEM FOR 3D REMOTE MONITORING USING KINECT DEPTH CAMERAScscpconf
This article describes the design and development ofa system for remote indoor 3D monitoring
using an undetermined number of Microsoft® Kinect sensors. In the proposed client-server
system, the Kinect cameras can be connected to different computers, addressing this way the
hardware limitation of one sensor per USB controller. The reason behind this limitation is the
high bandwidth needed by the sensor, which becomes also an issue for the distributed system
TCP/IP communications. Since traffic volume is too high, 3D data has to be compressed before
it can be sent over the network. The solution consists in self-coding the Kinect data into RGB
images and then using a standard multimedia codec to compress color maps. Information from
different sources is collected into a central client computer, where point clouds are transformed
to reconstruct the scene in 3D. An algorithm is proposed to conveniently merge the skeletons
detected locally by each Kinect, so that monitoring of people is robust to self and inter-user
occlusions. Final skeletons are labeled and trajectories of every joint can be saved for event
reconstruction or further analysis.
IRJET- A Deep Learning based Approach for Automatic Detection of Bike Rid...IRJET Journal
1) The document presents a deep learning approach for automatically detecting motorcycle riders without helmets using video surveillance.
2) It involves preprocessing video frames, extracting features from images using CNNs, and classifying whether individuals are wearing helmets or not.
3) If a person is classified as not wearing a helmet, the system will capture their license plate number and send an SMS fine notification. The goal is to help enforce traffic safety rules and prevent accidents.
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET Journal
This document proposes a hybrid approach to text and image steganography using AES encryption and LSB substitution. It begins with background on cryptography, steganography, and image steganography techniques. It then reviews related work that uses direct hiding, XOR encryption, AES encryption with LSB nibble substitution, and techniques requiring pre-agreed cover images. The proposed system first encrypts a text or image using AES before embedding it in a cover image using an improved LSB technique that can store more data while maintaining image quality. It presents the methodology, sample screenshots and concludes the technique provides improved security while being user friendly. Future work could extend it to other file types and formats.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...IJERA Editor
In today's modern world, security plays an important role. For that purpose, we proposed advance security systems for banking locker system and the bank customers. This specialized security is proposed through four different modules in combination i.e. face detection technique, Password verification, finger prints and Iris verification .All these steps are followed in the sequence if anything goes wrong he or she is unable to access the system. We are also providing some additional billing with it i.e. it will always for after 1 transaction. It will give the intimation of first transaction is complete and you are left with prescribed number transaction mentioned in system.
Machine Learning approach for Assisting Visually ImpairedIJTET Journal
Abstract- India has the largest blind population in the world. The complex Indian environment makes it difficult for the people to navigate using the present technology. In-order to navigate effectively a wearable computing system should learn the environment by itself, thus providing enough information for making visually impaired adapt to the environment. The traditional learning algorithm requires the entire percept sequence to learn. This paper will propose algorithms for learning from various sensory inputs with selected percept sequence; analyze what feature and data should be considered for real time learning and how they can be applied for autonomous navigation for blind, what are the problem parameters to be considered for the blind navigation/protection, tools and how it can be used on other application.
ABSTRACT The success of the cloud computing paradigm is due to its on-demand, self-service, and pay-by-use nature. Public key encryption with keyword search applies only to the certain circumstances that keyword cipher text can only be retrieved by a specific user and only supports single-keyword matching. In the existing searchable encryption schemes, either the communication mode is one-to-one, or only single-keyword search is supported. This paper proposes a searchable encryption that is based on attributes and supports multi-keyword search. Searchable encryption is a primitive, which not only protects data privacy of data owners but also enables data users to search over the encrypted data. Most existing searchable encryption schemes are in the single-user setting. There are only few schemes in the multiple data users setting, i.e., encrypted data sharing. Among these schemes, most of the early techniques depend on a trusted third party with interactive search protocols or need cumbersome key management. To remedy the defects, the most recent approaches borrow ideas from attribute-based encryption to enable attribute-based keyword search (ABKS
The document describes a wireless notice board system using Zigbee technology. The system allows messages to be wirelessly transmitted from a transmitter connected to a PC to multiple receiver displays. The messages are stored in EEPROM memory on the receiver boards so they can still be displayed after a power failure. This overcomes issues with existing wired and GSM-based notice boards by providing a reliable wireless solution.
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...ijwmn
This paper proposes a virtual architecture for three-dimensional (3D) wireless sensor networks (WSNs), a dynamic coordinate system, and a scalable energy-efficient training protocol for collections of nodes deployed in the space that are initially anonymous, asynchronous, and unaware of their initial location. The 3D WSNs considered comprise massively deployed tiny energy-constrained commodity sensors and one or more sink nodes that provide an interface to the outside world. The proposed architecture is a generalization of a two-dimensional virtual architecture previously proposed in the literature, in which a flexible and intuitive coordinate system is imposed onto the deployment area and the anonymous nodes are partitioned into clusters where data can be gathered from the environment and synthesized under local control. The architecture solves the hidden sensors problem that occurs because of irregularities in rugged deployment areas or environments containing buildings by training the network of nodes arbitrarily dispersed in the 3D space. In addition, we derive two simple and energy-efficient routing protocols, respectively for dense and sparse networks, based on the proposed dynamic coordinate system. They are used to minimize the power expended in collecting and routing data to the sink node, thus increasing the lifetime of the network.
Design and Implementation of Smart Bell Notification System using IoTIJRTEMJOURNAL
This document describes the design and implementation of a smart bell notification system using IoT. The system uses a camera to capture an image of a visitor when the doorbell is pressed and sends the image to the owner via SMS along with an alert. It also saves the images to a Google Drive folder. The system aims to provide home security and convenience by allowing owners to see who is at the door and take appropriate action. It uses an ARM-7 microcontroller, GSM modem, camera and cloud storage to enable this smart doorbell notification feature.
Design and Implementation of Smart Bell Notification System using IoT journal ijrtem
This document describes the design and implementation of a smart bell notification system using IoT. The system uses a camera to capture an image of a visitor when the doorbell is pressed and sends the image to the owner via SMS along with an alert. It also saves the images to a Google Drive folder. The system aims to provide home security and convenience by allowing owners to see who is at the door and take appropriate action. It uses an ARM-7 microcontroller, GSM modem, camera and cloud storage to enable this smart doorbell notification feature.
Implementation of Tiny Machine Learning Models on Arduino 33 – BLE for Gestur...Springer
This document discusses the implementation of gesture recognition and speech recognition applications using Tiny Machine Learning (TinyML) models on an Arduino Nano 33 BLE Sense board. The authors trained TinyML models using the EdgeImpulse framework to recognize hand gestures and speech commands. For gesture recognition, the model could detect wave and flex motions of the hand. For speech recognition, the model controlled an RGB LED on the Arduino board to light up red, green or blue based on the keyword spoken. Implementing machine learning capabilities on embedded devices using TinyML frameworks allows low power usage and local computing while integrating sensors for human-computer interaction applications.
A Digital Pen with a Trajectory Recognition AlgorithmIOSR Journals
Abstract : Now a days, the development of miniaturization technologies in electronic circuits and components has seriously decreased the dimension and weight of consumer electronic products, those are smart phones and handheld computers, and thus prepared them more handy and convenient. This paper contains an accelerometer-based digital pen for handwritten digit and gesture trajectory recognition applications. The digital pen consists of a triaxial accelerometer, a microcontroller, and an Zigbee wireless transmission module for sensing and collecting accelerations of handwriting and gesture trajectories. with this project we can do human computer interaction. Users can utilize this pen to write digits or make hand gestures, and the accelerations of hand motions calculated by the accelerometer are wirelessly transmitted to a computer for online trajectory recognition. So, by varying the position of mems (micro electro mechanical systems) we can capable to show the alphabetical characters in the PC. The acceleration signals calculated from the triaxial accelerometer are transmitted to a computer via the wireless module. Keywords - ARM, Zigbee, Sensors module
A Digital Pen with a Trajectory Recognition AlgorithmIOSR Journals
Abstract : Now a days, the development of miniaturization technologies in electronic circuits and components has seriously decreased the dimension and weight of consumer electronic products, those are smart phones and handheld computers, and thus prepared them more handy and convenient. This paper contains an accelerometer-based digital pen for handwritten digit and gesture trajectory recognition applications. The digital pen consists of a triaxial accelerometer, a microcontroller, and an Zigbee wireless transmission module for sensing and collecting accelerations of handwriting and gesture trajectories. with this project we can do human computer interaction. Users can utilize this pen to write digits or make hand gestures, and the accelerations of hand motions calculated by the accelerometer are wirelessly transmitted to a computer for online trajectory recognition. So, by varying the position of mems (micro electro mechanical systems) we can capable to show the alphabetical characters in the PC. The acceleration signals calculated from the triaxial accelerometer are transmitted to a computer via the wireless module. Keywords - ARM, Zigbee, Sensors module
Remote temperature and humidity monitoring system using wireless sensor networkseSAT Journals
Abstract Today’s world has become very advanced with smart appliances and devices like laptops, tablets, televisions. smart phones with different features and their usage has been enormously increasing in our day-to-day life. The technology advancement in Digital Electronics and Micro Electro Mechanical Systems. In this scenario the most important role is played by Wireless Sensor Networks and its development and usage in heterogeneous fields and several contexts. the home automation field and process control systems and health control systems widely uses wireless sensor networks. Moreover with WSN we can monitor environments and its conditions also. We are designing a protocol to monitor the environmental temperature and humidity at different conditions. The architecture is simple to construct and ease to implement and also has an advantage of low power consumption. The aim of our paper to describe and show how to create a simple protocol for environment monitoring using a wireless development kit. we are using advanced technology of crossbow motes and NESC Language Programming. Keywords: Motes, WSN, sensor, TinyOS, Nesc.
Bluetooth and Wi-Fi are both wireless technologies that allow devices to connect, but they have some important differences. Bluetooth is designed for short-range point-to-point connections between devices like wireless headphones or speakers. Wi-Fi has a longer range and is more suited for internet access through wireless routers. While Bluetooth prioritizes low power use, Wi-Fi provides faster speeds for streaming or downloading large files. Security is also handled differently, with Bluetooth using encryption for paired devices and Wi-Fi employing passwords for network access.
Design and implement a smart system to detect intruders and firing using IoT IJECEIAES
The security system is essential for occupants' convenience and protection from intruders and fire. Theft and fire are the most important requirement for the security system. The advancement of wireless sensor networks using IoTs increased the features in a security system and play an important role in daily life. In this paper, the proposed system is divided into two units. The first one about security which use to take snapshots by a camera whenever there is fire or intruders in the security zone and mail it to the owner every three seconds by using Arduino configured with MATLAB program. MATLAB program plays the main role to coordinate between sensors and to turn on/off the cameras. The second unit is about controlling the appliances and also the main door by using AVR microcontroller configured by CVAVR software that connected with Bluetooth sensor and controlled by a smartphone by using the implementation software built-up in the smartphone. To arrival of the control unit, the user should send code from the software implementation to the framework that use to turn on/off the devices or open/close the door. This proposed system is designed and implemented in details in this paper.
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET Journal
This document summarizes a survey on cardless automated teller machines (ATMs). It discusses using fingerprint authentication and one-time passwords (OTPs) sent via global system for mobile communications (GSM) to allow customers to withdraw cash from an ATM without a debit card. The proposed system uses a fingerprint module and microcontroller to authenticate users via their fingerprint. An OTP is then sent to the user's mobile phone for an additional layer of security. If the fingerprint and OTP match, the user's bank account will open on the ATM machine and allow cash withdrawals. The document compares this approach to existing card-based ATM security and pin-based authentication methods.
Intellectual Bank Locker Security SystemIJERA Editor
In today's modern world, security plays an important role. Every person has precious accessories like gold,
documents or cash. The main goal of this project is to design and implement a bank locker security system
based on fingerprint and GSM technology. It reduces wastage of time for both banker as well as customer and
provides advanced security. In this system, only authentic persons can recover money or accessories from bank
locker. In this system the user’s name, fingerprint and mobile number are enrolled. If the fingerprint matches,
then four digit code will be sent to the authorized person’s mobile through GSM modem and the locker door
will be opened then, otherwise it will be in locked position and gives an alarm when any mismatch occurs. The
sensors will be active during night times to provide security against thefts.
Intellectual Bank Locker Security SystemIJERA Editor
In today's modern world, security plays an important role. Every person has precious accessories like gold,
documents or cash. The main goal of this project is to design and implement a bank locker security system
based on fingerprint and GSM technology. It reduces wastage of time for both banker as well as customer and
provides advanced security. In this system, only authentic persons can recover money or accessories from bank
locker. In this system the user’s name, fingerprint and mobile number are enrolled. If the fingerprint matches,
then four digit code will be sent to the authorized person’s mobile through GSM modem and the locker door
will be opened then, otherwise it will be in locked position and gives an alarm when any mismatch occurs. The
sensors will be active during night times to provide security against thefts.
IRJET - Automatic Toll E-Tickting System for Transportation and Finding o...IRJET Journal
This document describes an automatic toll collection and stolen vehicle detection system using RFID and wireless communication technologies. The system uses RFID modules to automatically collect tolls from moving vehicles by deducting payment from the owner's bank account. It can also detect and locate stolen vehicles by sending SMS alerts and notifications to the vehicle owner and police with the vehicle's location coordinates. The system aims to make toll collection more efficient by eliminating waiting times and reducing manpower needs. It also allows for quicker recovery of stolen vehicles.
Third Generation Automatic Teller Machineijsrd.com
This document proposes a new third generation automatic teller machine (ATM) model that allows users to withdraw money without an ATM card. The system uses the subscriber identity module (SIM) card in a mobile phone to identify the user. When the SIM is inserted into the ATM reader, it connects to a server that contains the user's account details and photo. The ATM camera captures the user's image which is sent to the server for matching. If the images match, the user enters their PIN and the transaction proceeds. Otherwise, an alarm is triggered. This eliminates the need for physical ATM cards.
Office Automation & Attendance System using IoTIRJET Journal
This document describes an office automation and attendance system using Internet of Things (IoT) technology. The system allows users to remotely control and monitor office appliances like lights and fans using a mobile app. It also implements an RFID-based employee attendance tracking system where employees scan RFID cards to record entry and exit times. The data is sent to a cloud database using an ESP8266 WiFi module. The system aims to automate office tasks and provide remote monitoring capabilities using low-cost IoT components like NodeMCU microcontrollers.
Office Automation & Attendance System using IoTIRJET Journal
This document describes an office automation and attendance tracking system using Internet of Things (IoT) technology. The system allows remote control of office appliances like lights and fans using a mobile app. It also uses RFID cards and readers to track employee attendance by time of entry and exit. The RFID data is sent to a cloud database using an ESP8266 WiFi module. This provides a contactless, secure way to track attendance. The system aims to automate office tasks and make appliance control and attendance tracking more efficient using IoT connectivity.
Modern computer network technologies discussed in the document include Internet of Things, Artificial Intelligence, 5G, Edge Computing, Software Defined Networking, Multi Cloud Technology, Quantum Computing, Digital Twin, Nano Network Technology, and Machine Learning. The Internet of Things describes all things connected to the Internet like sensors and smart devices. Artificial Intelligence aims to give human intelligence to machines through technologies like narrow AI and general AI. 5G promises high speeds, reliability and low latency to impact sectors like healthcare. Edge Computing reduces latency and bandwidth by bringing computing closer to data sources. Software Defined Networking abstracts network layers to make networks more agile. Multi Cloud Technology uses multiple public cloud providers for workloads. Quantum Computing performs calculations
To protect user’s password from theft by using rfid and mems technologyeSAT Journals
Abstract In this paper, MEMS (Micro Electro Mechanical System) is implemented using Embedded controller PIC 16F877A. MEMS can be used to sense motion. Microcontroller detect any motion while they are occurs or not. The user can assign a password by fixed set of motions as decided by them. In that there are three techniques uses for user’s authentication. Firstly Microcontroller senses any motion which is matches with exist motion password, then first phase will unlock and it goes into next phase is human interface method of keypad that is traditional where the user enters the predefined password, if it is matched with the predefined password then second phase will be unlock. Then user will directly enter into the final phase which is a RFID card that is read by a RFID reader module connected to the Micro controller if the card is matched the final phase get completed and the desired operation will start. A buzzer is used for an indication of wrong password. This buzzer is ON until right password matches with existing password. Key Words: -Codebooks, Key Logger, PIC Microcontroller, Secret Little Functions, RFID, MEMS.
This document describes a proposed smart locker system for home keys using Internet of Things technologies. The system uses a GSM module, LCD display, proximity sensor, relay, and Arduino microcontroller. The GSM module allows two family members to control opening and closing of the locker via SMS. When keys are placed in or removed from the locker, an SMS notification is sent. If someone tries to break into the system, an alert SMS is sent to family members and security. The system aims to provide safety for keys without needing to carry them, and allows access even when owners are not home by verifying users through SMS. The components work together to securely operate the locker through remote control and notifications.
This document summarizes a study on existing wireless sensor networks that can be used for structural health monitoring. It discusses three main wireless sensor network platforms: Sensor Andrew Architecture, a structural health monitoring system using smart sensors, and Snowfort, a new wireless sensor network platform designed for infrastructure monitoring. The document outlines the key components, advantages, and limitations of each wireless sensor network platform for structural health monitoring applications.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
Similar to A Modern Technique for Unauthorized Human Detection and Intimation (20)
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
The manufacturing industries all over the world are facing tough challenges for growth, development and sustainability in today’s competitive environment. They have to achieve apex position by adapting with the global competitive environment by delivering goods and services at low cost, prime quality and better price to increase wealth and consumer satisfaction. Cost Management ensures profit, growth and sustainability of the business with implementation of Continuous Improvement Technique like Six Sigma. This leads to optimize Business performance. The method drives for customer satisfaction, low variation, reduction in waste and cycle time resulting into a competitive advantage over other industries which did not implement it. The main objective of this paper ‘Six Sigma Technique A Journey Through Its Implementation’ is to conceptualize the effectiveness of Six Sigma Technique through the journey of its implementation. Aditi Sunilkumar Ghosalkar "‘Six Sigma Technique’: A Journey Through its Implementation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64546.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64546/‘six-sigma-technique’-a-journey-through-its-implementation/aditi-sunilkumar-ghosalkar
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
Edge computing, a paradigm that involves processing data closer to its source, has gained significant attention for its potential to revolutionize data processing and communication in space missions. With the increasing complexity and data volume generated by modern space missions, traditional centralized computing approaches face challenges related to latency, bandwidth, and security. Edge computing in space, involving on board processing and analysis of data, offers promising solutions to these challenges. This paper explores the concept of edge computing in space, its benefits, applications, and future prospects in enhancing space missions. Manish Verma "Edge Computing in Space: Enhancing Data Processing and Communication for Space Missions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64541.pdf Paper Url: https://www.ijtsrd.com/computer-science/artificial-intelligence/64541/edge-computing-in-space-enhancing-data-processing-and-communication-for-space-missions/manish-verma
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
Communal politics in India has evolved through centuries, weaving a complex tapestry shaped by historical legacies, colonial influences, and contemporary socio political transformations. This research comprehensively examines the dynamics of communal politics in 21st century India, emphasizing its historical roots, socio political dynamics, economic implications, challenges, and prospects for mitigation. The historical perspective unravels the intricate interplay of religious identities and power dynamics from ancient civilizations to the impact of colonial rule, providing insights into the evolution of communalism. The socio political dynamics section delves into the contemporary manifestations, exploring the roles of identity politics, socio economic disparities, and globalization. The economic implications section highlights how communal politics intersects with economic issues, perpetuating disparities and influencing resource allocation. Challenges posed by communal politics are scrutinized, revealing multifaceted issues ranging from social fragmentation to threats against democratic values. The prospects for mitigation present a multifaceted approach, incorporating policy interventions, community engagement, and educational initiatives. The paper conducts a comparative analysis with international examples, identifying common patterns such as identity politics and economic disparities. It also examines unique challenges, emphasizing Indias diverse religious landscape, historical legacy, and secular framework. Lessons for effective strategies are drawn from international experiences, offering insights into inclusive policies, interfaith dialogue, media regulation, and global cooperation. By scrutinizing historical epochs, contemporary dynamics, economic implications, and international comparisons, this research provides a comprehensive understanding of communal politics in India. The proposed strategies for mitigation underscore the importance of a holistic approach to foster social harmony, inclusivity, and democratic values. Rose Hossain "Dynamics of Communal Politics in 21st Century India: Challenges and Prospects" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64528.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/history/64528/dynamics-of-communal-politics-in-21st-century-india-challenges-and-prospects/rose-hossain
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
Background and Objective Telehealth has become a well known tool for the delivery of health care in Saudi Arabia, and the perspective and knowledge of healthcare providers are influential in the implementation, adoption and advancement of the method. This systematic review was conducted to examine the current literature base regarding telehealth and the related healthcare professional perspective and knowledge in the Kingdom of Saudi Arabia. Materials and Methods This systematic review was conducted by searching 7 databases including, MEDLINE, CINHAL, Web of Science, Scopus, PubMed, PsycINFO, and ProQuest Central. Studies on healthcare practitioners telehealth knowledge and perspectives published in English in Saudi Arabia from 2000 to 2023 were included. Boland directed this comprehensive review. The researchers examined each connected study using the AXIS tool, which evaluates cross sectional systematic reviews. Narrative synthesis was used to summarise and convey the data. Results Out of 1840 search results, 10 studies were included. Positive outlook and limited knowledge among providers were seen across trials. Healthcare professionals like telehealth for its ability to improve quality, access, and delivery, save time and money, and be successful. Age, gender, occupation, and work experience also affect health workers knowledge. In Saudi Arabia, healthcare professionals face inadequate expert assistance, patient privacy, internet connection concerns, lack of training courses, lack of telehealth understanding, and high costs while performing telemedicine. Conclusions Healthcare practitioners telehealth perceptions and knowledge were examined in this systematic study. Its collection of concerned experts different personal attitudes and expertise would help enhance telehealths implementation in Saudi Arabia, develop its healthcare delivery alternative, and eliminate frequent problems. Badriah Mousa I Mulayhi | Dr. Jomin George | Judy Jenkins "Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in Saudi Arabia: A Systematic Review" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64535.pdf Paper Url: https://www.ijtsrd.com/medicine/other/64535/assess-perspective-and-knowledge-of-healthcare-providers-towards-elehealth-in-saudi-arabia-a-systematic-review/badriah-mousa-i-mulayhi
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
The impact of digital media on the distribution of power and the weakening of traditional gatekeepers has gained considerable attention in recent years. The adoption of digital technologies and the internet has resulted in declining influence and power for traditional gatekeepers such as publishing houses and news organizations. Simultaneously, digital media has facilitated the emergence of new voices and players in the media industry. Digital medias impact on power decentralization and gatekeeper erosion is visible in several ways. One significant aspect is the democratization of information, which enables anyone with an internet connection to publish and share content globally, leading to citizen journalism and bypassing traditional gatekeepers. Another aspect is the disruption of conventional media industry business models, as traditional organizations struggle to adjust to the decrease in advertising revenue and the rise of digital platforms. Alternative business models, such as subscription models and crowdfunding, have become more prevalent, leading to the emergence of new players. Overall, the impact of digital media on the distribution of power and the weakening of traditional gatekeepers has brought about significant changes in the media landscape and the way information is shared. Further research is required to fully comprehend the implications of these changes and their impact on society. Dr. Kusum Lata "The Impact of Digital Media on the Decentralization of Power and the Erosion of Traditional Gatekeepers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64544.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/political-science/64544/the-impact-of-digital-media-on-the-decentralization-of-power-and-the-erosion-of-traditional-gatekeepers/dr-kusum-lata
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
This research investigates the nexus between online discussions on Dr. B.R. Ambedkars ideals and their impact on social inclusion among college students in Gurugram, Haryana. Surveying 240 students from 12 government colleges, findings indicate that 65 actively engage in online discussions, with 80 demonstrating moderate to high awareness of Ambedkars ideals. Statistically significant correlations reveal that higher online engagement correlates with increased awareness p 0.05 and perceived social inclusion. Variations across colleges and a notable effect of college type on perceived social inclusion highlight the influence of contextual factors. Furthermore, the intersectional analysis underscores nuanced differences based on gender, caste, and socio economic status. Dr. Kusum Lata "Online Voices, Offline Impact: Ambedkar's Ideals and Socio-Political Inclusion - A Study of Gurugram District" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64543.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/political-science/64543/online-voices-offline-impact-ambedkars-ideals-and-sociopolitical-inclusion--a-study-of-gurugram-district/dr-kusum-lata
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
Noting calls for contextualizing Agro entrepreneurs problems and challenges of the agro entrepreneurs and for greater attention to the Role of entrepreneurs in agro entrepreneurship research, we conduct a systematic literature review of extent research in agriculture entrepreneurship to overcome the study objectives of complications of agro entrepreneurs through various factors, Development of agriculture products is a key factor for the overall economic growth of agro entrepreneurs Agro Entrepreneurs produces firsthand large scale employment, utilizes the labor and natural resources, This research outlines the problems of Weather and Soil Erosions, Market price fluctuation, stimulates labor cost problems, reduces concentration of Price volatility, Dependency on Intermediaries, induces Limited Bargaining Power, and Storage and Transportation Costs. This paper mainly devoted to highlight Problems and challenges faced for the sustainable of Agro Entrepreneurs in India. Vinay Prasad B "Problems and Challenges of Agro Entreprenurship - A Study" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64540.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64540/problems-and-challenges-of-agro-entreprenurship--a-study/vinay-prasad-b
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
Disclosure is a process through which a business enterprise communicates with external parties. A corporate disclosure is communication of financial and non financial information of the activities of a business enterprise to the interested entities. Corporate disclosure is done through publishing annual reports. So corporate disclosure through annual reports plays a vital role in the life of all the companies and provides valuable information to investors. The basic objectives of corporate disclosure is to give a true and fair view of companies to the parties related either directly or indirectly like owner, government, creditors, shareholders etc. in the companies act, provisions have been made about mandatory and voluntary disclosure. The IT sector in India is rapidly growing, the trend to invest in the IT sector is rising and employment opportunities in IT sectors are also increasing. Therefore the IT sector is expected to have fair, full and adequate disclosure of all information. Unfair and incomplete disclosure may adversely affect the entire economy. A research study on disclosure practices of IT companies could play an important role in this regard. Hence, the present research study has been done to study and review comparative analysis of total corporate disclosure of selected IT companies of India and to put forward overall findings and suggestions with a view to increase disclosure score of these companies. The researcher hopes that the present research study will be helpful to all selected Companies for improving level of corporate disclosure through annual reports as well as the government, creditors, investors, all business organizations and upcoming researcher for comparative analyses of level of corporate disclosure with special reference to selected IT companies. Dr. Vaibhavi D. Thaker "Comparative Analysis of Total Corporate Disclosure of Selected IT Companies of India" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64539.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64539/comparative-analysis-of-total-corporate-disclosure-of-selected-it-companies-of-india/dr-vaibhavi-d-thaker
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
This study investigated the impact of educational background and professional training on human rights awareness among secondary school teachers in the Marathwada region of Maharashtra, India. The key findings reveal that higher levels of education, particularly a master’s degree, and fields of study related to education, humanities, or social sciences are associated with greater human rights awareness among teachers. Additionally, both pre service teacher training and in service professional development programs focused on human rights education significantly enhance teacher’s knowledge, skills, and competencies in promoting human rights principles in their classrooms. Baig Ameer Bee Mirza Abdul Aziz | Dr. Syed Azaz Ali Amjad Ali "The Impact of Educational Background and Professional Training on Human Rights Awareness among Secondary School Teachers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64529.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/64529/the-impact-of-educational-background-and-professional-training-on-human-rights-awareness-among-secondary-school-teachers/baig-ameer-bee-mirza-abdul-aziz
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
“One Language sets you in a corridor for life. Two languages open every door along the way” Frank Smith English as a foreign language or as a second language has been ruling in India since the period of Lord Macaulay. But the question is how much we teach or learn English properly in our culture. Is there any scope to use English as a language rather than a subject How much we learn or teach English without any interference of mother language specially in the classroom teaching learning scenario in West Bengal By considering all these issues the researcher has attempted in this article to focus on the effective teaching learning process comparing to other traditional strategies in the field of English curriculum at the secondary level to investigate whether they fulfill the present teaching learning requirements or not by examining the validity of the present curriculum of English. The purpose of this study is to focus on the effectiveness of the systematic, scientific, sequential and logical transaction of the course between the teachers and the learners in the perspective of the 5Es programme that is engage, explore, explain, extend and evaluate. Sanchali Mondal | Santinath Sarkar "A Study on the Effective Teaching Learning Process in English Curriculum at the Secondary Level of West Bengal" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd62412.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/62412/a-study-on-the-effective-teaching-learning-process-in-english-curriculum-at-the-secondary-level-of-west-bengal/sanchali-mondal
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
This paper reports on a study which was conducted to investigate the role of mentoring and its influence on the effectiveness of the teaching of Physics in secondary schools in the South West Region of Cameroon. The study adopted the convergent parallel mixed methods design, focusing on respondents in secondary schools in the South West Region of Cameroon. Both quantitative and qualitative data were collected, analysed separately, and the results were compared to see if the findings confirm or disconfirm each other. The quantitative analysis found that majority of the respondents 72 of Physics teachers affirmed that they had more experienced colleagues as mentors to help build their confidence, improve their teaching, and help them improve their effectiveness and efficiency in guiding learners’ achievements. Only 28 of the respondents disagreed with these statements. With majority respondents 72 agreeing with the statements, it implies that in most secondary schools, experienced Physics teachers act as mentors to build teachers’ confidence in teaching and improving students’ learning. The interview qualitative data analysis summarized how secondary school Principals use meetings with mentors and mentees to promote mentorship in the school milieu. This has helped strengthen teachers’ classroom practices in secondary schools in the South West Region of Cameroon. With the results confirming each other, the study recommends that mentoring should focus on helping teachers employ social interactions and instructional practices feedback and clarity in teaching that have direct measurable impact on students’ learning achievements. Andrew Ngeim Sumba | Frederick Ebot Ashu | Peter Agborbechem Tambi "The Role of Mentoring and Its Influence on the Effectiveness of the Teaching of Physics in Secondary Schools in the South West Region of Cameroon" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64524.pdf Paper Url: https://www.ijtsrd.com/management/management-development/64524/the-role-of-mentoring-and-its-influence-on-the-effectiveness-of-the-teaching-of-physics-in-secondary-schools-in-the-south-west-region-of-cameroon/andrew-ngeim-sumba
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
This study primarily focuses on the design of a high side buck converter using an Arduino microcontroller. The converter is specifically intended for use in DC DC applications, particularly in standalone solar PV systems where the PV output voltage exceeds the load or battery voltage. To evaluate the performance of the converter, simulation experiments are conducted using Proteus Software. These simulations provide insights into the input and output voltages, currents, powers, and efficiency under different state of charge SoC conditions of a 12V,70Ah rechargeable lead acid battery. Additionally, the hardware design of the converter is implemented, and practical data is collected through operation, monitoring, and recording. By comparing the simulation results with the practical results, the efficiency and performance of the designed converter are assessed. The findings indicate that while the buck converter is suitable for practical use in standalone PV systems, its efficiency is compromised due to a lower output current. Chan Myae Aung | Dr. Ei Mon "Design Simulation and Hardware Construction of an Arduino-Microcontroller Based DC-DC High-Side Buck Converter for Standalone PV System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64518.pdf Paper Url: https://www.ijtsrd.com/engineering/mechanical-engineering/64518/design-simulation-and-hardware-construction-of-an-arduinomicrocontroller-based-dcdc-highside-buck-converter-for-standalone-pv-system/chan-myae-aung
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
Energy becomes sustainable if it meets the needs of the present without compromising the ability of future generations to meet their own needs. Some of the definitions of sustainable energy include the considerations of environmental aspects such as greenhouse gas emissions, social, and economic aspects such as energy poverty. Generally far more sustainable than fossil fuel are renewable energy sources such as wind, hydroelectric power, solar, and geothermal energy sources. Worthy of note is that some renewable energy projects, like the clearing of forests to produce biofuels, can cause severe environmental damage. The sustainability of nuclear power which is a low carbon source is highly debated because of concerns about radioactive waste, nuclear proliferation, and accidents. The switching from coal to natural gas has environmental benefits, including a lower climate impact, but could lead to delay in switching to more sustainable options. “Carbon capture and storage” can be built into power plants to remove the carbon dioxide CO2 emissions, but this technology is expensive and has rarely been implemented. Leading non renewable energy sources around the world is fossil fuels, coal, petroleum, and natural gas. Nuclear energy is usually considered another non renewable energy source, although nuclear energy itself is a renewable energy source, but the material used in nuclear power plants is not. The paper addresses the issue of sustainable energy, its attendant benefits to the future generation, and humanity in general. Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku "Sustainable Energy" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64534.pdf Paper Url: https://www.ijtsrd.com/engineering/electrical-engineering/64534/sustainable-energy/paul-a-adekunte
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
This paper aims to outline the executive regulations, survey standards, and specifications required for the implementation of the Sudan Survey Act, and for regulating and organizing all surveying work activities in Sudan. The act has been discussed for more than 5 years. The Land Survey Act was initiated by the Sudan Survey Authority and all official legislations were headed by the Sudan Ministry of Justice till it was issued in 2022. The paper presents conceptual guidelines to be used for the Survey Act implementation and to regulate the survey work practice, standardizing the field surveys, processing, quality control, procedures, and the processes related to survey work carried out by the stakeholders and relevant authorities in Sudan. The conceptual guidelines are meant to improve the quality and harmonization of geospatial data and to aid decision making processes as well as geospatial information systems. The established comprehensive executive regulations will govern and regulate the implementation of the Sudan Survey Geomatics Act in all surveying and mapping practices undertaken by the Sudan Survey Authority SSA and state local survey departments for public or private sector organizations. The targeted standards and specifications include the reference frame, projection, coordinate systems, and the guidelines and specifications that must be followed in the field of survey work, processes, and mapping products. In the last few decades, there has been a growing awareness of the importance of geomatics activities and measurements on the Earths surface in space and time, together with observing and mapping the changes. In such cases, data must be captured promptly, standardized, and obtained with more accuracy and specified in much detail. The paper will also highlight the current situation in Sudan, the degree to which survey standards are used, the problems encountered, and the errors that arise from not using the standards and survey specifications. Kamal A. A. Sami "Concepts for Sudan Survey Act Implementations - Executive Regulations and Standards" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63484.pdf Paper Url: https://www.ijtsrd.com/engineering/civil-engineering/63484/concepts-for-sudan-survey-act-implementations--executive-regulations-and-standards/kamal-a-a-sami
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
The discussions between ellipsoid and geoid have invoked many researchers during the recent decades, especially during the GNSS technology era, which had witnessed a great deal of development but still geoid undulation requires more investigations. To figure out a solution for Sudans local geoid, this research has tried to intake the possibility of determining the geoid model by following two approaches, gravimetric and geometrical geoid model determination, by making use of GNSS leveling benchmarks at Khartoum state. The Benchmarks are well distributed in the study area, in which, the horizontal coordinates and the height above the ellipsoid have been observed by GNSS while orthometric heights were carried out using precise leveling. The Global Geopotential Model GGM represented in EGM2008 has been exploited to figure out the geoid undulation at the benchmarks in the study area. This is followed by a fitting process, that has been done to suit the geoid undulation data which has been computed using GNSS leveling data and geoid undulation inspired by the EGM2008. Two geoid surfaces were created after the fitting process to ensure that they are identical and both of them could be counted for getting the same geoid undulation with an acceptable accuracy. In this respect, statistical operation played an important role in ensuring the consistency and integrity of the model by applying cross validation techniques splitting the data into training and testing datasets for building the geoid model and testing its eligibility. The geometrical solution for geoid undulation computation has been utilized by applying straightforward equations that facilitate the calculation of the geoid undulation directly through applying statistical techniques for the GNSS leveling data of the study area to get the common equation parameters values that could be utilized to calculate geoid undulation of any position in the study area within the claimed accuracy. Both systems were checked and proved eligible to be used within the study area with acceptable accuracy which may contribute to solving the geoid undulation problem in the Khartoum area, and be further generalized to determine the geoid model over the entire country, and this could be considered in the future, for regional and continental geoid model. Ahmed M. A. Mohammed. | Kamal A. A. Sami "Towards the Implementation of the Sudan Interpolated Geoid Model (Khartoum State Case Study)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63483.pdf Paper Url: https://www.ijtsrd.com/engineering/civil-engineering/63483/towards-the-implementation-of-the-sudan-interpolated-geoid-model-khartoum-state-case-study/ahmed-m-a-mohammed
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
Sudan is witnessing an acceleration in the processes of development and transformation in the performance of government institutions to raise the productivity and investment efficiency of the government sector. The development plans and investment opportunities have focused on achieving national goals in various sectors. This paper aims to illuminate the path to the future and provide geospatial data and information to develop the investment climate and environment for all sized businesses, and to bridge the development gap between the Sudan states. The Sudan Survey Authority SSA is the main advisor to the Sudan Government in conducting surveying, mappings, designing, and developing systems related to geospatial data and information. In recent years, SSA made a strategic partnership with the Ministry of Investment to activate Geospatial Information for Sudans Sustainable Investment and in particular, for the preparation and implementation of the Sudan investment map, based on the directives and objectives of the Ministry of Investment MI in Sudan. This paper comes within the framework of activating the efforts of the Ministry of Investment to develop technical investment services by applying techniques adopted by the Ministry and its strategic partners for advancing investment processes in the country. Kamal A. A. Sami "Activating Geospatial Information for Sudan's Sustainable Investment Map" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63482.pdf Paper Url: https://www.ijtsrd.com/engineering/information-technology/63482/activating-geospatial-information-for-sudans-sustainable-investment-map/kamal-a-a-sami
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
In a rapidly changing global landscape, the importance of education as a unifying force cannot be overstated. This paper explores the crucial role of educational unity in fostering a stronger and more inclusive society through the embrace of diversity. By examining the benefits of diverse learning environments, the paper aims to highlight the positive impact on societal strength. The discussion encompasses various dimensions, from curriculum design to classroom dynamics, and emphasizes the need for educational institutions to become catalysts for unity in diversity. It highlights the need for a paradigm shift in educational policies, curricula, and pedagogical approaches to ensure that they are reflective of the diverse fabric of society. This paper also addresses the challenges associated with implementing inclusive educational practices and offers practical strategies for overcoming barriers. It advocates for collaborative efforts between educational institutions, policymakers, and communities to create a supportive ecosystem that promotes diversity and unity. Mr. Amit Adhikari | Madhumita Teli | Gopal Adhikari "Educational Unity: Embracing Diversity for a Stronger Society" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64525.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/64525/educational-unity-embracing-diversity-for-a-stronger-society/mr-amit-adhikari
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
The diversity of indigenous knowledge systems in India is vast and can vary significantly between different communities and regions. Preserving and respecting these knowledge systems is crucial for maintaining cultural heritage, promoting sustainable practices, and fostering cross cultural understanding. In this paper, an overview of the prospects and challenges associated with incorporating Indian indigenous knowledge into management is explored. It is found that IIKS helps in management in many areas like sustainable development, tourism, food security, natural resource management, cultural preservation and innovation, etc. However, IIKS integration with management faces some challenges in the form of a lack of documentation, cultural sensitivity, language barriers legal framework, etc. Savita Lathwal "Integration of Indian Indigenous Knowledge System in Management: Prospects and Challenges" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63500.pdf Paper Url: https://www.ijtsrd.com/management/accounting-and-finance/63500/integration-of-indian-indigenous-knowledge-system-in-management-prospects-and-challenges/savita-lathwal
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
The COVID 19 pandemic has highlighted the crucial need of preventive measures, with widespread use of face masks being a key method for slowing the viruss spread. This research investigates face mask identification using deep learning as a technological solution to be reducing the risk of coronavirus transmission. The proposed method uses state of the art convolutional neural networks CNNs and transfer learning to automatically recognize persons who are not wearing masks in a variety of circumstances. We discuss how this strategy improves public health and safety by providing an efficient manner of enforcing mask wearing standards. The report also discusses the obstacles, ethical concerns, and prospective applications of face mask detection systems in the ongoing fight against the pandemic. Dilip Kumar Sharma | Aaditya Yadav "DeepMask: Transforming Face Mask Identification for Better Pandemic Control in the COVID-19 Era" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64522.pdf Paper Url: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/64522/deepmask-transforming-face-mask-identification-for-better-pandemic-control-in-the-covid19-era/dilip-kumar-sharma
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
Efficient and accurate data collection is paramount in clinical trials, and the design of Electronic Case Report Forms eCRFs plays a pivotal role in streamlining this process. This paper explores the integration of machine learning techniques in the design and implementation of eCRFs to enhance data collection efficiency. We delve into the synergies between eCRF design principles and machine learning algorithms, aiming to optimize data quality, reduce errors, and expedite the overall data collection process. The application of machine learning in eCRF design brings forth innovative approaches to data validation, anomaly detection, and real time adaptability. This paper discusses the benefits, challenges, and future prospects of leveraging machine learning in eCRF design for streamlined and advanced data collection in clinical trials. Dhanalakshmi D | Vijaya Lakshmi Kannareddy "Streamlining Data Collection: eCRF Design and Machine Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63515.pdf Paper Url: https://www.ijtsrd.com/biological-science/biotechnology/63515/streamlining-data-collection-ecrf-design-and-machine-learning/dhanalakshmi-d
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID - IJTSRD21659 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 171
are also multiple architectures A microcontroller is an
integrated chip that is often part of an embedded system.
The microcontroller includes a CPU, RAM, ROM, I/O ports,
and timers like a standard computer, but because they are
designed to execute only a single specific task to control a
single system, they are much smaller and simplified so that
they can include used, but the predominant architecture is
CISC (Complex Instruction Set Computer), which allows the
microcontroller to contain multiple controlinstructionsthat
can be executed with a single macro instruction. Some use a
RISC (Reduced Instruction Set Computer) architecture,
which implements fewer instructions, but delivers greater
simplicity and lower power consumption.
1.2. GSM MODEM
A GSM modem is a wireless modem that works with a GSM
wireless network. A wireless modem behaves like a dial-up
modem. The main difference between them is that a dial-up
modem sends and receives data through a fixed telephone
line while a wireless modem sends and receives data
through radio waves. The working of GSM modem is based
on commands, the commands always start with AT (which
means ATention) and finish with a <CR> character. For
example, the dialing command is ATD<number>;
ATD3314629080; here the dialing command ends with
semicolon.
The AT commands are given to the GSM modem with the
help of PC or controller. The GSM modem is serially
interfaced with the controller with the help of MAX 232.
Here max 232 acts as driver which convertsTTL levelstothe
RS 232 levels. For serial interface GSM modem requires the
signal based on RS 232 levels. The T1_OUT and R1_IN pin of
MAX 232 is connected to the TX and RX pin of GSM modem.
1.3. MATLAB
MATLAB® is a high-performance language for technical
computing. It integrates computation, visualization, and
programming in an easy-to-use environment where
problems and solutions are expressed in familiar
mathematical notation.MATLAB is an interactive system
whose basic data element is an array that does not require
dimensioning. This allows you to solve many technical
computing problems, especiallythosewithmatrixand vector
formulations, in a fraction of the time it would taketowritea
program in a scalar noninteractive language such as C or
FORTRAN.MATLAB features a family of application-specific
solutions called toolboxes. Very important to most users of
MATLAB, toolboxes allow you to learn and apply specialized
technology. Toolboxes are comprehensive collections of
MATLAB functions (M-files) that extend the MATLAB
environment to solve particular classes of problems.
1.4. ALGORITHM
Local Binary Pattern (LBP) is a simple yet very efficient
texture operator which labels the pixels of an image by
thresholding the neighborhood of each pixel and considers
the result as a binary number.It was first described in 1994
(LBP) and has since been found to be a powerful feature for
texture classification as shown in Fig 1.4. It has further been
determined that when LBP is combined with histograms of
oriented gradients (HOG) descriptor, it improves the
detection performance considerably on some datasets.The
four parameters used are listed below
Radius: the radius is used to build the circular local
binary pattern and represents the radius around the
central pixel. It is usually set to 1.
Neighbors: the number of sample points to build the
circular local binary pattern. Keep in mind: the more
sample points you include, the higher the computational
cost. It is usually set to 8.
Grid X: the number of cells in the horizontal direction.
The more cells, the finer the grid, the higher the
dimensionality of the resulting feature vector. It is
usually set to 8.
Grid Y: the number of cells in the vertical direction. The
more cells, the finer the grid, the higher the
dimensionality of the resulting feature vector. It is
usually set to 8.
The algorithm is trained by using a dataset with the facial
images of the people wanted to be recognized.An ID (it may
be a number or the name of the person) is set for each image,
so the algorithm will use this information to recognize an
input image and give you an output. Images of the same
person must have the same ID.
The first computational step of the LBPH is to create an
intermediate image that describes the original image in a
better way, by highlightingthe facialcharacteristics.Todoso,
the algorithm uses a concept of a sliding window, based on
the parameters radius and neighbors. Each histogram
created is used to represent each image from the training
dataset. So, given an inputimage, we perform the steps again
for thisnewimage and creates a histogram which represents
the image as shown in Fig 1.4.1. So to find the image that
matches the input image we just need to compare two
histograms and return the image with the closest histogram.
Fig1.4.1 Flowchart
2. RELATED WORK
IIhan Aydin and Nashwan Adnan Othman developed a
security system that enables a camera to detect faces,
capture it and sends the images to Smartphone via
telegram application. Whenever a movement is detected,
the camera is used to capture the face of the person. The
captured face will be forwarded to the user’s mobile
phone via an application. Limitation of this system is
3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID - IJTSRD21659 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 172
there is no face recognition. The camera captures
everything when it detects a movement.
Dwi Ana Ratna Vati and Dika Abadianto designed a Smart
home security application where the face detection is
based on Template matching and face recognition is based
on the Principle Component Analysis. Template matching
is a technique in digital image processing for finding small
parts of an image which match a template image. It can be
used in manufacturing as a part of quality control, a way to
navigate a mobile robot, or as a way to detect edges in
images. Limitations of this design are that the face
recognition has only 80% Accuracy only.
Teddy Surya Gunawan, F.D.A Rahman, Mira Kartiwa and
M.H.H Gani developed a smart home system where Eigen
face is used for Feature Extraction and Principle
Component Analysis was used as a Classifier. Theoutputof
face recognition algorithm is then connected to the relay
circuit, in which it will lock or unlock the magnetic lock
placed at the door. Limitations include recognition
accuracy being 90% and it also does not send any
notification. Only the door can be Locked and Unlocked.
Sandesh Kulkarni, Minakshee Bagul, Akansha Dukare,
Archana Gaikwad developed a Security system where the
face detection is done with Voila jones face detector and
LWF for face recognition. The Viola-Jones algorithm is a
widely used mechanism for object detection. The main
property of this algorithm is that training is slow, but
detection is fast. This algorithm uses Haar basis feature
filters, so it does not use multiplications. The system
authenticates the face and unlocks the door if the face is
an authorized one else the door remains firmly locked.
Limitations are that there is no real time update for the
user.
Sudeep Tanwar and Sudhanshu Tyagi developed a smart
home system that uses Fire and Gas sensors. A buzzer is
activated when a fire breaks out or the exhaust fan is
turned on if there is gas leakage. There are a number of
sensors used that helps in detecting fire and gas leaks.
After the sensor figures there is Limitation of this system
is it uses cheap sensors for detecting a fire and gas there
is no proper real time update to the authorized user.
Ayman Ben Thabet and Nidhal Ben Amor Developed a
home security system where Raspberry pi is used along
with OpenCV library includes PCA algorithm for face
recognition. If a person is not a authorized one, then the
Alarm bell starts to ring. Initially, the person’s face will be
captured manually and fed as input to the OpenCV. PCA
algorithm is used for recognizing the image and if the
images don’t match, then an alert is made to the
authorized user. Limitations of this system are the alarm
keeps ringing causing nuisance and disturbance to the
neighboring houses.
Nashwan Adnan Othman and llhan Aydin developed a real
time recognition system where PIR sensor is used for
detection with a camera capturing the image and
Raspberry pi sends an email containing the image. The
PIR sensor is used for detecting an intruder. Whenever
there is motion the PIR sensor triggers the camera. The
camera captures the intruder’s face and it will be sent as a
mail to the authorized used using raspberry pi.
Limitations involve there is no face identification process.
Captured image will be simply notified to the user.
3. PROPOSED MODEL
The system generally detects for human presenceinan area.
Based on the presence of human, then the image is captured
and an alert is provided. This causes a drawback when a
recognized person enters an area. This causes an alert. And
also buzzer is intimated only for people present in the
surrounding. This causes major drawback.
Figure 3.1 shows the architecture of the proposed
system.The system trains a set of person’s images who are
allowed to enter the room. So here a camera is used in-order
to capture the person. The image taken is provided to the
MATLAB section for image processing. Local Binary Pattern
algorithm for processing the images. Thetrained images will
be stored in the database. When the person fall into thezone
then the camera detects him and captures his face. After
capturing, the image will be compared for recognition with
the images in the database. The image processing identifies
the person whether the person is recognized or not. If a
person’s images are un-identified, the system notifys the
user by providing an alert message (SMS) through GSM
module and send that image as a mail to the concerned user.
If he/she fails to respond to that SMS within a threshold
time, then a Call will be sent to the Authorized User.
Figure 3.1 System Architecture
4. MODULAR DESIGN
The Proposed system consists of the following modules.
1. Training the Images.
2. Recognition of Authorized User
3. Intimation about Intrusion
4.1. Training the Images
Fig 4.1 Training the Images
4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID - IJTSRD21659 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 173
The System is trained with various heterogeneous images.
This is done with the help of Camera and MATLAB section.It
can be seen in the figure 4.1. After the images are captured,
they are preprocessed, segmented and their features are
extracted and stored within the database.
4.2. Recognition of Authorized User
Fig 4.2 Recognition of Authorized user
When an intruder falls into the zone, he will be detected by
the camera and his face will be captured. The Image is then
processed and they are then compared with the set of
trained images in the database as shown in the Fig 4.2.
4.3. Intimation about Intrusion
In the module, if the detected face is not a recognized one,
then an SMS will be sent through the GSM model to the
Authorized users Mobile. If the User failstoacknowledge the
message within the given threshold time, then a Call will be
made to the user using the GSM modem as seen in the
flowchart Figure 4.3.
Figure4.3 Intimation about Intrusion
5. RESULT
The security system is implemented using a Arduino Uno
Micro-controller integrated with GSM module to send
intimations about intrusion. The authorized user's faces
will be trained using LPBH algorithm and gets stored in a
Database. The Image that has been captured is processed
and stored in Binary form within the database. When a
unknown/known person enters in the zone, it captures the
face. Then it compares the detected face with correlation
values stored in database. When the values don’t get
matched with the trained faces in the database then an
unmatched value set will be sent to the micro-controller
which in turn sends alert texts and call to authorized person
with the help of GSM modem. This is very much helpful to
alert the surrounding.
MODULE1: Training the authorized user faces
MODULE 2: Recognition and comparison of faces
5. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID - IJTSRD21659 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 174
MODULE 3: Intimating authorised person about intrusion
6. CONCLUSION AND FUTURE WORKS
The proposed system presented an improved technique
for identifying an intruder and intimating to an
authorized user. The system is trained with all the
authorized user’s faces. The more the system is trained,
the better the recognition algorithm works. The images
will be trained under various environments, light effects,
et cetera. Now, whenever an intruder enters into the
boundary zone of the camera, his/her face will be
captured and compared with the trained datasets stored
in the database. The algorithm after comparison will
return a value that will be fed to the microcontroller
which in-turn intimates the authorized user about the
intrusion. Future implementation of the system is to
propose a more effective algorithm that can be
implemented for face recognition to help identify the
intruder and intimating to the appropriate user.
7. REFERENCES
[1] A. S. Mian, M. Bennamoun, and R. Owens, “Keypoint
detection and Local feature matching for textured 3D
face recognition,” International Journal of Computer
Vision, Vol. 79, No. 1, PP. 1–12, 2008.
[2] Alicej.O’Toole, Xiaoboan, Josephdunlop and
Vaidehinatu,”Comparing Face Recognition
Algorithms to Humans on Challenging Tasks” ACM
Transactions on Applied Perceptions,Comput
10,4,Article 11,2016.
[3] A. S. Mian, M. Bennamoun, and R. Owens, “Keypoint
detection and Local feature matching for textured 3D
face recognition,” International Journal of Computer
Vision, Vol. 79, No. 1, PP. 1–12, 2008.
[4] D. Smeets, J. Keustermans, D. Vandermeulen, and P.
Suetens, “Meshsift: Local surface features for 3D face
recognition under expression variations and partial
data,” Computer Vision and Image Understanding,
Vol. 117, No. 2, PP. 158–169, 2013.
[5] H. Li, D. Huang, J.-M. Morvan, L. Chen, and Y. Wang,
“Expressionrobust 3D face recognition via weighted
sparse representation of multiscale and multi-
component local normal patterns,” Neurocomputing,
Vol. 133, PP. 179–193, 2014.
[6] H. Zhou, A. Mian, L. Wei, D. Creighton, M. Hossny, and
S. Nahavandi, “Recent advances on singlemodal and
multimodal face recognition: a survey,” IEEE
Transactions on Human-Machine Systems, Vol. 44,
No. 6, PP. 701–716, 2014.
[7] H. Mohammad zade and D. Hatzinakos, “Iterative
closest normal point for 3D face recognition,” IEEE
transactions on pattern analysis and machine
intelligence, Vol. 35, No. 2, PP. 381–397, 2013.
[8] Jenifer Marlow, Jason Wise, “Surveying User
Reactions to Recommendations Based on Inferences
Made by Face Detection Technology”, ACM Journals
on Intelligent System, 2017.
[9] M. Emambakhsh and A. Evans, “Nasal patches and
curves for expression-robust 3D face recognition,”
IEEE transactions on pattern analysis and machine
intelligence, Vol. 39, No. 5, PP. 995–1007, 2017.
[10] S. Berretti, A. Del Bimbo, and P. Pala, “Sparse
matching of salient facial curves for recognition of 3-
D faces with missing parts,” IEEE Transactions on
information forensics and security, Vol. 8, No. 2, PP.
374–389, 2013.
[11] S. Soltanpour, B. Boufama, and Q. J. Wu, “A survey of
local feature methods for 3D face recognition,”
Pattern Recognition, Vol. 72, PP. 391– 406, 2017.
[12] T. Russ, C. Boehnen, and T. Peters, “3D face
recognition using 3D alignment for PCA,” in IEEE
Computer Society Conference on Computer Vision
and Pattern Recognition, Vol. 2, PP. 1391–
1398,2006.
[13] W. Zhao, R. Chellappa, P. J. Phillips, and A. Rosenfeld,
“Face recognition: A literature survey,” ACM
computing surveys (CSUR), Vol. 35, No. 4, PP. 399–
458, 2003.
[14] X. Li, T. Jia, and H. Zhang, “Expression-insensitive 3D
face recognition using sparse representation,” in
IEEE Conference on Computer Vision and Pattern
Recognition (CVPR), PP. 2575–2582,2009.
[15] Xing chen, Yenan Lu, Ran Fang “3D Face Recognition
Based on Empirical Mode Decomposition and Sparse
Representation”, ACM Journal on Image Processing,
2016.
[16] Y. Lei, Y. Guo, M. Hayat, M. Bennamoun, and X. Zhou,
“A two-phase weighted collaborative representation
for 3D partial face recognition with single sample,”
Pattern Recognition, Vol. 52, No.4 PP. 218–237,
2016.