This document describes an advanced automatic wireless monitoring and controlling system for a digital door lock. The system uses a microcontroller, GSM modem, RFID sensor, and visual basic software to remotely control and monitor a door lock. An RFID sensor detects a user's ID card at the main door and if it matches, the microcontroller sends a unique password for that time via GSM modem to the user's mobile phone. The user must then enter the correct password within three attempts using a keypad on the locker door. If incorrect, the main door locks and an alarm sounds. The system provides high security for premises by only allowing authenticated users with the one-time password to access the locker. It aims to prevent unauthorized access
Smart Security Lock for Access Control Applications based on GSMIRJET Journal
The document describes a proposed smart security lock system based on GSM (Global System for Mobile Communication) that provides access control for electronic devices. The system uses a microcontroller-based lock installed between a device's power supply and the device. It can be locked with a numeric password up to 15 digits long and associated with a unique phone number. The lock notifies the owner of access attempts via SMS and allows the owner to control the lock remotely by SMS like changing the password. It aims to provide a reliable, low-cost security solution for access control applications.
Keypad Based Bank Locker Security System Using Gsm TechnologyIJRES Journal
Banking is one of the sectors where technology and advancements in technologies have not been utilized to the fullest potential. In the security systems even today very old practices are followed that can be made lot better using technologies like GSM which is easily usable and also easy to implement at a consumer level. In this project we propose a GSM based secure access which can provide a sophisticated theft alert system for bank locker system. This system contains microcontroller, keypad, GSM module and LCD display. By using keypad we need to enter the password that is provided to the authenticated persons. If the password entered is wrong then the GSM network converts the digital information into airborne signals and SMS is transferred to the registered mobile number. This system offers better solution for the bank security system and it will also help us to track the person who tried to open the locker without the permission and proper authentication.
The Journal of MC Square Scientific Research is published by MC Square Publication on the monthly basis. It aims to publish original research papers devoted to wide areas in various disciplines of science and engineering and their applications in industry. This journal is basically devoted to interdisciplinary research in Science, Engineering and Technology, which can improve the technology being used in industry. The real-life problems involve multi-disciplinary knowledge, and thus strong inter-disciplinary approach is the need of the research.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document proposes an advanced security system for ATMs using fingerprint scanners, sensors, and messaging to address issues with current ATM security. The system would require users to scan their fingerprint to enter the ATM cabin. Sensors would detect any unauthorized entry and trigger an alarm along with alert messages sent to authorities. The system aims to restrict entry only to authorized users, log entry details, and quickly notify police of any intrusions or issues. The design uses an Arduino board along with fingerprint scanner, PIR motion sensor and GSM module. This system seeks to prevent ATM robbery and damage through automated access control and rapid emergency notification.
This document describes a proposed system for operating an ATM machine without an ATM card by using finger vein recognition. The system would use an RFID module for initial user authentication and communication. An image acquisition module would collect finger vein images which would then be analyzed by an embedded control unit using a finger vein recognition algorithm. A communication module would display results and receive inputs. The system aims to provide more secure authentication than other biometric methods like fingerprints. It would allow blind or visually impaired people to independently use ATMs through added features like voice guidance.
This document proposes a biometric-based secure access system for bank lockers that uses fingerprint authentication for security. The system contains a microcontroller, keypad, biometric fingerprint module and LCD display. It works by requiring users to enter a code via the keypad to open the locker door initially, then authenticate via fingerprint to access the main locker compartment. This dual authentication provides better security than traditional systems and can also track unauthorized access attempts to alert banks.
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...IRJET Journal
This document describes the design and implementation of a fingerprint-based bank locker system using an ARM7 microcontroller and GSM technology. The system uses a fingerprint sensor module to store fingerprints of authorized users. When a fingerprint is detected that matches an authorized user, an ARM7 microcontroller connected to a GSM module will send an authentication SMS to the user. If authenticated, the microcontroller will activate a motor to automatically open the bank locker door, providing secure access. The system aims to provide stronger security compared to traditional bank lockers that use keys, as fingerprints are more reliable identifiers than keys that can be lost or stolen.
Smart Security Lock for Access Control Applications based on GSMIRJET Journal
The document describes a proposed smart security lock system based on GSM (Global System for Mobile Communication) that provides access control for electronic devices. The system uses a microcontroller-based lock installed between a device's power supply and the device. It can be locked with a numeric password up to 15 digits long and associated with a unique phone number. The lock notifies the owner of access attempts via SMS and allows the owner to control the lock remotely by SMS like changing the password. It aims to provide a reliable, low-cost security solution for access control applications.
Keypad Based Bank Locker Security System Using Gsm TechnologyIJRES Journal
Banking is one of the sectors where technology and advancements in technologies have not been utilized to the fullest potential. In the security systems even today very old practices are followed that can be made lot better using technologies like GSM which is easily usable and also easy to implement at a consumer level. In this project we propose a GSM based secure access which can provide a sophisticated theft alert system for bank locker system. This system contains microcontroller, keypad, GSM module and LCD display. By using keypad we need to enter the password that is provided to the authenticated persons. If the password entered is wrong then the GSM network converts the digital information into airborne signals and SMS is transferred to the registered mobile number. This system offers better solution for the bank security system and it will also help us to track the person who tried to open the locker without the permission and proper authentication.
The Journal of MC Square Scientific Research is published by MC Square Publication on the monthly basis. It aims to publish original research papers devoted to wide areas in various disciplines of science and engineering and their applications in industry. This journal is basically devoted to interdisciplinary research in Science, Engineering and Technology, which can improve the technology being used in industry. The real-life problems involve multi-disciplinary knowledge, and thus strong inter-disciplinary approach is the need of the research.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document proposes an advanced security system for ATMs using fingerprint scanners, sensors, and messaging to address issues with current ATM security. The system would require users to scan their fingerprint to enter the ATM cabin. Sensors would detect any unauthorized entry and trigger an alarm along with alert messages sent to authorities. The system aims to restrict entry only to authorized users, log entry details, and quickly notify police of any intrusions or issues. The design uses an Arduino board along with fingerprint scanner, PIR motion sensor and GSM module. This system seeks to prevent ATM robbery and damage through automated access control and rapid emergency notification.
This document describes a proposed system for operating an ATM machine without an ATM card by using finger vein recognition. The system would use an RFID module for initial user authentication and communication. An image acquisition module would collect finger vein images which would then be analyzed by an embedded control unit using a finger vein recognition algorithm. A communication module would display results and receive inputs. The system aims to provide more secure authentication than other biometric methods like fingerprints. It would allow blind or visually impaired people to independently use ATMs through added features like voice guidance.
This document proposes a biometric-based secure access system for bank lockers that uses fingerprint authentication for security. The system contains a microcontroller, keypad, biometric fingerprint module and LCD display. It works by requiring users to enter a code via the keypad to open the locker door initially, then authenticate via fingerprint to access the main locker compartment. This dual authentication provides better security than traditional systems and can also track unauthorized access attempts to alert banks.
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...IRJET Journal
This document describes the design and implementation of a fingerprint-based bank locker system using an ARM7 microcontroller and GSM technology. The system uses a fingerprint sensor module to store fingerprints of authorized users. When a fingerprint is detected that matches an authorized user, an ARM7 microcontroller connected to a GSM module will send an authentication SMS to the user. If authenticated, the microcontroller will activate a motor to automatically open the bank locker door, providing secure access. The system aims to provide stronger security compared to traditional bank lockers that use keys, as fingerprints are more reliable identifiers than keys that can be lost or stolen.
The document describes a project to simulate a secure ATM using an Arduino board and sensors to detect two potential attack scenarios: 1) physical access of the ATM's internal components, and 2) removing the entire ATM from its location. The system uses an Arduino board connected to various sensors to monitor for threats. If sensor readings match rules indicating a threat, an alarm is triggered. RabbitMQ and Node-RED are used to process sensor data in real-time and evaluate the rules. Kibana visualizes the sensor data for analysis. The goal is to prototype an IoT-based security system to protect ATMs from physical attacks.
Iirdem implementation of smart homes and industrial automation system with se...Iaetsd Iaetsd
The document proposes a smart home and industrial automation system that allows users to control appliances remotely using a mobile application over GSM networks. The system uses a PIC microcontroller connected to appliances via relays and optocouplers. An Android application is developed using Eclipse that sends encrypted control signals as SMS messages. Security involves password protection, user identification, and encrypted communications. The system was simulated in Proteus and allows monitoring and control of devices from a mobile phone.
This Project focuses onto implement RF TX and RF RX based Banking Security System. This system is implemented using an embedded microcontroller. The embedded microcontroller used here is PIC 16F887
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET Journal
This document proposes improvements to ATM security through wireless password transfer and keypad shuffling. It discusses how shoulder surfing allows thieves to steal PINs and introduces two techniques to prevent this. Keypad shuffling randomly rearranges keys after each user to confuse onlookers. Wireless password transfer involves the user entering their PIN on their phone via Bluetooth, which is then verified by the ATM. The document provides details on implementing these techniques using components like Arduino, Bluetooth and WiFi modules, buttons, and displays. It describes algorithms for random number generation and OTP creation. The proposed methods aim to enhance security by confusing password guessing and preventing PIN theft.
Intellectual Bank Locker Security SystemIJERA Editor
In today's modern world, security plays an important role. Every person has precious accessories like gold,
documents or cash. The main goal of this project is to design and implement a bank locker security system
based on fingerprint and GSM technology. It reduces wastage of time for both banker as well as customer and
provides advanced security. In this system, only authentic persons can recover money or accessories from bank
locker. In this system the user’s name, fingerprint and mobile number are enrolled. If the fingerprint matches,
then four digit code will be sent to the authorized person’s mobile through GSM modem and the locker door
will be opened then, otherwise it will be in locked position and gives an alarm when any mismatch occurs. The
sensors will be active during night times to provide security against thefts.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
This document summarizes several home automation and security systems proposed in previous research papers. It describes systems that use password protected door locks, car theft prevention that disconnects the ignition, home security using web cameras or SMS to detect intruders, a wireless sensor network and GSM based system to detect intrusion and fires remotely, and a low cost system that can operate in internal or external modes to detect security issues and notify users or emergency services. The systems aim to automate tasks and increase security and safety in homes and vehicles.
Development of wireless and intelligent home automation systemTELKOMNIKA JOURNAL
The Intelligent Home Automation System (IHAS) is usually a cell phone web-based application that enables end users in order to keep track of in addition to manage home/office appliance using their mobile system. The main objective of this system is developed to facilitate home users, especially domestic electrical appliances with simple controls. In addition, it can save the cost of electricity for lighting can be controlled to suit the user. Generally, most home appliances controlled from a distance using a remote control. Has created a system for controlling home lighting from a certain distance, which replaces the remote control using mobile smartphone. To make the smartphone to function as a remote control, an application was developed using Android technology. App Inventor software used for designing applications intended. Hardware microcontroller Arduino UNO R3 which is used to connect the smartphone to the electrical equipment. The system has been tested by developing a mini model and take into account the situation in the domestic home. The test is based on the level of control for wirelessly using Bluetooth and the distance between the lamp and the smartphone. The results of this test, the system can be used on equipment or other home appliances for the purpose of controlling or adjustment. In addition, the security system was also highlighted in a typical system, using the global system for mobile (GSM), it can be warned and notified to the consumer where there is a gas leak or the presence of a person in the vicinity of the residence.
This document describes a vehicle anti-theft system based on an embedded platform. The system uses multiple layers of protection, including fingerprint recognition to open doors, vibration sensors on windows, a mechanical key and keypad to start the vehicle, and tire pressure and GPS sensors to track a stolen vehicle. The different sensors are controlled by an ARM 7 microcontroller. The system was tested using a test setup that mimicked vehicle components like doors and immobilizers using motors. Fingerprint data was received from a Matlab GUI. Experimental results proved the functionality of the multi-layered anti-theft system.
This document describes a proposed smart locker system for home keys using Internet of Things technologies. The system uses a GSM module, LCD display, proximity sensor, relay, and Arduino microcontroller. The GSM module allows two family members to control opening and closing of the locker via SMS. When keys are placed in or removed from the locker, an SMS notification is sent. If someone tries to break into the system, an alert SMS is sent to family members and security. The system aims to provide safety for keys without needing to carry them, and allows access even when owners are not home by verifying users through SMS. The components work together to securely operate the locker through remote control and notifications.
This document describes an RFID-based secured access system created by students. The system uses an AT89C51 microcontroller, RFID reader, LCD display, and keypad. It is designed to only grant access to authorized individuals by verifying both the RFID tag number and entered password. The system could be applied to applications requiring high security like homes, government offices, and defense areas to automate door locks. It provides a cheap alternative to traditional security systems.
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREMichael George
As we are moving in a World of advancement, so the security is the major concern in order to keep data isolate from the unauthorised users to access. In today’s World, we need high degree security system for the protection of our document, important data, as well as memory and jewellery. This review paper presents a secure fingerprint locker which is feasible. This system is proved successful on all norms of security of lockers. There are other methods of verifying authentication through password, RFID but this method is most efficient and reliable. To provide perfect security to the lockers and to make the work easier, this project is taking help of two different technologies, i.e. Embedded System and Biometrics. Biometrics is basically the measurement and use of unique characteristics of living beings to make them distinguish from one another. And this is more reliable then passwords and tokens which can be lost or stolen by the humans. In this paper we are providing the work done on this technique.
This document provides an overview of an RFID and GSM based security system project. The system uses an RFID card to identify authorized users and allow entry if their card ID matches the stored information. If an unauthorized card is used, a buzzer sounds and an SMS is sent. The document describes the system components including the microcontroller, RFID tags and readers, GSM module. It provides block and circuit diagrams of the system and discusses how RFID and microcontrollers work. The objectives are to control access and notify authorities by SMS of unauthorized access attempts.
This project presents a door locking system which suggests two ways for unlocking a door using Internet of Things (IoT) and Fingerprint. Most of the major door lock security systems have several loopholes which could be broken down to gain access to the desired places, and it creates a concern for a secure lifestyle and proper working environment. People can access Internet services by using their cell phone, laptop and various gadgets. Fingerprint is a reliable biometric feature having a wide range of applications that require authentication. Biometric systems such as fingerprint provide tools to enforce reliable logs of system transactions and protect an individual’s right to privacy. In the proposed system, fingerprints of the authorized users are enrolled and verified to provide access to a facility that is used by multiple users. A user can also be removed and a new user can be enrolled in the system. We have implemented a centralized control system from where we can control who can enter in which rooms and who cannot. This is an Arduino Mega device based. Fingerprints are stored dynamically in a database for computing the different statistics.
Wireless e-passport using smart card technologyIRJET Journal
This document describes a proposed wireless e-passport system that uses smart card technology. A smart card containing personal details like name, date of birth, nationality, and UID number is given to the passport holder. When the card is placed near an RFID reader, the details are wirelessly transmitted to a computer system. The system aims to simplify verification and increase security by reducing documentation and preventing forgery. It contains components like a microcontroller, LCD display, GSM module, RFID reader and tag. The smart card technology allows for centralized storage of passport information, faster verification times, and increased security over traditional passports.
This document proposes an IoT-based smart voting system using fingerprint authentication on a mobile application. Key aspects include:
1. The system aims to simplify and streamline the voting process using fingerprint identification on a mobile app instead of unnecessary hardware, reducing steps and increasing throughput.
2. It works by enrolling voter fingerprints into a database using a fingerprint scanner and Arduino. Voters then log into the mobile app where their fingerprint is verified via the scanner.
3. If verified, the app directs them to a candidate list based on their region to cast their vote, and they receive an SMS confirmation. All votes are securely stored in the database.
4. The system aims to reduce human
Smart security door system using SMS based energy harvestIJECEIAES
Over the last decade, different studies have been conducted to increase security to identify sensor technology and provide alternative energy with other energy harvest techniques such as vibration energy harvester and sun energy harvester. There is no combinational approach to utilize the door to create energy and use it for security measures in the literature, making our system different and unique. This proposed system comprises the security and the energy harvest; the security section utilizes a motion detector sensor to detect intruders. For instance, the magnetic door lock type firmly locks the door, which can only open with a generated password. On the other side, the energy harvest section utilizes the door motion to generate electricity for the system, which solves power shortage and limited battery life issues. Moreover, this study includes a GSM module that allows authorized owners to receive a generated password as a security enhancement. This design mainly focuses on improving or optimizing the conventional security doors' overall performance as sliding door, panel door, or revolving door. The experimental results show the system efficiency in terms of power generation and the time needed to authenticate the property owner. Notably, the power generator can generate electricity more rapidly, while the needed time to receive the mobile device's security code is around 3.6 seconds.
The document describes a Short Message Service (SMS) based wireless home appliance control system (HACS) that allows users to remotely control home appliances and monitor security via SMS using GSM technology. The system uses a PC connected to a GSM modem to send and receive SMS instructions to simulate appliances and send security alerts. Test results showed the system could successfully turn appliances on/off in response to SMS commands from authorized numbers and send breach alerts upon intrusion detection. The authors propose expanding the system to integrate additional sensors and detection systems for improved security monitoring and remote control of more appliances.
IRJET- ATM Security using GSM and MEMS SensorIRJET Journal
This document proposes a security system for ATMs using a MEMS sensor to detect movement if the machine is robbed and a GSM module to send alerts to bank authorities and police. The system would use an AVR microcontroller connected to the MEMS sensor and GSM module to trigger alerts if the sensor detects movement, shutting the door and spraying anesthesia powder on thieves. The system is designed to improve ATM security and prevent losses from increasing robbery and theft at ATMs.
Advanced Anti-Theft & Home Safety System using GSMIRJET Journal
This document describes an advanced home security and safety system using GSM technology. The system has three subsystems: an intrusion detection and door locking subsystem, a fire safety subsystem, and a gas leakage safety subsystem. It uses sensors like ultrasonic, gas, and smoke sensors along with a microcontroller and GSM modem. The system monitors the sensors in real-time and sends SMS alerts to the homeowner if any issues are detected, like intrusion, fire, or gas leakage. It can also remotely lock doors through motors attached to the doors. The system aims to provide low-cost, user-friendly, and reliable home security and safety.
Intellectual Bank Locker Security SystemIJERA Editor
In today's modern world, security plays an important role. Every person has precious accessories like gold,
documents or cash. The main goal of this project is to design and implement a bank locker security system
based on fingerprint and GSM technology. It reduces wastage of time for both banker as well as customer and
provides advanced security. In this system, only authentic persons can recover money or accessories from bank
locker. In this system the user’s name, fingerprint and mobile number are enrolled. If the fingerprint matches,
then four digit code will be sent to the authorized person’s mobile through GSM modem and the locker door
will be opened then, otherwise it will be in locked position and gives an alarm when any mismatch occurs. The
sensors will be active during night times to provide security against thefts.
The document describes a project to simulate a secure ATM using an Arduino board and sensors to detect two potential attack scenarios: 1) physical access of the ATM's internal components, and 2) removing the entire ATM from its location. The system uses an Arduino board connected to various sensors to monitor for threats. If sensor readings match rules indicating a threat, an alarm is triggered. RabbitMQ and Node-RED are used to process sensor data in real-time and evaluate the rules. Kibana visualizes the sensor data for analysis. The goal is to prototype an IoT-based security system to protect ATMs from physical attacks.
Iirdem implementation of smart homes and industrial automation system with se...Iaetsd Iaetsd
The document proposes a smart home and industrial automation system that allows users to control appliances remotely using a mobile application over GSM networks. The system uses a PIC microcontroller connected to appliances via relays and optocouplers. An Android application is developed using Eclipse that sends encrypted control signals as SMS messages. Security involves password protection, user identification, and encrypted communications. The system was simulated in Proteus and allows monitoring and control of devices from a mobile phone.
This Project focuses onto implement RF TX and RF RX based Banking Security System. This system is implemented using an embedded microcontroller. The embedded microcontroller used here is PIC 16F887
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET Journal
This document proposes improvements to ATM security through wireless password transfer and keypad shuffling. It discusses how shoulder surfing allows thieves to steal PINs and introduces two techniques to prevent this. Keypad shuffling randomly rearranges keys after each user to confuse onlookers. Wireless password transfer involves the user entering their PIN on their phone via Bluetooth, which is then verified by the ATM. The document provides details on implementing these techniques using components like Arduino, Bluetooth and WiFi modules, buttons, and displays. It describes algorithms for random number generation and OTP creation. The proposed methods aim to enhance security by confusing password guessing and preventing PIN theft.
Intellectual Bank Locker Security SystemIJERA Editor
In today's modern world, security plays an important role. Every person has precious accessories like gold,
documents or cash. The main goal of this project is to design and implement a bank locker security system
based on fingerprint and GSM technology. It reduces wastage of time for both banker as well as customer and
provides advanced security. In this system, only authentic persons can recover money or accessories from bank
locker. In this system the user’s name, fingerprint and mobile number are enrolled. If the fingerprint matches,
then four digit code will be sent to the authorized person’s mobile through GSM modem and the locker door
will be opened then, otherwise it will be in locked position and gives an alarm when any mismatch occurs. The
sensors will be active during night times to provide security against thefts.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
This document summarizes several home automation and security systems proposed in previous research papers. It describes systems that use password protected door locks, car theft prevention that disconnects the ignition, home security using web cameras or SMS to detect intruders, a wireless sensor network and GSM based system to detect intrusion and fires remotely, and a low cost system that can operate in internal or external modes to detect security issues and notify users or emergency services. The systems aim to automate tasks and increase security and safety in homes and vehicles.
Development of wireless and intelligent home automation systemTELKOMNIKA JOURNAL
The Intelligent Home Automation System (IHAS) is usually a cell phone web-based application that enables end users in order to keep track of in addition to manage home/office appliance using their mobile system. The main objective of this system is developed to facilitate home users, especially domestic electrical appliances with simple controls. In addition, it can save the cost of electricity for lighting can be controlled to suit the user. Generally, most home appliances controlled from a distance using a remote control. Has created a system for controlling home lighting from a certain distance, which replaces the remote control using mobile smartphone. To make the smartphone to function as a remote control, an application was developed using Android technology. App Inventor software used for designing applications intended. Hardware microcontroller Arduino UNO R3 which is used to connect the smartphone to the electrical equipment. The system has been tested by developing a mini model and take into account the situation in the domestic home. The test is based on the level of control for wirelessly using Bluetooth and the distance between the lamp and the smartphone. The results of this test, the system can be used on equipment or other home appliances for the purpose of controlling or adjustment. In addition, the security system was also highlighted in a typical system, using the global system for mobile (GSM), it can be warned and notified to the consumer where there is a gas leak or the presence of a person in the vicinity of the residence.
This document describes a vehicle anti-theft system based on an embedded platform. The system uses multiple layers of protection, including fingerprint recognition to open doors, vibration sensors on windows, a mechanical key and keypad to start the vehicle, and tire pressure and GPS sensors to track a stolen vehicle. The different sensors are controlled by an ARM 7 microcontroller. The system was tested using a test setup that mimicked vehicle components like doors and immobilizers using motors. Fingerprint data was received from a Matlab GUI. Experimental results proved the functionality of the multi-layered anti-theft system.
This document describes a proposed smart locker system for home keys using Internet of Things technologies. The system uses a GSM module, LCD display, proximity sensor, relay, and Arduino microcontroller. The GSM module allows two family members to control opening and closing of the locker via SMS. When keys are placed in or removed from the locker, an SMS notification is sent. If someone tries to break into the system, an alert SMS is sent to family members and security. The system aims to provide safety for keys without needing to carry them, and allows access even when owners are not home by verifying users through SMS. The components work together to securely operate the locker through remote control and notifications.
This document describes an RFID-based secured access system created by students. The system uses an AT89C51 microcontroller, RFID reader, LCD display, and keypad. It is designed to only grant access to authorized individuals by verifying both the RFID tag number and entered password. The system could be applied to applications requiring high security like homes, government offices, and defense areas to automate door locks. It provides a cheap alternative to traditional security systems.
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREMichael George
As we are moving in a World of advancement, so the security is the major concern in order to keep data isolate from the unauthorised users to access. In today’s World, we need high degree security system for the protection of our document, important data, as well as memory and jewellery. This review paper presents a secure fingerprint locker which is feasible. This system is proved successful on all norms of security of lockers. There are other methods of verifying authentication through password, RFID but this method is most efficient and reliable. To provide perfect security to the lockers and to make the work easier, this project is taking help of two different technologies, i.e. Embedded System and Biometrics. Biometrics is basically the measurement and use of unique characteristics of living beings to make them distinguish from one another. And this is more reliable then passwords and tokens which can be lost or stolen by the humans. In this paper we are providing the work done on this technique.
This document provides an overview of an RFID and GSM based security system project. The system uses an RFID card to identify authorized users and allow entry if their card ID matches the stored information. If an unauthorized card is used, a buzzer sounds and an SMS is sent. The document describes the system components including the microcontroller, RFID tags and readers, GSM module. It provides block and circuit diagrams of the system and discusses how RFID and microcontrollers work. The objectives are to control access and notify authorities by SMS of unauthorized access attempts.
This project presents a door locking system which suggests two ways for unlocking a door using Internet of Things (IoT) and Fingerprint. Most of the major door lock security systems have several loopholes which could be broken down to gain access to the desired places, and it creates a concern for a secure lifestyle and proper working environment. People can access Internet services by using their cell phone, laptop and various gadgets. Fingerprint is a reliable biometric feature having a wide range of applications that require authentication. Biometric systems such as fingerprint provide tools to enforce reliable logs of system transactions and protect an individual’s right to privacy. In the proposed system, fingerprints of the authorized users are enrolled and verified to provide access to a facility that is used by multiple users. A user can also be removed and a new user can be enrolled in the system. We have implemented a centralized control system from where we can control who can enter in which rooms and who cannot. This is an Arduino Mega device based. Fingerprints are stored dynamically in a database for computing the different statistics.
Wireless e-passport using smart card technologyIRJET Journal
This document describes a proposed wireless e-passport system that uses smart card technology. A smart card containing personal details like name, date of birth, nationality, and UID number is given to the passport holder. When the card is placed near an RFID reader, the details are wirelessly transmitted to a computer system. The system aims to simplify verification and increase security by reducing documentation and preventing forgery. It contains components like a microcontroller, LCD display, GSM module, RFID reader and tag. The smart card technology allows for centralized storage of passport information, faster verification times, and increased security over traditional passports.
This document proposes an IoT-based smart voting system using fingerprint authentication on a mobile application. Key aspects include:
1. The system aims to simplify and streamline the voting process using fingerprint identification on a mobile app instead of unnecessary hardware, reducing steps and increasing throughput.
2. It works by enrolling voter fingerprints into a database using a fingerprint scanner and Arduino. Voters then log into the mobile app where their fingerprint is verified via the scanner.
3. If verified, the app directs them to a candidate list based on their region to cast their vote, and they receive an SMS confirmation. All votes are securely stored in the database.
4. The system aims to reduce human
Smart security door system using SMS based energy harvestIJECEIAES
Over the last decade, different studies have been conducted to increase security to identify sensor technology and provide alternative energy with other energy harvest techniques such as vibration energy harvester and sun energy harvester. There is no combinational approach to utilize the door to create energy and use it for security measures in the literature, making our system different and unique. This proposed system comprises the security and the energy harvest; the security section utilizes a motion detector sensor to detect intruders. For instance, the magnetic door lock type firmly locks the door, which can only open with a generated password. On the other side, the energy harvest section utilizes the door motion to generate electricity for the system, which solves power shortage and limited battery life issues. Moreover, this study includes a GSM module that allows authorized owners to receive a generated password as a security enhancement. This design mainly focuses on improving or optimizing the conventional security doors' overall performance as sliding door, panel door, or revolving door. The experimental results show the system efficiency in terms of power generation and the time needed to authenticate the property owner. Notably, the power generator can generate electricity more rapidly, while the needed time to receive the mobile device's security code is around 3.6 seconds.
The document describes a Short Message Service (SMS) based wireless home appliance control system (HACS) that allows users to remotely control home appliances and monitor security via SMS using GSM technology. The system uses a PC connected to a GSM modem to send and receive SMS instructions to simulate appliances and send security alerts. Test results showed the system could successfully turn appliances on/off in response to SMS commands from authorized numbers and send breach alerts upon intrusion detection. The authors propose expanding the system to integrate additional sensors and detection systems for improved security monitoring and remote control of more appliances.
IRJET- ATM Security using GSM and MEMS SensorIRJET Journal
This document proposes a security system for ATMs using a MEMS sensor to detect movement if the machine is robbed and a GSM module to send alerts to bank authorities and police. The system would use an AVR microcontroller connected to the MEMS sensor and GSM module to trigger alerts if the sensor detects movement, shutting the door and spraying anesthesia powder on thieves. The system is designed to improve ATM security and prevent losses from increasing robbery and theft at ATMs.
Advanced Anti-Theft & Home Safety System using GSMIRJET Journal
This document describes an advanced home security and safety system using GSM technology. The system has three subsystems: an intrusion detection and door locking subsystem, a fire safety subsystem, and a gas leakage safety subsystem. It uses sensors like ultrasonic, gas, and smoke sensors along with a microcontroller and GSM modem. The system monitors the sensors in real-time and sends SMS alerts to the homeowner if any issues are detected, like intrusion, fire, or gas leakage. It can also remotely lock doors through motors attached to the doors. The system aims to provide low-cost, user-friendly, and reliable home security and safety.
Intellectual Bank Locker Security SystemIJERA Editor
In today's modern world, security plays an important role. Every person has precious accessories like gold,
documents or cash. The main goal of this project is to design and implement a bank locker security system
based on fingerprint and GSM technology. It reduces wastage of time for both banker as well as customer and
provides advanced security. In this system, only authentic persons can recover money or accessories from bank
locker. In this system the user’s name, fingerprint and mobile number are enrolled. If the fingerprint matches,
then four digit code will be sent to the authorized person’s mobile through GSM modem and the locker door
will be opened then, otherwise it will be in locked position and gives an alarm when any mismatch occurs. The
sensors will be active during night times to provide security against thefts.
To protect user’s password from theft by using rfid and mems technologyeSAT Journals
Abstract In this paper, MEMS (Micro Electro Mechanical System) is implemented using Embedded controller PIC 16F877A. MEMS can be used to sense motion. Microcontroller detect any motion while they are occurs or not. The user can assign a password by fixed set of motions as decided by them. In that there are three techniques uses for user’s authentication. Firstly Microcontroller senses any motion which is matches with exist motion password, then first phase will unlock and it goes into next phase is human interface method of keypad that is traditional where the user enters the predefined password, if it is matched with the predefined password then second phase will be unlock. Then user will directly enter into the final phase which is a RFID card that is read by a RFID reader module connected to the Micro controller if the card is matched the final phase get completed and the desired operation will start. A buzzer is used for an indication of wrong password. This buzzer is ON until right password matches with existing password. Key Words: -Codebooks, Key Logger, PIC Microcontroller, Secret Little Functions, RFID, MEMS.
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET Journal
This document summarizes a research project that developed a high security system for money carrying vans. The system uses both a password entered on a keypad and fingerprint authentication for security. It contains a microcontroller, fingerprint sensor, LCD display, GSM module, and keypad. If an unauthorized person enters the wrong password, access is denied and an alert message is sent via the GSM module. If the password is correct but the fingerprint does not match, access is again denied and an alert sent. The system is designed to improve security when transporting money in vans compared to using guards alone.
Study on Smart Security Technology for Women based on IOTIRJET Journal
1) The document proposes a smart security system for women using IoT technology to allow for instant emergency response.
2) The system involves a smart band that monitors factors like temperature and motion, connected via Bluetooth to a smartphone. The smartphone app can then send an alert including the user's location to emergency contacts and local police if the sensors detect an emergency situation.
3) This autonomous system aims to address the limitations of existing personal safety apps which require the user to trigger an alert, which may not be possible in an emergency situation. The proposed system is intended to improve women's security and sense of safety.
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET Journal
This document summarizes a survey on cardless automated teller machines (ATMs). It discusses using fingerprint authentication and one-time passwords (OTPs) sent via global system for mobile communications (GSM) to allow customers to withdraw cash from an ATM without a debit card. The proposed system uses a fingerprint module and microcontroller to authenticate users via their fingerprint. An OTP is then sent to the user's mobile phone for an additional layer of security. If the fingerprint and OTP match, the user's bank account will open on the ATM machine and allow cash withdrawals. The document compares this approach to existing card-based ATM security and pin-based authentication methods.
IRJET- GSM based ATM Security System with GPSIRJET Journal
This document describes a GSM-based security system for ATMs that uses a vibration sensor, microcontroller, GSM modem and GPS module. When someone tries to steal money from an ATM by destroying the machine, the vibration sensor will detect vibrations and send an interrupt signal to the microcontroller. The microcontroller will then instruct the GSM modem to continuously send alert messages to the nearest police station. The police can then use the GPS location data to quickly track the exact address of the ATM and catch the robbers. The system aims to prevent ATM theft and allow immediate response by law enforcement.
This document describes an intelligent home automation system that uses a PIC microcontroller, ZigBee wireless communication, a GSM network, and speech recognition to control home appliances and provide home security. Sensors detect intruders and visitors while cameras capture photos that are sent to the user. The system allows two-way communication and remote control of lights, fans, TVs, fridges and more using a mobile phone interface. It provides home monitoring and security while reducing installation costs through a wireless design.
This document provides an introduction and overview of an embedded systems project that uses a fingerprint module, GSM module, and keypad with an XMEGA 256A3BU microcontroller for high security applications. The main objectives of the project are to design an intelligent and programmable security system that only allows authorized persons to enter a room using three modes of access: fingerprint, keypad, or GSM-activated keypad. The document then provides background information on embedded systems, their applications in various sectors such as automotive, aerospace, telecommunications, consumer electronics, railroads, and electronic payment solutions.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document describes a microcontroller-based anti-theft security system for cars using GSM networks that sends text messages. The system monitors the car doors and boot for intrusion attempts. If an attempt is detected, it sends a text message to the owner and demobilizes the car by disconnecting the ignition. It also activates an alarm. The system uses a microcontroller to coordinate GSM, DTMF decoding, door/boot sensors, text messaging, demobilization, and alarm activation. Testing confirmed the system successfully performed these functions to secure the car and notify the owner of intrusion attempts.
This document describes an advance ATM security system that uses various sensors like IR sensors for motion detection, a servo motor for closing and opening the cabin gate, an LCD display, and an alarm or buzzer for alerts. The system aims to improve ATM security and make it safer to use by monitoring for unauthorized access or tampering. When motion is detected or more than two people enter the cabin, the door will automatically close and an alert will be sent to the nearby police station via messages displayed on the LCD. The system uses a Node MCU microcontroller to process sensor data and control the components.
ATM machine security system using GSM and MEMS sensorIRJET Journal
This document describes a proposed security system for ATM machines that uses MEMS sensors, vibration sensors, a GSM module, and other components. When the MEMS or vibration sensors detect movement or vibrations from the ATM, a signal is sent to the microcontroller. The microcontroller then sounds an alarm and sends an SMS via the GSM module to notify authorities. A DC motor is used to automatically close the ATM door if thieves enter. A camera also captures images which are sent to a PC. The system aims to prevent robberies and theft of ATM machines.
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET Journal
This document describes a RFID-based automatic door locking system for home security. The system uses an Arduino nano microcontroller, RFID reader and tags, wireless transmitter and receiver modules, NodeMCU for WiFi connectivity, a 3x4 keypad, and servo motor. The system provides three ways to unlock the door - using a password via keypad, detecting an authorized RFID tag, or using a mobile application. It aims to remotely control the door unlock via a web connection and message passing between the owner and door lock for increased security and convenience.
Microcontroller based smart home with security using gsm technologyeSAT Journals
Abstract Smart home is a house that uses information technology to monitor the environment, control the electric appliance and communicates with the outer world. Smart home is a complex technology, at the same time it is developing. A smart home automation system has been developed to automatically achieve some activities performed frequently in daily life to obtain more comfortable and easier life environment. Security has becoming an important issue everywhere. Home security is becoming necessary nowadays as the possibilities of intrusion are increasing day by day. Safety from theft, and fire are the most important requirements of home security system for people. A traditional home security system gives the signals in terms of alarm. With the help of technology development, this research take a chance to implement these technologies to help people to protect and control their home appliance remotely .The purpose of this research is to create a system that make the surveillance of home devices easily. The technology that used in this research are GSM (Global System for digital mobile telecommunication ) and Microcontroller .The GSM module is used to communicate with the owner of the home whenever the sensor senses a fault , a specific message is sent to the owner in order to take a necessary action . The microcontroller is a tool that use a specific code to do some functions by using MikroC programmer. This project controls and monitors temperature, smoke, intrusion motion, magnetic lock door, garage door and irrigation. This project is expected to achieve, safety, save effort, save time, and easy devices control Keywords: Smart home, GSM module, magnetic lock, microcontroller
This document describes an automatic color sorting project using an Arduino Uno and color sensor. It includes chapters on embedded systems, hardware components like the power supply, microcontroller, motor, sensors, and software. The hardware is powered by a regulated 5V supply. It uses a microcontroller, color sensor, and conveyor belt to sort objects by color. The software controls the system and algorithms sort objects. Overall it presents a project to automatically sort objects by color for applications like industrial automation.
protection on lineman while working on transmission line reportRavi Phadtare
This document describes a system to protect linemen working on transmission lines. The system uses a microcontroller connected to a GSM module and circuit breaker. When a lineman needs to work on a line, they call the microcontroller using a GSM phone. This automatically switches off the power to that line. When work is complete, the lineman calls again to restore power. The microcontroller compares the caller's number to a stored number to authenticate them. This system aims to prevent electrical accidents by allowing linemen to remotely control the power supply while working.
This document describes a proposed automatic door lock system using fingerprint authentication and GSM. The system would accurately identify fingerprints to determine if a person is authorized and send an SMS to the owner if an unauthorized person attempts to enter. It includes a block diagram and description of the working procedure which uses an Arduino microcontroller interfaced with a fingerprint module and GSM modem for communication. The system is intended to provide advanced security for applications such as homes, industries, and organizations while being low cost, low power, and compact in size.
SMS based Wireless Digital Board with Voice Recognition Based on GSMIRJET Journal
This document describes an SMS-based digital notice board system with voice recognition capabilities. The system allows notices to be sent to the board via text or voice message using a mobile phone. A GSM modem receives the messages and sends them to a microcontroller. For voice messages, the microcontroller uses analog-to-digital conversion to convert the message to text. The text messages are then displayed on an LCD screen connected to the microcontroller. The system provides a low-cost way to electronically share notices without needing internet and is accessible for blind or disabled users via voice messages. It has applications in schools, offices, and other public settings.
This document summarizes a student project to design a highly secured automatic door control and power control system. The system uses a PIC microcontroller to control components like a PIR sensor for motion detection, door sensors, call buttons, relays for light/fan control, and a GSM modem for communication. It allows for automated and remote control of doors and electric appliances with features like gas leakage detection for security. The project aims to provide low-cost security and automation for homes and offices with benefits like remote access and power savings. Future work may include expanding the gas detection and power control capabilities.
Similar to An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock System (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Rainfall intensity duration frequency curve statistical analysis and modeling...bijceesjournal
Using data from 41 years in Patna’ India’ the study’s goal is to analyze the trends of how often it rains on a weekly, seasonal, and annual basis (1981−2020). First, utilizing the intensity-duration-frequency (IDF) curve and the relationship by statistically analyzing rainfall’ the historical rainfall data set for Patna’ India’ during a 41 year period (1981−2020), was evaluated for its quality. Changes in the hydrologic cycle as a result of increased greenhouse gas emissions are expected to induce variations in the intensity, length, and frequency of precipitation events. One strategy to lessen vulnerability is to quantify probable changes and adapt to them. Techniques such as log-normal, normal, and Gumbel are used (EV-I). Distributions were created with durations of 1, 2, 3, 6, and 24 h and return times of 2, 5, 10, 25, and 100 years. There were also mathematical correlations discovered between rainfall and recurrence interval.
Findings: Based on findings, the Gumbel approach produced the highest intensity values, whereas the other approaches produced values that were close to each other. The data indicates that 461.9 mm of rain fell during the monsoon season’s 301st week. However, it was found that the 29th week had the greatest average rainfall, 92.6 mm. With 952.6 mm on average, the monsoon season saw the highest rainfall. Calculations revealed that the yearly rainfall averaged 1171.1 mm. Using Weibull’s method, the study was subsequently expanded to examine rainfall distribution at different recurrence intervals of 2, 5, 10, and 25 years. Rainfall and recurrence interval mathematical correlations were also developed. Further regression analysis revealed that short wave irrigation, wind direction, wind speed, pressure, relative humidity, and temperature all had a substantial influence on rainfall.
Originality and value: The results of the rainfall IDF curves can provide useful information to policymakers in making appropriate decisions in managing and minimizing floods in the study area.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.