This document describes the design and implementation of a smart bell notification system using IoT. The system uses a camera to capture an image of a visitor when the doorbell is pressed and sends the image to the owner via SMS along with an alert. It also saves the images to a Google Drive folder. The system aims to provide home security and convenience by allowing owners to see who is at the door and take appropriate action. It uses an ARM-7 microcontroller, GSM modem, camera and cloud storage to enable this smart doorbell notification feature.
Intelligent Internet of Things (IIoT): System Architectures and Communica...Raghu Nandy
Internet of Things (IoT) can be designed by various approaches with optimistic technology choices. This paper focuses on comparing recent studies on architectural choices and communication approaches for IoT Systems. Understanding Goals of an IoT system and inventing a general prototype for general IoT solutions is uniquely challenging. Existing research prototypes provide us information about IoT systems and their challenges. Existing architectures and communication approaches such as such as Service Oriented Architecture (SOA), Instant Messaging (XMPP) and Web-Sockets Service can be used to develop a general IoT System prototype. SOA provides centralized/decentralized IoT systems. Instant Message services such as XMPP can be used to build distributed and secure IoT platforms. Web-sockets also used to build scalable IoT systems. Overall the choice depends on IoT system Goal and limitations. Intelligent IoT (IIoT) Systems can be seen as decision making system. IoT systems can be built on Cloud infrastructures With Sensor Event as a Service (SEaaS) - Cloud Sensor networks can enable applications to access on-demand real-time sensor data. A generic IoT platform can be built and extended to newer applications and platforms.
Securing Mobile Cloud Using Fingerprint AuthenticationApurva Kini
Given topic describes an authentication technique for mobile cloud using one of the bio-metric techniques i.e. fingerprint authentication . Here we are making use of Mobile Phone's camera to take fingerprint samples.
Development of web-based surveillance system for Internet of Things (IoT) app...journalBEEI
With the advancement of wireless technology, our dependency on smart system has increases to a higher level than before. Without doubt, integration between different technologies becomes inevitable in order create affordable surveillance system. This paper presents the development of with web-based surveillance system with a dedicated Android-based mobile application using a Raspberry Pi and its supporting components i.e., Pi-Camera, PIR motion sensor, Ultrasonic sensor, web-based & mobile application. The designed system also utilizes Node-Red development tools as the platform to integrate all components of the system, MQTT as the communication protocol for data acquisition and ThingSpeak as the middleware. The proposed system can be implemented over the internet using any computer and mobile devices, at anywhere and anytime. The system can automatically stream live video viewed from the Android mobile application and the Raspberry Pi device can send an alert notification to users via email and SMS. The system can be one possible features in smart home system and is considered as an affordable solution, customizable and easy to implement in comparison with other commercial surveillance system products such as CCTV or IP Camera
Intelligent Internet of Things (IIoT): System Architectures and Communica...Raghu Nandy
Internet of Things (IoT) can be designed by various approaches with optimistic technology choices. This paper focuses on comparing recent studies on architectural choices and communication approaches for IoT Systems. Understanding Goals of an IoT system and inventing a general prototype for general IoT solutions is uniquely challenging. Existing research prototypes provide us information about IoT systems and their challenges. Existing architectures and communication approaches such as such as Service Oriented Architecture (SOA), Instant Messaging (XMPP) and Web-Sockets Service can be used to develop a general IoT System prototype. SOA provides centralized/decentralized IoT systems. Instant Message services such as XMPP can be used to build distributed and secure IoT platforms. Web-sockets also used to build scalable IoT systems. Overall the choice depends on IoT system Goal and limitations. Intelligent IoT (IIoT) Systems can be seen as decision making system. IoT systems can be built on Cloud infrastructures With Sensor Event as a Service (SEaaS) - Cloud Sensor networks can enable applications to access on-demand real-time sensor data. A generic IoT platform can be built and extended to newer applications and platforms.
Securing Mobile Cloud Using Fingerprint AuthenticationApurva Kini
Given topic describes an authentication technique for mobile cloud using one of the bio-metric techniques i.e. fingerprint authentication . Here we are making use of Mobile Phone's camera to take fingerprint samples.
Development of web-based surveillance system for Internet of Things (IoT) app...journalBEEI
With the advancement of wireless technology, our dependency on smart system has increases to a higher level than before. Without doubt, integration between different technologies becomes inevitable in order create affordable surveillance system. This paper presents the development of with web-based surveillance system with a dedicated Android-based mobile application using a Raspberry Pi and its supporting components i.e., Pi-Camera, PIR motion sensor, Ultrasonic sensor, web-based & mobile application. The designed system also utilizes Node-Red development tools as the platform to integrate all components of the system, MQTT as the communication protocol for data acquisition and ThingSpeak as the middleware. The proposed system can be implemented over the internet using any computer and mobile devices, at anywhere and anytime. The system can automatically stream live video viewed from the Android mobile application and the Raspberry Pi device can send an alert notification to users via email and SMS. The system can be one possible features in smart home system and is considered as an affordable solution, customizable and easy to implement in comparison with other commercial surveillance system products such as CCTV or IP Camera
Intellectual Bank Locker Security SystemIJERA Editor
In today's modern world, security plays an important role. Every person has precious accessories like gold,
documents or cash. The main goal of this project is to design and implement a bank locker security system
based on fingerprint and GSM technology. It reduces wastage of time for both banker as well as customer and
provides advanced security. In this system, only authentic persons can recover money or accessories from bank
locker. In this system the user’s name, fingerprint and mobile number are enrolled. If the fingerprint matches,
then four digit code will be sent to the authorized person’s mobile through GSM modem and the locker door
will be opened then, otherwise it will be in locked position and gives an alarm when any mismatch occurs. The
sensors will be active during night times to provide security against thefts.
Steganography is the technique of hiding secret data within an ordinary, non-secret, file or
message in order to avoid detection; the secret data is then extracted at its destination. The use of
steganography can be combined with encryption as an extra step for hiding or protecting data. The
word steganographyis derived from the Greek words steganos(hidden or covered) and the Greek root
graph(write).Steganography is dedicated for covert communication. It changes the image in such a way
that only the sender and the intended receiver can detect the message sent through it. Since it is
invisible, the detection of secret data is not simple.
Bluetooth Based Automatic Hotel Service System Using PythonIOSR Journals
Abstract: This paper describes a Bluetooth based automatic hotel service system. This paper describes the
protocol and provides the implementation details. Nowadays hotels are spending lot of money for the
attendance, tracking of the employees and apart from that, there is no fully satisfied service for customers.
Instead of using manual power if we apply Bluetooth technology, then the proposed system will cut off the daily
wages of hotels. We hope that the implementation and protocol details will aid the wireless technology
community in near future.
Index: Bluetooth, Python Technology, Arduino.
Secure Dual-mode Robotic Intrusion Detection System for Remote SurveillanceCSCJournals
Remote video surveillance has become an integral part of premise monitoring in urban society, due to the menace of intruders. There have been various surveillance system implementations, but there is no one that fits all applications. Poor stream rate, security, and propriety issues are the major limitations of these systems. To this extent, a low complexity surveillance system that blends the three factors in a good mix is being presented in this work. A non-propriety, medium-rate MJPEG compression format was employed by the pi-camera to provide a good transmission rate and low storage requirement. The robot controller was linked to the monitoring web page through the Common Gateway Interface (CGI) protocol to provide a dynamic update of the page for real-time monitoring and analysis. The robotic movement of the system was achieved using two dc motors and a caster arranged as a differential wheel system. A combination of obstacle detection and avoidance system makes autonomous robot movement possible. The system test results show good robot navigation with obstacle avoidance and low-latency video streaming. The implemented secure shell protocol ensures secure video transmission.
Our future battle field system will have more difficulties to maintain security, because of increasing military competitive. Ability to understand, predict and adopt the vast array of inter-networked things is very difficult. Unwanted fire, unauthorized human intervention and other object movement will play major important role for affecting military environment. This project aims to help our future military environment by introducing new technology LoRaWAN in IoT (Internet of Things). LoRaWAN (Long Range Wide Area Network) is a state -of- art commercial of the self (COTS) technology. This project consist of sensors, embedded microcontrollers equipped with LoRaWAN, embedded processors equipped with LoRaWAN and cloud technology. By introducing this new technology in our future military environment we can easily find out criminal activities and fire hazards.
A Modern Technique for Unauthorized Human Detection and Intimationijtsrd
"Technological advancements are inevitable and the field of IoT is no exception. The utilization of the technologies in various sectors is highly employed. Even though we use technology in various sectors, the employment of technology for security purposes is very low. The Existing security in various places only CCTV is used for monitoring and recording. Even there are existing security systems where an alert is sent via an email which requires a stable internet connection. It is unlikely that we expect the user to be always connected to an internet source. In the Proposed system, authorized users faces will be trained and stored in a Database. Initially, when an unknown known person enters in the zone the camera module will capture the intruders face. The captured intruder's face will be compared with the trained faces in the database. If the person's face doesn't match, the micro controller will send an alert SMS to the recognized user and also the intruder's captured image will be E mailed to the user. The authorized user should acknowledge the SMS message. If he fails to acknowledge the message within a threshold time limit, an alert call will be made to the concerned user. By this the user gets intimated in real time. Keerthanna G. S | Praveen Kumar P | Vishnu Prasad K | Ms. S. Sri Heera ""A Modern Technique for Unauthorized Human Detection and Intimation"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21659.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/21659/a-modern-technique-for-unauthorized-human-detection-and-intimation/keerthanna-g-s"
Intellectual Bank Locker Security SystemIJERA Editor
In today's modern world, security plays an important role. Every person has precious accessories like gold,
documents or cash. The main goal of this project is to design and implement a bank locker security system
based on fingerprint and GSM technology. It reduces wastage of time for both banker as well as customer and
provides advanced security. In this system, only authentic persons can recover money or accessories from bank
locker. In this system the user’s name, fingerprint and mobile number are enrolled. If the fingerprint matches,
then four digit code will be sent to the authorized person’s mobile through GSM modem and the locker door
will be opened then, otherwise it will be in locked position and gives an alarm when any mismatch occurs. The
sensors will be active during night times to provide security against thefts.
Steganography is the technique of hiding secret data within an ordinary, non-secret, file or
message in order to avoid detection; the secret data is then extracted at its destination. The use of
steganography can be combined with encryption as an extra step for hiding or protecting data. The
word steganographyis derived from the Greek words steganos(hidden or covered) and the Greek root
graph(write).Steganography is dedicated for covert communication. It changes the image in such a way
that only the sender and the intended receiver can detect the message sent through it. Since it is
invisible, the detection of secret data is not simple.
Bluetooth Based Automatic Hotel Service System Using PythonIOSR Journals
Abstract: This paper describes a Bluetooth based automatic hotel service system. This paper describes the
protocol and provides the implementation details. Nowadays hotels are spending lot of money for the
attendance, tracking of the employees and apart from that, there is no fully satisfied service for customers.
Instead of using manual power if we apply Bluetooth technology, then the proposed system will cut off the daily
wages of hotels. We hope that the implementation and protocol details will aid the wireless technology
community in near future.
Index: Bluetooth, Python Technology, Arduino.
Secure Dual-mode Robotic Intrusion Detection System for Remote SurveillanceCSCJournals
Remote video surveillance has become an integral part of premise monitoring in urban society, due to the menace of intruders. There have been various surveillance system implementations, but there is no one that fits all applications. Poor stream rate, security, and propriety issues are the major limitations of these systems. To this extent, a low complexity surveillance system that blends the three factors in a good mix is being presented in this work. A non-propriety, medium-rate MJPEG compression format was employed by the pi-camera to provide a good transmission rate and low storage requirement. The robot controller was linked to the monitoring web page through the Common Gateway Interface (CGI) protocol to provide a dynamic update of the page for real-time monitoring and analysis. The robotic movement of the system was achieved using two dc motors and a caster arranged as a differential wheel system. A combination of obstacle detection and avoidance system makes autonomous robot movement possible. The system test results show good robot navigation with obstacle avoidance and low-latency video streaming. The implemented secure shell protocol ensures secure video transmission.
Our future battle field system will have more difficulties to maintain security, because of increasing military competitive. Ability to understand, predict and adopt the vast array of inter-networked things is very difficult. Unwanted fire, unauthorized human intervention and other object movement will play major important role for affecting military environment. This project aims to help our future military environment by introducing new technology LoRaWAN in IoT (Internet of Things). LoRaWAN (Long Range Wide Area Network) is a state -of- art commercial of the self (COTS) technology. This project consist of sensors, embedded microcontrollers equipped with LoRaWAN, embedded processors equipped with LoRaWAN and cloud technology. By introducing this new technology in our future military environment we can easily find out criminal activities and fire hazards.
A Modern Technique for Unauthorized Human Detection and Intimationijtsrd
"Technological advancements are inevitable and the field of IoT is no exception. The utilization of the technologies in various sectors is highly employed. Even though we use technology in various sectors, the employment of technology for security purposes is very low. The Existing security in various places only CCTV is used for monitoring and recording. Even there are existing security systems where an alert is sent via an email which requires a stable internet connection. It is unlikely that we expect the user to be always connected to an internet source. In the Proposed system, authorized users faces will be trained and stored in a Database. Initially, when an unknown known person enters in the zone the camera module will capture the intruders face. The captured intruder's face will be compared with the trained faces in the database. If the person's face doesn't match, the micro controller will send an alert SMS to the recognized user and also the intruder's captured image will be E mailed to the user. The authorized user should acknowledge the SMS message. If he fails to acknowledge the message within a threshold time limit, an alert call will be made to the concerned user. By this the user gets intimated in real time. Keerthanna G. S | Praveen Kumar P | Vishnu Prasad K | Ms. S. Sri Heera ""A Modern Technique for Unauthorized Human Detection and Intimation"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21659.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/21659/a-modern-technique-for-unauthorized-human-detection-and-intimation/keerthanna-g-s"
Design and implement a smart system to detect intruders and firing using IoT IJECEIAES
The security system is essential for occupants' convenience and protection from intruders and fire. Theft and fire are the most important requirement for the security system. The advancement of wireless sensor networks using IoTs increased the features in a security system and play an important role in daily life. In this paper, the proposed system is divided into two units. The first one about security which use to take snapshots by a camera whenever there is fire or intruders in the security zone and mail it to the owner every three seconds by using Arduino configured with MATLAB program. MATLAB program plays the main role to coordinate between sensors and to turn on/off the cameras. The second unit is about controlling the appliances and also the main door by using AVR microcontroller configured by CVAVR software that connected with Bluetooth sensor and controlled by a smartphone by using the implementation software built-up in the smartphone. To arrival of the control unit, the user should send code from the software implementation to the framework that use to turn on/off the devices or open/close the door. This proposed system is designed and implemented in details in this paper.
In Today life The Security is the most common challenging issue in the world and with such advancements happening, the security of most is the home security. Many of technology come in market For Security. In the Modern world advances in electronics and communications technologies have led to the miniaturization and improvement of the performance of computers and networking. These changes have given rise to the development of several home automation technologies and system. Surveillance can be defined as monitoring of the behaviour, other changing information,activities,observing or analysing particular area for the purpose of directing, influencing,managing or protecting. A home security system should provide safety and security features for a home by alarming the residents from natural,accidental and/or human dangers such as:flooding,fire,theft,animals invading etc. To design a software application for intrusion detection system to identify malicious activities using cloud technology.
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE cscpconf
Ubiquitous computing allows more efficient exploitation of information systems, economizes
user cost and effort to use the information system. The network technical room monitoring
problem, arising from network management practice, is important to operate the network, to
discover and resolve unpredictable situation. In addition, many of monitoring and sensor
product are shipped with closed proprietary software, and the interoperability between them is
very difficult. In this article, the author present several ubiquitous computing technologies,
propose a model of ubiquitous monitoring system for network technical room. This model
allows monitoring the network technical room remotely, via variable terminal devices and
variable communication infrastructure. The model has been implemented in Hanoi University of
Science and Technology (HUST) Network Information Centre with IP Cameras and RFID
devices.
Energy Management with Disaster Intimation and Control using IoTIJEACS
In the area of digitization and automation, the life of
human being is getting simpler as almost everything is
automated. Nowadays humans have made internet an integral
part of their everyday life without which they are helpless.
Internet of things (IoT) gives a platform which allows different
devices to inter-connect, sense and control the things remotely
across a network infrastructure without any limitation to the
coverage area. In our proposed work, we stress on Wireless-
Home-Automation-System (WHAS) using IoT, it is a system uses
computers or smart phone to control basic home functions and
features automatically through internet from anywhere around
the world, an automated home is sometimes called a smart home.
The proposed system is able to monitor the entire things
connected to the internet and also to be maintaining the status of
individual devices for further action. We have built the home
automation with several devices and sensors, here sensor help to
monitor the device status and intimate the authorized person to
take particular action.
Wireless Multimedia Sensor Network: A Survey on Multimedia Sensorsidescitation
Recently due to progress in Complementary Metal
Oxide Semiconductor (CM OS) technology, Wireless
Multimedia Sensor Networks (WMSNs) become focus of
research in a broader range of applications. In this survey
paper different WMSNs applications, research & design
challenges are outlined. In addition to this, different available
commercial multimedia sensors are discussed in detail and
compared. Also other then commercial available multimedia
sensors, some experimental multimedia sensor prototypes are
discussed. In addition to this different experimental deployed
test beds for WMSNs are outlined. Also few Wireless Sensor
Networks (WSNs) simulators and emulators are reviewed.
Depending upon the requirement a few physical multimedia
sensors can be integrated or embedded within available
simulators to observe more accurate results or to visualize in
a better way.
Smart surveillance systems play an important role in security today. The goal of security systems is to protect users against fires, car accidents, and
other forms of violence. The primary function of these systems is to offer security in residential areas. In today’s culture, protecting our homes is
critical. Surveillance, which ranges from private houses to large corporations, is critical in making us feel safe. There are numerous machine learning algorithms for home security systems; however, the deep learning convolutional neural network (CNN) technique outperforms the others. The
Keras, Tensorflow, Cv2, Glob, Imutils, and PIL libraries are used to train and assess the detection method. A web application is used to provide a
user-friendly environment. The flask web framework is used to construct it. The flash-mail, requests, and telegram application programming interface (API) apps are used in the alerting approach. The surveillance system tracks
abnormal activities and uses machine learning to determine if the scenario is normal or not based on the acquired image. After capturing the image, it is
compared with the existing dataset, and the model is trained using normal events. When there is an anomalous event, the model produces an output from which the mean distance for each frame is calculated.
Smart home system is very popular in current days that give many kind of application that make all simple and easy to control. In modern day, home machines are using wireless equipment and can be retrieved by internet that will make populations life easier and organized. It based Home Computerization System is designed to assist the people with physical debilities and elderly to provide support as well as to control the electrical usages and monitor the room infection using mobile application. The design is using surrounded controller board and the home appliances are physically associated to output ports of this board via relays. The Home Automation is a wireless home computerization system that is supposed to be executed in existing home environments, without any variations in the infrastructure. Arun Kumar. N | Sathiyabama. T "Smart Security System (IOT)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29337.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/29337/smart-security-system-iot/arun-kumar-n
The effect of functionalized carbon nanotubes on thermalmechanical performanc...IJRTEMJOURNAL
The new approaches for preparing nanocomposite coating by modificated carbon nanonotubes
(CNTs) and epoxy resin was done in the study. thermal-mechanical performance of nanocomposite coating was
investigated and the results were reported in this paper. The physic-chemical techniques such as Differential
scanning calorimetry (DSC) and Thermal gravimetric analysis (TGA) were used to characterize the thermal
performance of Epoxy nanocomposite coating. The test techniques for mechanical properties of paint coating as
adhesion, hardness, impact resistance and bending strength were employed in the work. The results indicated
that CNTs were dispersed in epoxy coating with only ratio of 0.1 wt% enhanced the Glass Transition
Temperature (Tg), decomposition temperature of epoxy coating and improved mechanical properties
significantly. Also functionalized CNTs can be reinforced thermal-mechanical of the epoxy coating better than
neat CNTs.
Study of desalination processes of seawater from the desalination plant of La...IJRTEMJOURNAL
The use of water for food purposes requires excellent physicochemical quality. To contribute to
the control of water quality. Water treated by reverse osmosis is aggressive and demineralize can not be used
directly as a source of drinking water. The objective of this work is to study, physics-chemical analyzes of raw
water, pretreated osmosis and treated (permeate) and produced water (reservoir) at the desalination plant of
seawater Laayoune (SDL), located in southern Morocco. For this, we have followed several qualitative
parameters such as pH, conductivity, turbidity
Multi products storage using randomnessIJRTEMJOURNAL
The following Project shows the benefits of a research established into a multi-products
warehouse belongs to an automotive industry supplier. The main goal was applied a tool recognizing the rules
for distribution and material storage. Once the research was completed, the benefits were, the idle times
reduction per hours/week by the two initial processes. The politics for storage assignment and location, propose
a system to improve the space into this areain order to avoid material management and flow issues. It is
important to mention, the system proposed could be applied into warehouses with storage size and space
restricted by sorting area, also different material types, production settings and physical specifications for
which set warehouses with traditional management of distribution without slack, involves lack of materials,
pieces without records, incorrect location assigned, stock error.
Existence results for fractional q-differential equations with integral and m...IJRTEMJOURNAL
This paper concerns a new kind of fractional q-differential equation of arbitrary order by
combining a multi-point boundary condition with an integral boundary condition. By solving the equation which
is equivalent to the problem we are going to investigate, the Green’s functions are obtained. By defining a
continuous operator on a Banach space and taking advantage of the cone theory and some fixed-point theorems,
the existence of multiple positive solutions for the BVPs is proved based on some properties of Green’s functions
and under the circumstance that the continuous functions f satisfy certain hypothesis. Finally, examples are
provided to illustrate the results.
A study on financial aspect of supply chain managementIJRTEMJOURNAL
The more common approaches used in the SCM consider only the physical logistic operations
and ignore the financial aspects of the supply chain. The main objective to incorporate financial aspects in
supply chain management is to strengthen managerial decisions concerning financial flows in supply chains,
while empirical knowledge about financial supply chain management (FSCM) is in its early stages. This paper
presents a model for FSCM which financial planning in addition to operation planning is decided in it. The
main contribution of this paper is to define two approaches for Financial Supply Chain Management and to
compare them. This financial approaches are: Traditional financial approach and new financial approach.
Traditional financial approach integrates physical goods flows and financial flows. New financial approach
considers in making decisions other financial indicators such as market to book value, liquidity ratios, capital
structure ratios, and return on equity, sales margin, turnover ratios and stock security ratios, among others.
Moreover, the new approach applies the change in equity instead of the traditional approach measures of profit
as the objective function to be maximized in the presented model. To show the attributes of the presented
approaches, the results of the new approach and the traditional approach is compared. The findings indicate
that the traditional approach leads to lower change in equity compared to the financial approach. Also, the
results clearly reveal the better improvement of using the new approach over the traditional approach, and
convince the decision makers to take advantage of the new approach.
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...IJRTEMJOURNAL
Food security is the foremost need of every human society. It is a fundamental right and
government responsibility but still food insecurity is prevalent in rural areas of least developed nations. To cope
with food insecurity, undertaking diverse income generating activities is common as well as key strategy adopted
by rural people. The objective of this study is to assess rural livelihood and food security status of a remote island
named Srilanka Tapu of Sunsari district. A random sampling technique was used to collect primary data from 40
rural household heads using semi-structured questionnaire. Descriptive methods were used for analyzing. The
findings revealed that the food security situation of the Tapu is insecure. Most basic infrastructures and social
services needed for people livelihood such as road, electricity sufficient food availability, education, healthcare,
sanitation, etc. were found to be extremely poor. Most of the households are small scale farmers involving
themselves in diverse livelihood activities which are mostly temporary, low-skilled and low paying. However,
people are fulfilling their food needs at every cost but are highly vulnerable to food insecurity. Also, their lives
security is equally vulnerable because of disastrous Koshi River flooding which occurs every year in the Tapu.
The findings therefore critically suggest that food security of remote and vulnerable human settlements should be
at top priority in policy formulation and implementation level. The study also recommends a need for an in-depth
research for making evidence based policy interventions for improvement of diversify rural livelihood along with
sustainable environment
With mounting concerns over the state of our planet, there is continuing demand that chemists
and chemical engineers should develop greener chemical processes and products. In the 1990s, with the
growing awareness of the hazardous impacts of the chemical industry, the green chemistry revolution was
launched by American chemists Paul T. Anastas and John Warner. Green chemistry is the kind of chemistry that
seeks to minimize pollution, conserve energy, and promote environmentally friendly production. This paper
provides a brief introduction to green chemistry.
Assessment of Building Failure: The Case of Saint Thomas’s Anglican Church, A...IJRTEMJOURNAL
There have been incessant reports of the collapse of buildings resulting in the loss of lives and
properties globally. However, there has been a dearth of information regarding any findings about the collapse
of building structures. An extensive study of causes of selected building collapse in Nigeria and abroad is carried
out in this work by visiting some locations of building collapse, reading journals and newspaper articles on
structural defects and testing rubbles collected from collapsed areas. This study therefore examined the general
causes of the collapse of some buildings particularly the reasons for the collapse of Saint Thomas’s 2-storey
Church Hall, Akure. Laboratory testing was carried out in this study to investigate the causes of collapse using
samples from the site of the collapsed building. An appraisal of the structural drawings of the collapsed building
was also investigated. Findings revealed that the building collapsed due to poor design, bad construction
materials and inadequate supervision. The paper concludes that buildings collapse can be reduced in Nigeria by
avoiding all. It recommended use of only duly registered professionals in the building industry for construction.
Data warehousing is a technique for collecting and managing data from multiple internal and
external sources to provide meaningful business insights. Data warehouses are designed to give a long-range
view of data over time and provide a decision support system environment. They are a vital component of
business intelligence, which is designed for data analysis and reporting. They are used to provide greater
insight into the performance of a business. This paper provides a brief introduction on data warehousing
Resource recycling and waste-to-energy: The cornerstones of circular economyIJRTEMJOURNAL
"Circular Economy" is the pursued goal of sustainable development of mankind for the 21st
century. In short, the fundamental spirit of circular economy is the concept of "Zero Waste". The example used
in our daily lives means 100% of waste treatment, leaving no trace. At this time, it would be an ideal goal that
the waste could be fully recovered into available raw materials or energies. In particular, "waste-to-energy" is
a key factor, because all the wastes are almost related to energy. Resource recycling of waste metal from the
household garbage is the best example. When smelting metals, the refining industry needs to reduce the metal
oxides (mineral materials) to metals, such as steel, aluminium, copper, etc. The reduction processes consume
considerable portion of energy for the entire smelting process, for example, 70.6% for steel and 77.4% for
aluminium. However, if the waste metallic products can be fully recovered, as long as by melting and reshaping,
the original oxide metal reduction processes that consume a lot of energy can be avoided. On the other hand,
when the general garbage cannot be recovered as a resource, they can be converted into fuel or electricity by
biological or thermal treatment. Another more important human waste utilization is the waste paper recycling.
The production of one tonne of raw pulp emits about 6 tonnes of carbon, consuming about 100 cubic meters of
water, using about 200 kilograms of chemical raw materials, and draining 300 tonnes of toxic waste water. The
entire papermaking process is how terrible environmental pollution! The recycled pulp of one tonne can save
energy 10-13GJ.The proportion of paper waste in Taiwan 2015 is 34.69% and the estimated amount is 2.5
million tonnes. If the paper waste could be fully recycled, it could save energy about 0.725 million kloe (kilolitre oil equivalent). In other words, it virtually reduces Taiwan's oil imports of 4.56 million barrels and CO2
emissions of 2.5 million tonnes annually.
Survivin Immunoreactivity in the Gastric Mucosa of Rats Feedind with Carpet S...IJRTEMJOURNAL
Survivin has been studied many times because of its overexpression in several types of cancer
including lung, kidney, skin, endometrium, stomach, colon, breast, prostate, over, hematologic, head and neck
cancers, histopathology features and polymorphisms in the promoter region which belongs to the inhibitör of
apoptosis gene family by researchers. There is no study of survivin immunoreactivity in the gastric mucosa of the
rats fed with carpet shell clam grown in the Dardanelles. In this study, it was aimed to investigate the effects of
carpet shell clam fed rats on survivin production in the gastric mucosa. The carpet shell clam given as food to the
rats were removed from the Dardanelles Çardak region. Four groups of rats are included in the study, group 1
(n=6), control group fed with standard rat food, group 2 (n=6), 75% carpet shell clam and 25% standard rat
food daily, group 3 (n=6), 75% carpet shell clam and 25% standard rat food every two days, group 4 (n=6), 75%
carpet shell clam and 25% standard rat food every three days. To detect survivin localization in the tissues, the
LAB-SA Detection System was used. Survivin immunoreactivity was detected of epithelial cells in the gastric
mucosa of rats fed with carpet shell clam. After the immunohistochemical staining processing all gastric tissue
samples are evaluated in terms of survivin immunoreactivity with light microscopy and image analysis software.
Survivin immunoreactivity was detected 0% in the first group, 83.33% in the second group, 61.83% in the third
group and 32.67% in the fourth group. There was statistically significant difference between the survivin
immunoreactivity in the gastric gland cells of the rats in the experimental and control groups (p> 0.05). Survivin
production in the gastric mucosa of rats suggests that consumption of carpet shell clam may cause tissue damage.
Security and Crime Management in University Libraries in NigeriaIJRTEMJOURNAL
Security and prevention of crime in university library is very paramount duties of librarian. The
survival of a library depends to a large extend on how secured its collections are, security of library resources
constitutes serious challenge facing university libraries in Nigeria. The paper, therefore, investigates security and
crime management in university libraries in Nigeria using university of Jos and university of Ilorin libraries. The
study adopted a descriptive survey method. The population of the study comprised 108 library personnel and
16,012 registered library users in two university libraries. While the sample size consisted of all the 108 library
personnel, and 2% of the registered users to make a total of 428 respondents. Questionnaire and interview with
the university librarians of the selected university libraries were the instruments used for data collection. Data
were analysed using frequency distribution and percentages. Results revealed that security breaches included
stealing/theft of library materials, mutilation of library materials, and non-return of borrowed items. It also
showed inadequate funding, selfish interest of the culprits and lack of institutional security policy in the library.
Base on the findings, that staff security training, electronic security system should be introduced and improve
funding of university libraries among others. Recommendation orientation of users and staff should be done from
time to time in university libraries to mention but few.
Influence of heat treatment on Vitamin C Levels in Oyster MushroomIJRTEMJOURNAL
The study was conducted to investigate the influence of heat treatment during drying process of
Oyster mushroom in the tropics. Mushroom growing is carried out under carefully controlled conditions mostly
in bulk in specific designed tunnels with aerated floors. There are two main purposes, firstly pasteurization; to
free the compost from undesirable microbes and pests and secondly conditioning; to become mushroom specific
by getting clear of ammonia and free of readily available carbohydrates. Through proper manipulation of
temperature and ventilation these two primary objectives are accomplished. Mushrooms have been identified as
an underutilized crop in Africa, with many nutritive and health benefits. It does not require much land and
investment. However, it is highly perishable and there is need to process it to lengthen its shelf life by drying.
However, there is need to ensure that the nutrients are not lost in the process. It is for this reason that this
project investigated the effect of drying on nutrient levels in mushroom. Vitamin C levels were monitored in the
course of drying at 80⁰C, 60⁰C, 50⁰C, 40⁰C and in direct sunlight. It was concluded that the temperature that
gave the best drying rate with minimal nutrient loss was 60⁰C. In general, more than half the Vitamin C is lost
during the range of drying temperatures investigated.
Optimization of Design Parameters for Crane Hook Using Finite Element AnalysisIJRTEMJOURNAL
The Crane hooks are very at risk segments that are regularly utilized for mechanical purposes.
In this way such segments in an industry must be produced and composed in an approach to convey most extreme
execution without failure. Failure of a crane hook essentially relies upon three central point i.e. measurement,
material, overload. The undertaking is worried towards expanding the safe load by fluctuating the cross-sectional
measurements of the four distinct segments and diverse materials. The chose areas are square, circle, and
trapezoidal. The territory stays consistent while changing the measurements of the four unique segments. The
crane hook is demonstrated utilizing catia programming. The pressure and life investigation is finished utilizing
ANSYS 18.1 workbench. The ordinary worry along add up to misshaping, stress and life’s according to the
materials considered. It is discovered that trapezoidal cross segment yields most extreme load of 4000 KG to 5000
KG for steady cross segment zone among four cross segment.
Macroeconomic stability in the DRC: highlighting the role of exchange rate an...IJRTEMJOURNAL
This study is part of a macroeconomic approach and seeks to identify the role of the rate of
economic growth and the exchange rate in controlling the macroeconomic framework. The approaches adopted
in this paper are part of Keynesian thinking on macroeconomic stability using the macroeconomic stability
index proposed by Burnside and Dollars (2004) and A. Amine (2005). Our results argue that economic growth
is causing macroeconomic stability and that the exchange rate is negatively and significantly accounting for
macroeconomic stability in the Democratic Republic of Congo.
Reserves Estimating Carbon in Forest City District Village Bongohulawa GorontaloIJRTEMJOURNAL
The estimation of Carbon stock and carbon sink in the City Forest of Bongohulawa village,
Regency of Gorontalo (Guided by. The research was aimed to know volume growth of trees planted in the
Village District Bongohulawa Gorontalo, to calculate the volume and content of carbon biomass in the city
forest and green line (left-right path) and average carbon sequestration/tree/species. Research was conducted
in village of Bongohulawa during 4 (fourth) month; started from March until June 2011. The execution of data
collecting [of] was performed within this research area-location through observation and measurement of trees
and forest stand. For green line research area 100% inventory was upllied and for City Forest line plot
sampling was implemented. For city forest sample plots measurement was conducted in 10 sample units (each
unit sampling of 0.25 ha). Tree diameter, tree hight (total and commercial hight) and crown diameter of all tree
species within research line (green line) and research plots (city forest) was measured. Based on the research
data and its calculation, the results show that: Casuarina junghuhiana can store more carbon than other tree
species. From the inventory conducted in 3 km of green line along the road (6 meters width observations) of the
village Bongohulawa, 366 trees (consist of 7 tree species) were measured. Those tree species namely Casuarina
junghuiana 102 trees, sandalwood 46 trees, mango 7 trees, jackfruit 6 trees, Albizia 1 tree, mahogany 202 trees,
headland 2 trees. Crown cover of those tree species is 3032.54 m2
. The result of calculation also indicated that
Casuarina has higher carbon stock than other tree species that is 33.56 tons (equal with 52% of total crbon
stock). Further calculation indicated that during the period of 19 years (since 1992) Casuarina can strocked
carbon average of 1.77 tons/year. The average diameter increment of individual Casuarina tree species is about
1.72 cm/year. Furthermore, for Swietenia magrophilla King, with an average diameter increment of 1.40
cm/year, the leaves of this tree species can absorbed carbon of 18.1233 tons within green line of both sides of
the road. For research plots within City Forest which located in the valey the results of the research show that
the crown cover of 124 trees is about 1,359.67 m2, then carbon absorbtion is about 0.15 ton/tree or about 7.8
kg/tree/year. Within the research area of City Forest (located both in the valey and hill) totally there are 1,353
trees (consist of 13 tree species) and carbon absorption of the canopy is about 25.521 tons. Further calculation
results also indicated that carbon absorption of small trees ( poles) is about 25.521 tons and for sapling is
about 78.163 tons or 39,0815 tons/ha then fionally for mature trees is about 39.813 tons or 15,925 tons/ha.
An Analysis of Tourism Competitiveness Index of Europe and Caucasus: A Study ...IJRTEMJOURNAL
This study aims to find the association-ship between the Regional Rank of the Travel and
Tourism Competitiveness Index and its Indicators in 37 European countries. The cross-sectional data of the 37
European countries are collected from the World Economic Forum report- 2015. The statistical software
package, SPSS v. 20.0 is used to analyze the data. ANOVA (Analysis of Variance), Multi-co-linearity, Multiple
Regression, and Residual Analysis are the tools used to analyze to achieve out the objective of the study. RR:
Regional Rank of the Travel and Tourism Competitiveness Index is used as the dependent variable and TI:
Tourism Services Infrastructure, GP: Ground & Port Infrastructure, BE: Business Environment, PT:
Prioritization of Travel and Tourism, and CR: Cultural resources & business travel are used as the independent
variables. It is found that there is an inverse relationship between the dependent variable and all the
independent variables along with the statistical significance. It is recommended that the governments of the
European countries and the respective agents of these countries should be made aware of learning the findings
of this study to promote their countries which can be victorious in lowering their Regional Rank of the Travel
and Tourism Competitiveness Index.
Translation Errors of Public Signs in English Subtitle: Residents’ Poor Forei...IJRTEMJOURNAL
China is in an Age of Economy Thriving and Technology Advancing. This strike
increasing international visitors. In the foreigners, very few of them are able to communicate in
Chinese, which means that it is significant to provide accurate information to the foreign friends by
their understandable codes. For instance, in a hotel, a foreigner needs to know which way to go for
their daily activities without enquiring at the reception desk. These requirements are served by public
signs, e.g. the location of a canteen. Actually, this service is a challenge of Chinese people’s English
level. In recent years, as a lack of contextually linguistic and cultural knowledge, there are some
errors of translation on public English signs, resulting in some inconvenience to the oversea
travelers. This paper will analyses these problems in root and then advance prospective resolutions.
What are the determinants of the non-reimbursement for SMEs in Central Africa...IJRTEMJOURNAL
This article aims to determine the factors that are the cause of the non-repayment of credits
received from financial institutions by Cameroonian SMEs. This choice is sometimes. This non-repayment is
often caused by factors related to the environment and the functioning of SMEs. It aims to analyze and highlight
the factors that put Cameroonian SMEs in a situation of inability to repay the receivables received from
financial institutions. To achieve this goal, we opted for a mixed approach: Inductive (exploration on the
ground) and hypothetico deductive. To do this, we first analyzed the content of the interviews conducted with 15
SME managers and owners and tested data collected from a questionnaire administered face-to-face with 185
Cameroonian SMEs. . We used descriptive analysis and explanatory analysis. Our results show that the tax rate,
the mismanagement of managers, poor accounting and unforeseen situations have a significant positive
influence on the non-repayment of loans, while the age and size of SMEs exert significant negative influence on
the non-repayment of loans by Cameroonian SMEs.
Multivariate regression methods with infrared spectroscopy to detect the fals...IJRTEMJOURNAL
Recently, food safety and guaranteed of food marks have become more important subjects of
foodstuff production and the marketing of processed foods. This paper demonstrates the ability of Mid Infrared
spectroscopy coupled with multivariate regression tools to detect vegetable butter (as adulterant) in a binary
mixture with traditional cow’s butter. Blends of traditional cow’s butter with different percentages of vegetable
butter were measured using Attenuated Total Reflectance-Fourier Transform Mid Infrared Spectroscopy (ATRFTMIR). Spectral and reference data were firstly analyzed by principal component analysis (PCA) to check
outliers samples; and improve the robustness of the prediction models to be established. Multivariate regression
methods as Principal component regression (PCR) and Partial least square regression (PLSR) were used to
establish calibration model. Excellent correlation between ATR-FTMIR analysis and studied butter blends was
obtained R2 = 0.99; with Root Mean Square Errors of Prediction < 3.04, Limit of Detection 9.12% (By PCR)
and 6.06% (by PLSR), and Relative Prediction Errors as low as 3.13.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Design and Implementation of Smart Bell Notification System using IoT
1. Invention Journal of Research Technology in Engineering & Management (IJRTEM)
ISSN: 2455-3689
www.ijrtem.com Volume 2 Issue 5 ǁ May 2018 ǁ PP 61-65
|Volume 2| Issue 5 | www.ijrtem.com | 61 |
Design and Implementation of Smart Bell Notification System
using IoT
Devireddy Pravallika1
, Devireddy Prathyusha2
, Dr. D. Srinivasa Kumar3
1
UG Scholar, Department of CSE, Vasireddy Venkatadri Institute of Technology, Guntur, Andhra Pradesh,
2
PG Scholar, Department of ECE, Vignan’s Nirula Institute of Technology for Women, Guntur, AP
3
Professor, Department of CSE, Hosur Institute of Technology and Science, Hosur, Tamilnadu,
ABSTRACT: Smart phones have become part of our daily life. People using smart phones have increased
rapidly. The proposed paper is to provide a security system that combines the functions of smart phone and home
network system. It enables the users to check the image of the visitor who is present at the door. It also saves all
the images in their drive. We send an alert message to the Owner whenever the doorbell is pressed. Furthermore,
the owner can call to the visitor with the help of our app. We are also providing a link in the SMS sent so that it
redirects the user to the app.
KEYWORDS: Door Bell, Home Network, Internet of Things, Owner, Visitor
I. INTRODUCTION
The goal of this paper is to design and implement a security system by integrating smart phone and home network
service. When the visitor presses the doorbell, the device captures an image through the camera and sends that
image of the visitor to the user. Our system provides a convenient userinterface for the user to view the image and
can take appropriate action immediately. This is implemented by interlocking with the real time SMS server that
send an alert message to the owner when the doorbell is pressed. The Internet of Things (IoT) is the system of
physical articles, gadgets, vehicles, structures and different things which are installed with hardware,
programming, sensors, and system availability, which empowers these items to gather and trade data. The Internet
of Things (IoT) enables items to be detected and controlled remotely crosswise over existing system framework,
making open doors for more straightforward incorporation between the physical world and PC based frameworks,
and bringing about enhanced effectiveness, exactness and financial advantage; when IoT is enlarged with sensors
and actuators, the innovation turns into an example of the more broad class of digital physical frameworks, which
additionally envelops advancements, for example, brilliant networks, shrewd homes, insightful transportation and
keen urban areas. Everything is exceptionally identifiable through its inserted processing framework yet can
interoperate inside the current Internet foundation. Specialists appraise that the IoT will comprise of right around
50 billion protests by 2020. Microcontrollers as the name proposes are little controllers. They resemble single
chip PCs that are regularly installed into different frameworks to work as preparing/controlling unit. For instance,
the remote control is utilizing most likely has microcontrollers inside that do interpreting and other controlling
capacities. Cloud computing is a data innovation (IT) worldview that empowers pervasive access to shared pools
of configurable framework assets and larger amount benefits that can be quickly provisioned with negligible
administration exertion, frequently finished the Internet. Distributed computing depends on sharing of assets to
accomplish cognizance and economies of scale, like an open utility.
II. ARCHITECTURE
A framework engineering or frameworks design is the applied model that characterizes the structure, conduct, and
more perspectives of a system. A design is a formal depiction and portrayal of a framework, composed in a way
that backings thinking about the structures and practices of the framework.
.
Fig 1) Architecture Diagram
2. Design and Implementation of Smart Bell…
|Volume 2| Issue 5 | www.ijrtem.com | 62 |
Framework engineering passes on the enlightening substance of the components including a framework, the
connections among those components, and the guidelines administering those connections. The compositional
parts and set of connections between these segments that an engineering depiction may comprise of equipment,
programming, documentation, offices, manual methodology, or parts played by associations or people.
Figure1 represents the overall procedure of our system. Visitor presses the doorbell then the camera captures
image of the visitor and sends to the email registered and also sends an alert message to the owner saying that
someone is waiting for you at the door.
III. HARDWARE
1.Arm-7 controller-3.3v: It is the IoT platform used to connect the hardware devices.
2. GSM Modem-5v: It is used to send SMS to the owner.
3. Voltage convertor-16/2: It is used to convert the analog signals into digital signals.
4. Liquid Crystal Display-LCDs are
Accessible to show discretionary pictures
(as in a broadly useful PC show) or settled pictures which can be shown or covered up, for example, preset words,
digits, and 7-fragment shows as in an advanced clock.
Fig.2) Smart Bell
Figure 2 shows the hardware of our project i.e.., all the devices are connected to a IoT platform ARM_7
Microcontroller
Fig.3) Camera
Figure 3. Is a camera that is connected to a system which takes the picture of the visitor standing at the door and
it is connected to the MATLAB where the image processing is done.
3. Design and Implementation of Smart Bell…
|Volume 2| Issue 5 | www.ijrtem.com | 63 |
IV. WORKING
If a visitor presses the doorbell installed at the door of your house, this system takes a picture of the visitor and
sends the image to the owner, and it also sends an alert message to the owner that someone is waiting for you at
the door. This execution is outlined with ARM7TDMI processor. In these distinctive modules, for example,
LPC2148, GSM, GPS, IR combine, 16*2 LCD are utilized. It is executed by utilizing two modules Base station
module and In-Bus module. The In-Bus module comprises of IR match to include the quantity of people the
transport and to discover correct area of transport GPS is utilized and the data can be gotten as a message by
utilizing a GSM module. Networks are the fundamental components of the MATLAB condition. A network is a
two-dimensional exhibit comprising of m lines and n segments. Uncommon cases are segment vectors (n = 1) and
column vectors (m = 1). GSM (Global System for Mobile interchanges) is a cell organize, which implies that cell
phones associate with it via looking for cells in the quick region. GSM systems work in four diverse recurrence
ranges. Most GSM systems work in the 900 MHz or 1800 MHz groups. A few nations in the Americas utilize the
850 MHz and 1900 MHz groups in light of the fact that the 900 and 1800 MHz recurrence groups were at that
point designated. ARM7 is best and generally utilized processor family in implanted framework applications. So
we have chosen to pick ARM7 TDMI based NXP controller LPC2148. Likewise, ARM7 is a harmony amongst
exemplary and new Cortex arrangement. ARM7 is great to get begin with as far as assets accessible on web and
quality documentation gave by NXP. It suits consummately for fledglings to get inside and out thought regarding
equipment and programming usage. LPC2148 is made by NXP Semiconductor (Phillips) and it is preloaded with
numerous in-fabricated highlights and peripherals. This makes it more effective and dependable decision for a top
of the line application designer. I would prefer not to rehash rundown of highlights from User Manual. I ask for
you to hold client manual while perusing these instructional exercises. As we move along, we’ll examine and
utilize all highlights all through this arrangement. Presently how about we observe stick chart of LPC2148.
Fig 4) SMS sent to Owner
The image is processed through the MATLAB. We implemented the system using a C language and the front door
monitoring feature through a WI-FI, web cam and a smart phone. The primary function largely consists of GSM
Module to send the SMS to the owner when the doorbell is pressed.
4. Design and Implementation of Smart Bell…
|Volume 2| Issue 5 | www.ijrtem.com | 64 |
Fig.5) Image sent to the App
We will also store the images in the Google dive of the registered e-mail, so that the owner can check the images
of the visitor if there is no signal at the time the visitor presses the doorbell. We are also providing a link in
message provided which redirects to the app. The images are stored in the drive even though the message is not
received by the owner at that particular time. We are trying to store the images in the drive because many times
the person may not have signals in their mobile phones.
Fig.6) Images stored in Drive
5. Design and Implementation of Smart Bell…
|Volume 2| Issue 5 | www.ijrtem.com | 65 |
V. CONCLUSION
In this paper, we discuss about the elements of Smart phone and home system network. We actualized the
discontinuous notice framework using the current doorbell work. There are a few preferences. For instance, it
permits the visitor to work framework advantageously. Right now, the framework is restricted in that just a single
Web cam gadget can be usable. In the future, voice recognition and face recognition functionalities can be
expanded to fortify the security.
VI. FUTURE ENHANCEMENT
We can upload even a video to our app to check what is happening infront of the door. The alert message can also
be converted to voice message. We can also use cloud instead of using MATLAB and Keil software’s. The image
can be uploaded to a temporary cloud and can be retrieved in to the App from the cloud. This can be done through
the Firebase cloud.
REFERENCES
[1] Park Kwang-ro, "Standard Technology Trend Home Network", Korea Information Technology
Association, vol. 8, 2005.
[2.] Home network technology IT/ information technology magazine, [online] Available: http://i-
bada.blogspot.kr.
[3] http://ieeexplore.ieee.org/ document/ 7890101 /? anchor = references
[4] M. Day, Lotus, j. Rosenberg, H. Sugano, Fujitsu, “A Model for Presence and instant messaging”, article
number: 2778.
[5] Se-Hwan Park and Jong-Kyu Park “Security technology trend of IoTs”, proceedings of the ITFE Summer
Conference. 2016.9.1
[6] Kim Hye Young and Park Hyun Joo, “Internet of Things security and implementation examples”, Korea
Information Processing Society, Volume 22, Issue 2 (2015), pp.33-38.
[7] M. Day, J. Rosenberg Lotus, H. Sugano Fujitsu, "A Model for Presence and instant messaging", pp.
2778.
[8] Kim Hye Young, Park Hyun Joo, "Internet of Things security and implementation examples", Korea
Information Processing Society, vol. 22, no. 2, pp. 33-38, 2015.
[9] Vamsi Krishna Patchava, Hari Babu Kandala, P. Ravi Babu, "A Smart Bell Notification system using
IoT", IEEE International Conference on Smart Sensors and Systems(IC-SSS), 2015.
[10] Chaouchi, Hakima. The Internet of Things. London: Wiley-ISTE, 2010.
[11] Ambika, Baswaraj Gadgey, Veeresh Pujari, Pallavi B V, “ Smart Bell Using IOT” in International Journal
for Research in Applied Science & Engineering Technology Volume 5 Issue VI, June 2017.
[12] Burak Sarp, Tolga Karalar, Huseyin Kusetogullari, “Real Time Smart Door System for Home Security”
in International Journal for Research in Applied Science & Engineering Technology Volume 1, Issue 2,
December - 2015.
[13] Bhalekar Pandurang, Jamgaonkar Dhanesh Prof. Mrs. Shailaja Pede, Ghangale Akshaya Garge Rahul,
“Smart lock: A locking system using Bluetooth technology and camera verification.” in International
Journal of Technical Research and Applications e-ISSN: 2320-
8163, www.ijtra.com Volume 4, Issue 1 (January-February, 2016), PP. 136-139
[14] Deepika M, Hitha shree C V, Inhere, Inchara V N, “Design and Implementation of Smart Doorbell using
IOT” in International Journal of Emerging Research in Management &Technology ISSN: 2278 -9359
(Volume-6, Issue-5)
[15] Preeti Godabole, Akhil Menon, Prashant Singh, Pramit Yadav, “Communication over Internet and GSM
using Smart Doorbell” in International Journal for Scientific Research & Development| Vol. 4, Issue 01,
2016 | ISSN (online): 2321-0613.
[16] Yash Gandhi, Shubham Vasu, Mayur Katale, Keshav Gavhane, Archana Shinde, “ IOT based Home
Automation using Raspberry Pi with Doorbell Security ” in www.ierjournal.org Research paper.
[17] https://towardsdatascience.com/can-a-simple-cnn-work-as-well-as-facial-recognition-for-ifferentiating-
redheads-18596b05fdec.
Devireddy Pravallika, et al. “Design and Implementation of Smart Bell Notification System
Using IoT.” Invention Journal of Research Technology in Engineering & Management
(IJRTEM), vol. 2, no. 5, 22 May 2018, pp. 61–65., www.ijrtem.com.