The objective of this project is to create and implement a security system based on fingerprint recognition and GSM GPRS technology that can be utilized in various settings, such as offices, homes, and banks. The system ensures that only authorized individuals are granted access to secure entry and exit points. Fingerprint recognition and GSM GPRS technology are utilized in this security system, enabling the lock to open only if the individual scanning their fingerprint is authenticated. Furthermore, when a fingerprint is scanned, the system captures an image of the person, which is then sent to a registered email address. Additionally, a message is sent to a registered mobile number using GSM technology. Email access is facilitated by GPRS technology. In the event that an unauthorized individual attempts to scan their fingerprint, a buzzer will sound, alerting the authorities that an unknown person is attempting to gain access. A photograph of the individual is then captured and sent to the registered email address, and a message is sent to the registered mobile number. Biometric technology and the security system offer numerous benefits over traditional systems. This system can generate a log that records the check in and check out times of each user, as well as basic information. Dr. V. P. Patil | Preeti Bhosale | Suraj Mane | Nishant Parsekar | Pranav Sarvankar "Fingerprint Security System using GSM and GPRS" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-2 , April 2023, URL: https://www.ijtsrd.com.com/papers/ijtsrd56188.pdf Paper URL: https://www.ijtsrd.com.com/computer-science/computer-network/56188/fingerprint-security-system-using-gsm-and-gprs/dr-v-p-patil
Wireless Student Attendance System using Fingerprint Sensorijtsrd
Nowadays accurate personal identification is becoming more and more important. Usual means smart cards, passwords… have shown their limits. Currently fingerprint recognition is the most widely used technique for personal identification. The development of an attendance management system using biometrics is proposed. As the manual method of attendance system produced errors and taking lot of time during lecture period, an efficient and organized biometrics system for students attendance is purposed. The electronic system not only used to take attendance for the students, but a database is also mentioned to store all the information which can be manipulated further in future. Optical fingerprint sensor will make adding fingerprint detection and verification super simple.This type of verification is widely used in various aspects of life for different purposes, like in security, police identification, etc. Node MCU is used which provides the wireless communication. It also send the attendance report to PC. In this system, there are two parts, one is transmitter and another is receiver. In transmitter module, there is a Liquid Crystal Display LCD , Arduino UNO, transmitter. In receiver module, Node MCU is mainly used. The resultant message will show on LCD. Yu Maw Win | Saw Aung Nyein Oo ""Wireless Student Attendance System using Fingerprint Sensor"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019,
URL: https://www.ijtsrd.com/papers/ijtsrd25157.pdf
Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/25157/wireless-student-attendance-system-using-fingerprint-sensor/yu-maw-win
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET Journal
This document summarizes a research project that developed a high security system for money carrying vans. The system uses both a password entered on a keypad and fingerprint authentication for security. It contains a microcontroller, fingerprint sensor, LCD display, GSM module, and keypad. If an unauthorized person enters the wrong password, access is denied and an alert message is sent via the GSM module. If the password is correct but the fingerprint does not match, access is again denied and an alert sent. The system is designed to improve security when transporting money in vans compared to using guards alone.
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET Journal
This document proposes a new technique for securing medical IoT devices that collects sensitive patient data. It involves using a Kerberos-like authentication server as a central hub that IoT devices connect to over an intranet, rather than connecting directly to an online database. The IoT devices will encrypt sensor data using Elliptic Curve Digital Signature Algorithm (ECDSA) before sending it to the authentication server. The server will decrypt and validate the digital signature before uploading valid data to the online database. This helps prevent man-in-the-middle and replay attacks while only allowing authorized users access to the medical data and devices based on access privileges.
Intellectual Bank Locker Security SystemIJERA Editor
In today's modern world, security plays an important role. Every person has precious accessories like gold,
documents or cash. The main goal of this project is to design and implement a bank locker security system
based on fingerprint and GSM technology. It reduces wastage of time for both banker as well as customer and
provides advanced security. In this system, only authentic persons can recover money or accessories from bank
locker. In this system the user’s name, fingerprint and mobile number are enrolled. If the fingerprint matches,
then four digit code will be sent to the authorized person’s mobile through GSM modem and the locker door
will be opened then, otherwise it will be in locked position and gives an alarm when any mismatch occurs. The
sensors will be active during night times to provide security against thefts.
Intellectual Bank Locker Security SystemIJERA Editor
In today's modern world, security plays an important role. Every person has precious accessories like gold,
documents or cash. The main goal of this project is to design and implement a bank locker security system
based on fingerprint and GSM technology. It reduces wastage of time for both banker as well as customer and
provides advanced security. In this system, only authentic persons can recover money or accessories from bank
locker. In this system the user’s name, fingerprint and mobile number are enrolled. If the fingerprint matches,
then four digit code will be sent to the authorized person’s mobile through GSM modem and the locker door
will be opened then, otherwise it will be in locked position and gives an alarm when any mismatch occurs. The
sensors will be active during night times to provide security against thefts.
This document describes a smart child safety monitoring system that uses GPS, GSM technology, and an Arduino microcontroller to track a child's location and heartbeat. The system consists of modules to detect location using GPS, measure heartbeat, and allow communication between the child's device and a parent's phone via SMS text. It periodically updates the child's real-time location and heartbeat on an Android application. This allows parents to monitor their child's status and location from a distance using their phone. The goal is to provide reliable monitoring of children's safety through an IoT-based wearable device.
IRJET- RFID Based Security Guard System using GSMIRJET Journal
This document summarizes an RFID-based security guard system that uses GSM technology. It reviews previous research on using RFID tags and readers to uniquely identify and track individuals for security purposes in places like educational campuses and hospitals. A microcontroller is used to store identification details and send alerts via a GSM module if an invalid RFID card is detected. The system aims to automate security and allow faster access for authorized individuals compared to manual checking of ID cards.
IRJET- RFID Based Security Guard System using GSMIRJET Journal
This document summarizes an RFID-based security guard system using GSM technology. It discusses how previous security systems relied too heavily on human guards and were inefficient. The proposed system would use RFID tags and readers to automatically track and identify individuals on a campus or in a building. A GSM module would allow the system to send alerts upon unauthorized access attempts. The document reviews several previous studies on related topics like microcontroller-based security systems, speech recognition-based security, and RFID/GSM campus security systems. It concludes that combining various technologies could lead to more efficient automated security guard systems.
Wireless Student Attendance System using Fingerprint Sensorijtsrd
Nowadays accurate personal identification is becoming more and more important. Usual means smart cards, passwords… have shown their limits. Currently fingerprint recognition is the most widely used technique for personal identification. The development of an attendance management system using biometrics is proposed. As the manual method of attendance system produced errors and taking lot of time during lecture period, an efficient and organized biometrics system for students attendance is purposed. The electronic system not only used to take attendance for the students, but a database is also mentioned to store all the information which can be manipulated further in future. Optical fingerprint sensor will make adding fingerprint detection and verification super simple.This type of verification is widely used in various aspects of life for different purposes, like in security, police identification, etc. Node MCU is used which provides the wireless communication. It also send the attendance report to PC. In this system, there are two parts, one is transmitter and another is receiver. In transmitter module, there is a Liquid Crystal Display LCD , Arduino UNO, transmitter. In receiver module, Node MCU is mainly used. The resultant message will show on LCD. Yu Maw Win | Saw Aung Nyein Oo ""Wireless Student Attendance System using Fingerprint Sensor"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019,
URL: https://www.ijtsrd.com/papers/ijtsrd25157.pdf
Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/25157/wireless-student-attendance-system-using-fingerprint-sensor/yu-maw-win
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET Journal
This document summarizes a research project that developed a high security system for money carrying vans. The system uses both a password entered on a keypad and fingerprint authentication for security. It contains a microcontroller, fingerprint sensor, LCD display, GSM module, and keypad. If an unauthorized person enters the wrong password, access is denied and an alert message is sent via the GSM module. If the password is correct but the fingerprint does not match, access is again denied and an alert sent. The system is designed to improve security when transporting money in vans compared to using guards alone.
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET Journal
This document proposes a new technique for securing medical IoT devices that collects sensitive patient data. It involves using a Kerberos-like authentication server as a central hub that IoT devices connect to over an intranet, rather than connecting directly to an online database. The IoT devices will encrypt sensor data using Elliptic Curve Digital Signature Algorithm (ECDSA) before sending it to the authentication server. The server will decrypt and validate the digital signature before uploading valid data to the online database. This helps prevent man-in-the-middle and replay attacks while only allowing authorized users access to the medical data and devices based on access privileges.
Intellectual Bank Locker Security SystemIJERA Editor
In today's modern world, security plays an important role. Every person has precious accessories like gold,
documents or cash. The main goal of this project is to design and implement a bank locker security system
based on fingerprint and GSM technology. It reduces wastage of time for both banker as well as customer and
provides advanced security. In this system, only authentic persons can recover money or accessories from bank
locker. In this system the user’s name, fingerprint and mobile number are enrolled. If the fingerprint matches,
then four digit code will be sent to the authorized person’s mobile through GSM modem and the locker door
will be opened then, otherwise it will be in locked position and gives an alarm when any mismatch occurs. The
sensors will be active during night times to provide security against thefts.
Intellectual Bank Locker Security SystemIJERA Editor
In today's modern world, security plays an important role. Every person has precious accessories like gold,
documents or cash. The main goal of this project is to design and implement a bank locker security system
based on fingerprint and GSM technology. It reduces wastage of time for both banker as well as customer and
provides advanced security. In this system, only authentic persons can recover money or accessories from bank
locker. In this system the user’s name, fingerprint and mobile number are enrolled. If the fingerprint matches,
then four digit code will be sent to the authorized person’s mobile through GSM modem and the locker door
will be opened then, otherwise it will be in locked position and gives an alarm when any mismatch occurs. The
sensors will be active during night times to provide security against thefts.
This document describes a smart child safety monitoring system that uses GPS, GSM technology, and an Arduino microcontroller to track a child's location and heartbeat. The system consists of modules to detect location using GPS, measure heartbeat, and allow communication between the child's device and a parent's phone via SMS text. It periodically updates the child's real-time location and heartbeat on an Android application. This allows parents to monitor their child's status and location from a distance using their phone. The goal is to provide reliable monitoring of children's safety through an IoT-based wearable device.
IRJET- RFID Based Security Guard System using GSMIRJET Journal
This document summarizes an RFID-based security guard system that uses GSM technology. It reviews previous research on using RFID tags and readers to uniquely identify and track individuals for security purposes in places like educational campuses and hospitals. A microcontroller is used to store identification details and send alerts via a GSM module if an invalid RFID card is detected. The system aims to automate security and allow faster access for authorized individuals compared to manual checking of ID cards.
IRJET- RFID Based Security Guard System using GSMIRJET Journal
This document summarizes an RFID-based security guard system using GSM technology. It discusses how previous security systems relied too heavily on human guards and were inefficient. The proposed system would use RFID tags and readers to automatically track and identify individuals on a campus or in a building. A GSM module would allow the system to send alerts upon unauthorized access attempts. The document reviews several previous studies on related topics like microcontroller-based security systems, speech recognition-based security, and RFID/GSM campus security systems. It concludes that combining various technologies could lead to more efficient automated security guard systems.
Wirelessly based security applications have exploded as a result of modern technology. To build and/or implement security access control systems, many types of wireless communication technologies have been deployed. quick response (QR code) is a contactless technology that is extensively utilised in a variety of sectors, including access control, library book tracking, supply chains, and tollgate systems, among others. This paper combines QR code technology with Arduino and Python to construct an automated QR code-based access management system. After detecting a QR code, the QR scanner at the entry collects and compares the user's unique identifier (UID) with the UID recorded in the system. The results show that this system is capable of granting or denying access to a protected environment in a timely, effective, and reliable way. Security systems can protect physical and intellectual property by preventing unauthorized persons from entering the area. Many door locks, such as mechanical and electrical locks, were created to meet basic security needs but it also helps to create a data files structure of the authorized persons.
The main agenda of this work is to design advanced security with affordable and less complex system referred as “Invisible Eyeâ€. In this modern era, property crimes are more predominant which necessitates developing an advanced security system. In order to overcome predominant and contagious crimes the researchers used the technology in a more efficient way to prevent the theft. This method uses sensors, cameras and AI systems to detect, capture and send information respectively to the cops. Ms. R. Selvapriya | Raghul. D "The Invisible Eye" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21627.pdf
IRJET - IoT based Health Monitoring System and TelemedicineIRJET Journal
This document describes an IoT-based health monitoring system and telemedicine. The system uses wearable sensors to monitor patient vital signs like temperature, blood pressure, and heart rate. The sensor data is sent wirelessly via WiFi module and stored in the cloud. Doctors can access this data to monitor patients remotely. An alert is triggered if a critical condition is detected, sending an SMS via GSM to doctors or relatives. The system uses RSA encryption to securely transmit the sensitive health data over the internet.
Data Security by AES Advanced Encryption StandardYogeshIJTSRD
Now a days with the rapid development of multimedia technologies, research on safety and security are becoming more important. Multimedia data are generated and transmitted through the communication channels and the wireless media. The efficiencies of encryption based on different existing algorithms are not up to the satisfactory limit. Hence researchers are trying to modify the existing algorithm or even develop new algorithms that help to increase security with a little encryption time. Here in this paper, we have furnished a new technology to modify the AES algorithm which gives more security with a little encryption time and which can be used to encrypt using 128 bit key. Theoretical analysis on the proposed algorithm with the existing reveals the novelty of our work. Here we have proposed a technique to randomize the key and hidden the key data into an encrypted digital image using the basics concept of cryptography and also using the concept of digital watermarking, the concept of key hide has also been encrypted. We have also proposed a new technique to reposition the pixels to break the correlation between them. So, the proposed scheme offers a more secure and cost effective mechanism for encryption. Next on the AES criteria list good performance. Widespread market adoption will require reasonably good performance on a variety of platforms, ranging from easy tocrack smart cards to the largest servers. Good algorithm performance includes speed for the encryption and decryption process as well as the key schedule. Prateek Goyal | Ms. Shalini Bhadola | Ms. Kirti Bhatia "Data Security by AES (Advanced Encryption Standard)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45073.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/45073/data-security-by-aes-advanced-encryption-standard/prateek-goyal
IRJET- Review of Fingerprint based Automobile Anti-Theft SystemIRJET Journal
The document proposes a fingerprint-based automobile anti-theft system. The system uses fingerprint recognition and authentication through a fingerprint sensor module to only allow the vehicle owner to unlock and start the car. If the car is stolen, a GSM module will send the car's location via text message to the owner's phone by requesting location data from a GPS module installed in the vehicle. The system aims to increase automobile security through low-cost biometric authentication compared to existing sensors.
IoT based on secure personal healthcare using RFID technology and steganography IJECEIAES
Internet of things (IoT) makes it attainable for connecting different various smart objects together with the internet. The evolutionary medical model towards medicine can be boosted by IoT with involving sensors such as environmental sensors inside the internal environment of a small room with a specific purpose of monitoring of person's health with a kind of assistance which can be remotely controlled. RF identification (RFID) technology is smart enough to provide personal healthcare providing part of the IoT physical layer through low-cost sensors. Recently researchers have shown more IoT applications in the health service department using RFID technology which also increases real-time data collection. IoT platform which is used in the following research is Blynk and RFID technology for the user's better health analyses and security purposes by developing a two-level secured platform to store the acquired data in the database using RFID and Steganography. Steganography technique is used to make the user data more secure than ever. There were certain privacy concerns which are resolved using this technique. Smart healthcare medical box is designed using SolidWorks health measuring sensors that have been used in the prototype to analyze real-time data.
SYSTEM FOR ATTENDANCE TRACKING BASED ON THE INTERNET OF THINGS THAT MAKES USE...IRJET Journal
This document describes a proposed Internet of Things (IoT)-based attendance tracking system that uses fingerprint recognition. The system would use a fingerprint sensor connected to an Arduino board to collect attendance data via fingerprints. The Arduino would send the data via an IoT module to a cloud-based database for secure storage and remote access. A web interface would allow teachers and parents to view attendance records in real-time from any location. The system aims to provide an accurate, convenient and secure way to track attendance digitally while eliminating the need for manual records.
The document describes a proposed system called a Configurable Intelligent Secures - 3FA Smart Lock. The system uses a three-factor authentication model with RFID, PIN, and OTP (one-time password) to provide secure access to a door lock. It uses low-cost hardware like a Raspberry Pi, touchscreen, RFID reader, electric strike, and relay module. The system is designed to be highly secure due to the three-factor authentication and configurable third factor. It also records logs of all access attempts to the lock for security monitoring.
The document discusses security issues related to the growing number of Internet of Things (IoT) devices. It summarizes several papers related to IoT security and proposes solutions. Specifically:
- The large number of interconnected IoT devices from different technologies and networks poses security and privacy risks as they can be hacked more easily.
- Some proposed solutions discussed include consumer security indexes to help consumers identify more secure devices, on-demand security configurations to enable security functions when needed, and information sharing systems to collect and analyze security-related information.
- Other proposals examined are using blockchain technology, intelligent monitoring systems in vehicles, physical unclonable functions for authentication, and remote security management servers to improve IoT device security
This document describes a proposed automatic door lock system using fingerprint authentication and GSM. The system would accurately identify fingerprints to determine if a person is authorized and send an SMS to the owner if an unauthorized person attempts to enter. It includes a block diagram and description of the working procedure which uses an Arduino microcontroller interfaced with a fingerprint module and GSM modem for communication. The system is intended to provide advanced security for applications such as homes, industries, and organizations while being low cost, low power, and compact in size.
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET Journal
This document describes a RFID-based automatic door locking system for home security. The system uses an Arduino nano microcontroller, RFID reader and tags, wireless transmitter and receiver modules, NodeMCU for WiFi connectivity, a 3x4 keypad, and servo motor. The system provides three ways to unlock the door - using a password via keypad, detecting an authorized RFID tag, or using a mobile application. It aims to remotely control the door unlock via a web connection and message passing between the owner and door lock for increased security and convenience.
Security system with RFID control using E-KTP and internet of thingsjournalBEEI
Crimes against property without using violence, in this case, are theft and burglary is the type of crime that is most common every year. However, home security needs a security system that is more efficient and practical. To overcome this, an internet of things (IoT) is needed. This research evaluated the performance prototype by reading distance from the radio frequency identification (RFID) reader using E-KTP and quality of service performance (i.e throughput and delay) from application android. This research design smart door lock using RFID sensor, passive infrared sensor (PIR), solenoid as door locks, buzzer, led, E-KTP as RFID tags and also android application to controlling and monitoring made with android studio is connected to NodeMCU V3 ESP8266 as storage data and connect with firebase realtime database instead of conventional keys. This research focuses on performance prototype and quality of service from features application is work well. Related to previous works, our evaluation shows that the performance prototype can read identity card (E-KTP) with a maximum distance is 4 cm, and performance quality of service for an application show that throughput and delay with a perfect index according to standardization telecommunications and internet protocol harmonization over network (TIPHON) depending on what features are being evaluated.
Third Eye for Blind using Ultrasonic Sensor Vibrator Gloveijtsrd
The primary goal of the project is to enable blind people to use an RF remote to find their gloves. This system gives visually impaired individuals walking exceptional security by incorporating a siren and attaching many sensors. Nowadays, individuals prioritize their safety above all else when they are driving, walking, or otherwise moving around. With the help of this system, we can track a blind persons whereabouts using a mobile device and receive emergency alert messages with their precise location. The technology also provides excellent security and shows them how to walk. The system has sensors for stair detection, soil detection, and obstacle recognition so that it may automatically identify impediments and deliver alerts. Using a soil moisture detector is used to find alerts in line with soil moisture levels. So that people may see the proper path while walking on the floor, stairs, and in many other locations, this approach can be very helpful. When an emergency arises, the system can be connected to a microcontroller and notify the appropriate people. A GPS receiver, a microcontroller, and a GSM modem are the components of this tracking system. This information is processed by the microcontroller and forwarded to the appropriate numbers after processing. Dr. B. Rambabu | S. Navya | M. Sahithi Vyas | A. Dishendra Sekhar "Third Eye for Blind using Ultrasonic Sensor Vibrator Glove" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-1 , February 2023, URL: https://www.ijtsrd.com/papers/ijtsrd53888.pdf Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/53888/third-eye-for-blind-using-ultrasonic-sensor-vibrator-glove/dr-b-rambabu
This project presents a door locking system which suggests two ways for unlocking a door using Internet of Things (IoT) and Fingerprint. Most of the major door lock security systems have several loopholes which could be broken down to gain access to the desired places, and it creates a concern for a secure lifestyle and proper working environment. People can access Internet services by using their cell phone, laptop and various gadgets. Fingerprint is a reliable biometric feature having a wide range of applications that require authentication. Biometric systems such as fingerprint provide tools to enforce reliable logs of system transactions and protect an individual’s right to privacy. In the proposed system, fingerprints of the authorized users are enrolled and verified to provide access to a facility that is used by multiple users. A user can also be removed and a new user can be enrolled in the system. We have implemented a centralized control system from where we can control who can enter in which rooms and who cannot. This is an Arduino Mega device based. Fingerprints are stored dynamically in a database for computing the different statistics.
GPS Monitoring System for Dementia CareIRJET Journal
This document proposes a GPS monitoring system to assist those living with dementia and reduce their dependence on family members. The system uses a GPS module to retrieve location data, an STM32 microcontroller to operate the system, and a GSM module to send location via SMS to a mobile application. The application displays the patient's location on a map and alerts the user if the patient leaves a predefined safe zone, allowing family to monitor the patient remotely while still allowing independent travel. The system aims to make life easier for those with dementia and their families through remote location tracking and alerts.
Smart Door Monitoring and Locking systemIRJET Journal
This document describes a smart door monitoring and locking system using a Raspberry Pi, fingerprint sensor, camera module, and Telegram bot for communication. The system stores fingerprint data of authorized users and compares fingerprints scanned at the door to the database for authentication. If a match is found, the door unlock signal is sent. If not, the camera captures an image of the person, which is sent via Telegram bot to the owner for permission to unlock. This provides secure access control while allowing owners to grant entry remotely. The system aims to provide low-cost home security and automation using accessible hardware and software components like Raspberry Pi, Python libraries, and Telegram API.
IoT Based Automatic Gas, Smoke and Fire Alert Systemijtsrd
The goal of this system is to build an IoT based automatic gas, smoke and fire alert system via Node MCU. We use a Node MCU, sensors, a microcontroller system, and a few more electronic devices in the current endeavor. This endeavor has easy to use gas, smoke and fire detection. When people are outside of industries, residences, or marketplaces, they are not automatically informed about sudden events caused by fire, gas, or smoke. Not even fire departments receive the information instantly. People suffer greatly as a result, and most of the time, fire nearly destroys residences, companies, and marketplaces. However, our system may be able to help by automatically alerting concerned people to the presence of smoke, gas and fire. As a result, people will be able to arrive at the location swiftly and act promptly. For the system to obtain the data from the fire, gas and smoke sensors, a microcontroller needs to be installed to control every device involved in this work. Wi Fi shield functions a way to connect devices with the network. This system uses an Android app to retrieve the sensors data. This experiment analyses the rooms performance in various fire, gas, and smoke conditions as well as burning objects. The researchers found that when smoke concentrations rise above 100 parts per million, people may get fatal heart attacks, coughing fits, and stinging eyes. However, when the smoke content hits 40 parts per million, our system will automatically send out an alert message. With the help of our technology, we hope that individuals will be able to save their lives and property. Md. Abdur Rahim | Md. Sanjidur Rahman | Rafat Ara "IoT Based Automatic Gas, Smoke and Fire Alert System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63446.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/63446/iot-based-automatic-gas-smoke-and-fire-alert-system/md-abdur-rahim
IRJET - Women Safety Device with GPS Tracking and AlertsIRJET Journal
This document proposes a women's safety device using GPS tracking and alerts. The device would consist of a wearable smart band continuously communicating with a smart phone. The phone would have an application programmed to detect human behaviors indicating fear, anxiety, etc. through sensors. When the application detects an emergency signal, it would automatically send a help request with location coordinates to the nearest police station, relatives, and other application users nearby. This would enable emergency help to arrive quickly and accurately to assist victims in dangerous situations. The proposed device aims to provide security for women and allow help to be sent even if an unconscious victim cannot press an emergency button. It discusses the system components, working, and concludes the design could help solve security issues faced by
IRJET- Home Automation using IoT: ReviewIRJET Journal
This document summarizes research on using Internet of Things (IoT) technology for home automation and security. It discusses how IoT allows devices in the home to be controlled remotely through a smartphone app and can automate tasks. The document also reviews different approaches others have taken to implement smart home security systems using sensors and microcontrollers connected to the Internet. It describes the typical architecture of an IoT system including sensor, network, and application layers. Finally, it summarizes several research papers on developing smart home and kitchen monitoring systems using technologies like Arduino, Raspberry Pi, and sensors for functions like detecting fires, gas leaks, and intruders.
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREMichael George
As we are moving in a World of advancement, so the security is the major concern in order to keep data isolate from the unauthorised users to access. In today’s World, we need high degree security system for the protection of our document, important data, as well as memory and jewellery. This review paper presents a secure fingerprint locker which is feasible. This system is proved successful on all norms of security of lockers. There are other methods of verifying authentication through password, RFID but this method is most efficient and reliable. To provide perfect security to the lockers and to make the work easier, this project is taking help of two different technologies, i.e. Embedded System and Biometrics. Biometrics is basically the measurement and use of unique characteristics of living beings to make them distinguish from one another. And this is more reliable then passwords and tokens which can be lost or stolen by the humans. In this paper we are providing the work done on this technique.
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
The manufacturing industries all over the world are facing tough challenges for growth, development and sustainability in today’s competitive environment. They have to achieve apex position by adapting with the global competitive environment by delivering goods and services at low cost, prime quality and better price to increase wealth and consumer satisfaction. Cost Management ensures profit, growth and sustainability of the business with implementation of Continuous Improvement Technique like Six Sigma. This leads to optimize Business performance. The method drives for customer satisfaction, low variation, reduction in waste and cycle time resulting into a competitive advantage over other industries which did not implement it. The main objective of this paper ‘Six Sigma Technique A Journey Through Its Implementation’ is to conceptualize the effectiveness of Six Sigma Technique through the journey of its implementation. Aditi Sunilkumar Ghosalkar "‘Six Sigma Technique’: A Journey Through its Implementation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64546.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64546/‘six-sigma-technique’-a-journey-through-its-implementation/aditi-sunilkumar-ghosalkar
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
Edge computing, a paradigm that involves processing data closer to its source, has gained significant attention for its potential to revolutionize data processing and communication in space missions. With the increasing complexity and data volume generated by modern space missions, traditional centralized computing approaches face challenges related to latency, bandwidth, and security. Edge computing in space, involving on board processing and analysis of data, offers promising solutions to these challenges. This paper explores the concept of edge computing in space, its benefits, applications, and future prospects in enhancing space missions. Manish Verma "Edge Computing in Space: Enhancing Data Processing and Communication for Space Missions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64541.pdf Paper Url: https://www.ijtsrd.com/computer-science/artificial-intelligence/64541/edge-computing-in-space-enhancing-data-processing-and-communication-for-space-missions/manish-verma
More Related Content
Similar to Fingerprint Security System using GSM and GPRS
Wirelessly based security applications have exploded as a result of modern technology. To build and/or implement security access control systems, many types of wireless communication technologies have been deployed. quick response (QR code) is a contactless technology that is extensively utilised in a variety of sectors, including access control, library book tracking, supply chains, and tollgate systems, among others. This paper combines QR code technology with Arduino and Python to construct an automated QR code-based access management system. After detecting a QR code, the QR scanner at the entry collects and compares the user's unique identifier (UID) with the UID recorded in the system. The results show that this system is capable of granting or denying access to a protected environment in a timely, effective, and reliable way. Security systems can protect physical and intellectual property by preventing unauthorized persons from entering the area. Many door locks, such as mechanical and electrical locks, were created to meet basic security needs but it also helps to create a data files structure of the authorized persons.
The main agenda of this work is to design advanced security with affordable and less complex system referred as “Invisible Eyeâ€. In this modern era, property crimes are more predominant which necessitates developing an advanced security system. In order to overcome predominant and contagious crimes the researchers used the technology in a more efficient way to prevent the theft. This method uses sensors, cameras and AI systems to detect, capture and send information respectively to the cops. Ms. R. Selvapriya | Raghul. D "The Invisible Eye" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21627.pdf
IRJET - IoT based Health Monitoring System and TelemedicineIRJET Journal
This document describes an IoT-based health monitoring system and telemedicine. The system uses wearable sensors to monitor patient vital signs like temperature, blood pressure, and heart rate. The sensor data is sent wirelessly via WiFi module and stored in the cloud. Doctors can access this data to monitor patients remotely. An alert is triggered if a critical condition is detected, sending an SMS via GSM to doctors or relatives. The system uses RSA encryption to securely transmit the sensitive health data over the internet.
Data Security by AES Advanced Encryption StandardYogeshIJTSRD
Now a days with the rapid development of multimedia technologies, research on safety and security are becoming more important. Multimedia data are generated and transmitted through the communication channels and the wireless media. The efficiencies of encryption based on different existing algorithms are not up to the satisfactory limit. Hence researchers are trying to modify the existing algorithm or even develop new algorithms that help to increase security with a little encryption time. Here in this paper, we have furnished a new technology to modify the AES algorithm which gives more security with a little encryption time and which can be used to encrypt using 128 bit key. Theoretical analysis on the proposed algorithm with the existing reveals the novelty of our work. Here we have proposed a technique to randomize the key and hidden the key data into an encrypted digital image using the basics concept of cryptography and also using the concept of digital watermarking, the concept of key hide has also been encrypted. We have also proposed a new technique to reposition the pixels to break the correlation between them. So, the proposed scheme offers a more secure and cost effective mechanism for encryption. Next on the AES criteria list good performance. Widespread market adoption will require reasonably good performance on a variety of platforms, ranging from easy tocrack smart cards to the largest servers. Good algorithm performance includes speed for the encryption and decryption process as well as the key schedule. Prateek Goyal | Ms. Shalini Bhadola | Ms. Kirti Bhatia "Data Security by AES (Advanced Encryption Standard)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45073.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/45073/data-security-by-aes-advanced-encryption-standard/prateek-goyal
IRJET- Review of Fingerprint based Automobile Anti-Theft SystemIRJET Journal
The document proposes a fingerprint-based automobile anti-theft system. The system uses fingerprint recognition and authentication through a fingerprint sensor module to only allow the vehicle owner to unlock and start the car. If the car is stolen, a GSM module will send the car's location via text message to the owner's phone by requesting location data from a GPS module installed in the vehicle. The system aims to increase automobile security through low-cost biometric authentication compared to existing sensors.
IoT based on secure personal healthcare using RFID technology and steganography IJECEIAES
Internet of things (IoT) makes it attainable for connecting different various smart objects together with the internet. The evolutionary medical model towards medicine can be boosted by IoT with involving sensors such as environmental sensors inside the internal environment of a small room with a specific purpose of monitoring of person's health with a kind of assistance which can be remotely controlled. RF identification (RFID) technology is smart enough to provide personal healthcare providing part of the IoT physical layer through low-cost sensors. Recently researchers have shown more IoT applications in the health service department using RFID technology which also increases real-time data collection. IoT platform which is used in the following research is Blynk and RFID technology for the user's better health analyses and security purposes by developing a two-level secured platform to store the acquired data in the database using RFID and Steganography. Steganography technique is used to make the user data more secure than ever. There were certain privacy concerns which are resolved using this technique. Smart healthcare medical box is designed using SolidWorks health measuring sensors that have been used in the prototype to analyze real-time data.
SYSTEM FOR ATTENDANCE TRACKING BASED ON THE INTERNET OF THINGS THAT MAKES USE...IRJET Journal
This document describes a proposed Internet of Things (IoT)-based attendance tracking system that uses fingerprint recognition. The system would use a fingerprint sensor connected to an Arduino board to collect attendance data via fingerprints. The Arduino would send the data via an IoT module to a cloud-based database for secure storage and remote access. A web interface would allow teachers and parents to view attendance records in real-time from any location. The system aims to provide an accurate, convenient and secure way to track attendance digitally while eliminating the need for manual records.
The document describes a proposed system called a Configurable Intelligent Secures - 3FA Smart Lock. The system uses a three-factor authentication model with RFID, PIN, and OTP (one-time password) to provide secure access to a door lock. It uses low-cost hardware like a Raspberry Pi, touchscreen, RFID reader, electric strike, and relay module. The system is designed to be highly secure due to the three-factor authentication and configurable third factor. It also records logs of all access attempts to the lock for security monitoring.
The document discusses security issues related to the growing number of Internet of Things (IoT) devices. It summarizes several papers related to IoT security and proposes solutions. Specifically:
- The large number of interconnected IoT devices from different technologies and networks poses security and privacy risks as they can be hacked more easily.
- Some proposed solutions discussed include consumer security indexes to help consumers identify more secure devices, on-demand security configurations to enable security functions when needed, and information sharing systems to collect and analyze security-related information.
- Other proposals examined are using blockchain technology, intelligent monitoring systems in vehicles, physical unclonable functions for authentication, and remote security management servers to improve IoT device security
This document describes a proposed automatic door lock system using fingerprint authentication and GSM. The system would accurately identify fingerprints to determine if a person is authorized and send an SMS to the owner if an unauthorized person attempts to enter. It includes a block diagram and description of the working procedure which uses an Arduino microcontroller interfaced with a fingerprint module and GSM modem for communication. The system is intended to provide advanced security for applications such as homes, industries, and organizations while being low cost, low power, and compact in size.
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET Journal
This document describes a RFID-based automatic door locking system for home security. The system uses an Arduino nano microcontroller, RFID reader and tags, wireless transmitter and receiver modules, NodeMCU for WiFi connectivity, a 3x4 keypad, and servo motor. The system provides three ways to unlock the door - using a password via keypad, detecting an authorized RFID tag, or using a mobile application. It aims to remotely control the door unlock via a web connection and message passing between the owner and door lock for increased security and convenience.
Security system with RFID control using E-KTP and internet of thingsjournalBEEI
Crimes against property without using violence, in this case, are theft and burglary is the type of crime that is most common every year. However, home security needs a security system that is more efficient and practical. To overcome this, an internet of things (IoT) is needed. This research evaluated the performance prototype by reading distance from the radio frequency identification (RFID) reader using E-KTP and quality of service performance (i.e throughput and delay) from application android. This research design smart door lock using RFID sensor, passive infrared sensor (PIR), solenoid as door locks, buzzer, led, E-KTP as RFID tags and also android application to controlling and monitoring made with android studio is connected to NodeMCU V3 ESP8266 as storage data and connect with firebase realtime database instead of conventional keys. This research focuses on performance prototype and quality of service from features application is work well. Related to previous works, our evaluation shows that the performance prototype can read identity card (E-KTP) with a maximum distance is 4 cm, and performance quality of service for an application show that throughput and delay with a perfect index according to standardization telecommunications and internet protocol harmonization over network (TIPHON) depending on what features are being evaluated.
Third Eye for Blind using Ultrasonic Sensor Vibrator Gloveijtsrd
The primary goal of the project is to enable blind people to use an RF remote to find their gloves. This system gives visually impaired individuals walking exceptional security by incorporating a siren and attaching many sensors. Nowadays, individuals prioritize their safety above all else when they are driving, walking, or otherwise moving around. With the help of this system, we can track a blind persons whereabouts using a mobile device and receive emergency alert messages with their precise location. The technology also provides excellent security and shows them how to walk. The system has sensors for stair detection, soil detection, and obstacle recognition so that it may automatically identify impediments and deliver alerts. Using a soil moisture detector is used to find alerts in line with soil moisture levels. So that people may see the proper path while walking on the floor, stairs, and in many other locations, this approach can be very helpful. When an emergency arises, the system can be connected to a microcontroller and notify the appropriate people. A GPS receiver, a microcontroller, and a GSM modem are the components of this tracking system. This information is processed by the microcontroller and forwarded to the appropriate numbers after processing. Dr. B. Rambabu | S. Navya | M. Sahithi Vyas | A. Dishendra Sekhar "Third Eye for Blind using Ultrasonic Sensor Vibrator Glove" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-1 , February 2023, URL: https://www.ijtsrd.com/papers/ijtsrd53888.pdf Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/53888/third-eye-for-blind-using-ultrasonic-sensor-vibrator-glove/dr-b-rambabu
This project presents a door locking system which suggests two ways for unlocking a door using Internet of Things (IoT) and Fingerprint. Most of the major door lock security systems have several loopholes which could be broken down to gain access to the desired places, and it creates a concern for a secure lifestyle and proper working environment. People can access Internet services by using their cell phone, laptop and various gadgets. Fingerprint is a reliable biometric feature having a wide range of applications that require authentication. Biometric systems such as fingerprint provide tools to enforce reliable logs of system transactions and protect an individual’s right to privacy. In the proposed system, fingerprints of the authorized users are enrolled and verified to provide access to a facility that is used by multiple users. A user can also be removed and a new user can be enrolled in the system. We have implemented a centralized control system from where we can control who can enter in which rooms and who cannot. This is an Arduino Mega device based. Fingerprints are stored dynamically in a database for computing the different statistics.
GPS Monitoring System for Dementia CareIRJET Journal
This document proposes a GPS monitoring system to assist those living with dementia and reduce their dependence on family members. The system uses a GPS module to retrieve location data, an STM32 microcontroller to operate the system, and a GSM module to send location via SMS to a mobile application. The application displays the patient's location on a map and alerts the user if the patient leaves a predefined safe zone, allowing family to monitor the patient remotely while still allowing independent travel. The system aims to make life easier for those with dementia and their families through remote location tracking and alerts.
Smart Door Monitoring and Locking systemIRJET Journal
This document describes a smart door monitoring and locking system using a Raspberry Pi, fingerprint sensor, camera module, and Telegram bot for communication. The system stores fingerprint data of authorized users and compares fingerprints scanned at the door to the database for authentication. If a match is found, the door unlock signal is sent. If not, the camera captures an image of the person, which is sent via Telegram bot to the owner for permission to unlock. This provides secure access control while allowing owners to grant entry remotely. The system aims to provide low-cost home security and automation using accessible hardware and software components like Raspberry Pi, Python libraries, and Telegram API.
IoT Based Automatic Gas, Smoke and Fire Alert Systemijtsrd
The goal of this system is to build an IoT based automatic gas, smoke and fire alert system via Node MCU. We use a Node MCU, sensors, a microcontroller system, and a few more electronic devices in the current endeavor. This endeavor has easy to use gas, smoke and fire detection. When people are outside of industries, residences, or marketplaces, they are not automatically informed about sudden events caused by fire, gas, or smoke. Not even fire departments receive the information instantly. People suffer greatly as a result, and most of the time, fire nearly destroys residences, companies, and marketplaces. However, our system may be able to help by automatically alerting concerned people to the presence of smoke, gas and fire. As a result, people will be able to arrive at the location swiftly and act promptly. For the system to obtain the data from the fire, gas and smoke sensors, a microcontroller needs to be installed to control every device involved in this work. Wi Fi shield functions a way to connect devices with the network. This system uses an Android app to retrieve the sensors data. This experiment analyses the rooms performance in various fire, gas, and smoke conditions as well as burning objects. The researchers found that when smoke concentrations rise above 100 parts per million, people may get fatal heart attacks, coughing fits, and stinging eyes. However, when the smoke content hits 40 parts per million, our system will automatically send out an alert message. With the help of our technology, we hope that individuals will be able to save their lives and property. Md. Abdur Rahim | Md. Sanjidur Rahman | Rafat Ara "IoT Based Automatic Gas, Smoke and Fire Alert System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63446.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/63446/iot-based-automatic-gas-smoke-and-fire-alert-system/md-abdur-rahim
IRJET - Women Safety Device with GPS Tracking and AlertsIRJET Journal
This document proposes a women's safety device using GPS tracking and alerts. The device would consist of a wearable smart band continuously communicating with a smart phone. The phone would have an application programmed to detect human behaviors indicating fear, anxiety, etc. through sensors. When the application detects an emergency signal, it would automatically send a help request with location coordinates to the nearest police station, relatives, and other application users nearby. This would enable emergency help to arrive quickly and accurately to assist victims in dangerous situations. The proposed device aims to provide security for women and allow help to be sent even if an unconscious victim cannot press an emergency button. It discusses the system components, working, and concludes the design could help solve security issues faced by
IRJET- Home Automation using IoT: ReviewIRJET Journal
This document summarizes research on using Internet of Things (IoT) technology for home automation and security. It discusses how IoT allows devices in the home to be controlled remotely through a smartphone app and can automate tasks. The document also reviews different approaches others have taken to implement smart home security systems using sensors and microcontrollers connected to the Internet. It describes the typical architecture of an IoT system including sensor, network, and application layers. Finally, it summarizes several research papers on developing smart home and kitchen monitoring systems using technologies like Arduino, Raspberry Pi, and sensors for functions like detecting fires, gas leaks, and intruders.
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREMichael George
As we are moving in a World of advancement, so the security is the major concern in order to keep data isolate from the unauthorised users to access. In today’s World, we need high degree security system for the protection of our document, important data, as well as memory and jewellery. This review paper presents a secure fingerprint locker which is feasible. This system is proved successful on all norms of security of lockers. There are other methods of verifying authentication through password, RFID but this method is most efficient and reliable. To provide perfect security to the lockers and to make the work easier, this project is taking help of two different technologies, i.e. Embedded System and Biometrics. Biometrics is basically the measurement and use of unique characteristics of living beings to make them distinguish from one another. And this is more reliable then passwords and tokens which can be lost or stolen by the humans. In this paper we are providing the work done on this technique.
Similar to Fingerprint Security System using GSM and GPRS (20)
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
The manufacturing industries all over the world are facing tough challenges for growth, development and sustainability in today’s competitive environment. They have to achieve apex position by adapting with the global competitive environment by delivering goods and services at low cost, prime quality and better price to increase wealth and consumer satisfaction. Cost Management ensures profit, growth and sustainability of the business with implementation of Continuous Improvement Technique like Six Sigma. This leads to optimize Business performance. The method drives for customer satisfaction, low variation, reduction in waste and cycle time resulting into a competitive advantage over other industries which did not implement it. The main objective of this paper ‘Six Sigma Technique A Journey Through Its Implementation’ is to conceptualize the effectiveness of Six Sigma Technique through the journey of its implementation. Aditi Sunilkumar Ghosalkar "‘Six Sigma Technique’: A Journey Through its Implementation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64546.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64546/‘six-sigma-technique’-a-journey-through-its-implementation/aditi-sunilkumar-ghosalkar
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
Edge computing, a paradigm that involves processing data closer to its source, has gained significant attention for its potential to revolutionize data processing and communication in space missions. With the increasing complexity and data volume generated by modern space missions, traditional centralized computing approaches face challenges related to latency, bandwidth, and security. Edge computing in space, involving on board processing and analysis of data, offers promising solutions to these challenges. This paper explores the concept of edge computing in space, its benefits, applications, and future prospects in enhancing space missions. Manish Verma "Edge Computing in Space: Enhancing Data Processing and Communication for Space Missions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64541.pdf Paper Url: https://www.ijtsrd.com/computer-science/artificial-intelligence/64541/edge-computing-in-space-enhancing-data-processing-and-communication-for-space-missions/manish-verma
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
Communal politics in India has evolved through centuries, weaving a complex tapestry shaped by historical legacies, colonial influences, and contemporary socio political transformations. This research comprehensively examines the dynamics of communal politics in 21st century India, emphasizing its historical roots, socio political dynamics, economic implications, challenges, and prospects for mitigation. The historical perspective unravels the intricate interplay of religious identities and power dynamics from ancient civilizations to the impact of colonial rule, providing insights into the evolution of communalism. The socio political dynamics section delves into the contemporary manifestations, exploring the roles of identity politics, socio economic disparities, and globalization. The economic implications section highlights how communal politics intersects with economic issues, perpetuating disparities and influencing resource allocation. Challenges posed by communal politics are scrutinized, revealing multifaceted issues ranging from social fragmentation to threats against democratic values. The prospects for mitigation present a multifaceted approach, incorporating policy interventions, community engagement, and educational initiatives. The paper conducts a comparative analysis with international examples, identifying common patterns such as identity politics and economic disparities. It also examines unique challenges, emphasizing Indias diverse religious landscape, historical legacy, and secular framework. Lessons for effective strategies are drawn from international experiences, offering insights into inclusive policies, interfaith dialogue, media regulation, and global cooperation. By scrutinizing historical epochs, contemporary dynamics, economic implications, and international comparisons, this research provides a comprehensive understanding of communal politics in India. The proposed strategies for mitigation underscore the importance of a holistic approach to foster social harmony, inclusivity, and democratic values. Rose Hossain "Dynamics of Communal Politics in 21st Century India: Challenges and Prospects" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64528.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/history/64528/dynamics-of-communal-politics-in-21st-century-india-challenges-and-prospects/rose-hossain
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
Background and Objective Telehealth has become a well known tool for the delivery of health care in Saudi Arabia, and the perspective and knowledge of healthcare providers are influential in the implementation, adoption and advancement of the method. This systematic review was conducted to examine the current literature base regarding telehealth and the related healthcare professional perspective and knowledge in the Kingdom of Saudi Arabia. Materials and Methods This systematic review was conducted by searching 7 databases including, MEDLINE, CINHAL, Web of Science, Scopus, PubMed, PsycINFO, and ProQuest Central. Studies on healthcare practitioners telehealth knowledge and perspectives published in English in Saudi Arabia from 2000 to 2023 were included. Boland directed this comprehensive review. The researchers examined each connected study using the AXIS tool, which evaluates cross sectional systematic reviews. Narrative synthesis was used to summarise and convey the data. Results Out of 1840 search results, 10 studies were included. Positive outlook and limited knowledge among providers were seen across trials. Healthcare professionals like telehealth for its ability to improve quality, access, and delivery, save time and money, and be successful. Age, gender, occupation, and work experience also affect health workers knowledge. In Saudi Arabia, healthcare professionals face inadequate expert assistance, patient privacy, internet connection concerns, lack of training courses, lack of telehealth understanding, and high costs while performing telemedicine. Conclusions Healthcare practitioners telehealth perceptions and knowledge were examined in this systematic study. Its collection of concerned experts different personal attitudes and expertise would help enhance telehealths implementation in Saudi Arabia, develop its healthcare delivery alternative, and eliminate frequent problems. Badriah Mousa I Mulayhi | Dr. Jomin George | Judy Jenkins "Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in Saudi Arabia: A Systematic Review" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64535.pdf Paper Url: https://www.ijtsrd.com/medicine/other/64535/assess-perspective-and-knowledge-of-healthcare-providers-towards-elehealth-in-saudi-arabia-a-systematic-review/badriah-mousa-i-mulayhi
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
The impact of digital media on the distribution of power and the weakening of traditional gatekeepers has gained considerable attention in recent years. The adoption of digital technologies and the internet has resulted in declining influence and power for traditional gatekeepers such as publishing houses and news organizations. Simultaneously, digital media has facilitated the emergence of new voices and players in the media industry. Digital medias impact on power decentralization and gatekeeper erosion is visible in several ways. One significant aspect is the democratization of information, which enables anyone with an internet connection to publish and share content globally, leading to citizen journalism and bypassing traditional gatekeepers. Another aspect is the disruption of conventional media industry business models, as traditional organizations struggle to adjust to the decrease in advertising revenue and the rise of digital platforms. Alternative business models, such as subscription models and crowdfunding, have become more prevalent, leading to the emergence of new players. Overall, the impact of digital media on the distribution of power and the weakening of traditional gatekeepers has brought about significant changes in the media landscape and the way information is shared. Further research is required to fully comprehend the implications of these changes and their impact on society. Dr. Kusum Lata "The Impact of Digital Media on the Decentralization of Power and the Erosion of Traditional Gatekeepers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64544.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/political-science/64544/the-impact-of-digital-media-on-the-decentralization-of-power-and-the-erosion-of-traditional-gatekeepers/dr-kusum-lata
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
This research investigates the nexus between online discussions on Dr. B.R. Ambedkars ideals and their impact on social inclusion among college students in Gurugram, Haryana. Surveying 240 students from 12 government colleges, findings indicate that 65 actively engage in online discussions, with 80 demonstrating moderate to high awareness of Ambedkars ideals. Statistically significant correlations reveal that higher online engagement correlates with increased awareness p 0.05 and perceived social inclusion. Variations across colleges and a notable effect of college type on perceived social inclusion highlight the influence of contextual factors. Furthermore, the intersectional analysis underscores nuanced differences based on gender, caste, and socio economic status. Dr. Kusum Lata "Online Voices, Offline Impact: Ambedkar's Ideals and Socio-Political Inclusion - A Study of Gurugram District" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64543.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/political-science/64543/online-voices-offline-impact-ambedkars-ideals-and-sociopolitical-inclusion--a-study-of-gurugram-district/dr-kusum-lata
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
Noting calls for contextualizing Agro entrepreneurs problems and challenges of the agro entrepreneurs and for greater attention to the Role of entrepreneurs in agro entrepreneurship research, we conduct a systematic literature review of extent research in agriculture entrepreneurship to overcome the study objectives of complications of agro entrepreneurs through various factors, Development of agriculture products is a key factor for the overall economic growth of agro entrepreneurs Agro Entrepreneurs produces firsthand large scale employment, utilizes the labor and natural resources, This research outlines the problems of Weather and Soil Erosions, Market price fluctuation, stimulates labor cost problems, reduces concentration of Price volatility, Dependency on Intermediaries, induces Limited Bargaining Power, and Storage and Transportation Costs. This paper mainly devoted to highlight Problems and challenges faced for the sustainable of Agro Entrepreneurs in India. Vinay Prasad B "Problems and Challenges of Agro Entreprenurship - A Study" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64540.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64540/problems-and-challenges-of-agro-entreprenurship--a-study/vinay-prasad-b
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
Disclosure is a process through which a business enterprise communicates with external parties. A corporate disclosure is communication of financial and non financial information of the activities of a business enterprise to the interested entities. Corporate disclosure is done through publishing annual reports. So corporate disclosure through annual reports plays a vital role in the life of all the companies and provides valuable information to investors. The basic objectives of corporate disclosure is to give a true and fair view of companies to the parties related either directly or indirectly like owner, government, creditors, shareholders etc. in the companies act, provisions have been made about mandatory and voluntary disclosure. The IT sector in India is rapidly growing, the trend to invest in the IT sector is rising and employment opportunities in IT sectors are also increasing. Therefore the IT sector is expected to have fair, full and adequate disclosure of all information. Unfair and incomplete disclosure may adversely affect the entire economy. A research study on disclosure practices of IT companies could play an important role in this regard. Hence, the present research study has been done to study and review comparative analysis of total corporate disclosure of selected IT companies of India and to put forward overall findings and suggestions with a view to increase disclosure score of these companies. The researcher hopes that the present research study will be helpful to all selected Companies for improving level of corporate disclosure through annual reports as well as the government, creditors, investors, all business organizations and upcoming researcher for comparative analyses of level of corporate disclosure with special reference to selected IT companies. Dr. Vaibhavi D. Thaker "Comparative Analysis of Total Corporate Disclosure of Selected IT Companies of India" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64539.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64539/comparative-analysis-of-total-corporate-disclosure-of-selected-it-companies-of-india/dr-vaibhavi-d-thaker
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
This study investigated the impact of educational background and professional training on human rights awareness among secondary school teachers in the Marathwada region of Maharashtra, India. The key findings reveal that higher levels of education, particularly a master’s degree, and fields of study related to education, humanities, or social sciences are associated with greater human rights awareness among teachers. Additionally, both pre service teacher training and in service professional development programs focused on human rights education significantly enhance teacher’s knowledge, skills, and competencies in promoting human rights principles in their classrooms. Baig Ameer Bee Mirza Abdul Aziz | Dr. Syed Azaz Ali Amjad Ali "The Impact of Educational Background and Professional Training on Human Rights Awareness among Secondary School Teachers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64529.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/64529/the-impact-of-educational-background-and-professional-training-on-human-rights-awareness-among-secondary-school-teachers/baig-ameer-bee-mirza-abdul-aziz
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
“One Language sets you in a corridor for life. Two languages open every door along the way” Frank Smith English as a foreign language or as a second language has been ruling in India since the period of Lord Macaulay. But the question is how much we teach or learn English properly in our culture. Is there any scope to use English as a language rather than a subject How much we learn or teach English without any interference of mother language specially in the classroom teaching learning scenario in West Bengal By considering all these issues the researcher has attempted in this article to focus on the effective teaching learning process comparing to other traditional strategies in the field of English curriculum at the secondary level to investigate whether they fulfill the present teaching learning requirements or not by examining the validity of the present curriculum of English. The purpose of this study is to focus on the effectiveness of the systematic, scientific, sequential and logical transaction of the course between the teachers and the learners in the perspective of the 5Es programme that is engage, explore, explain, extend and evaluate. Sanchali Mondal | Santinath Sarkar "A Study on the Effective Teaching Learning Process in English Curriculum at the Secondary Level of West Bengal" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd62412.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/62412/a-study-on-the-effective-teaching-learning-process-in-english-curriculum-at-the-secondary-level-of-west-bengal/sanchali-mondal
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
This paper reports on a study which was conducted to investigate the role of mentoring and its influence on the effectiveness of the teaching of Physics in secondary schools in the South West Region of Cameroon. The study adopted the convergent parallel mixed methods design, focusing on respondents in secondary schools in the South West Region of Cameroon. Both quantitative and qualitative data were collected, analysed separately, and the results were compared to see if the findings confirm or disconfirm each other. The quantitative analysis found that majority of the respondents 72 of Physics teachers affirmed that they had more experienced colleagues as mentors to help build their confidence, improve their teaching, and help them improve their effectiveness and efficiency in guiding learners’ achievements. Only 28 of the respondents disagreed with these statements. With majority respondents 72 agreeing with the statements, it implies that in most secondary schools, experienced Physics teachers act as mentors to build teachers’ confidence in teaching and improving students’ learning. The interview qualitative data analysis summarized how secondary school Principals use meetings with mentors and mentees to promote mentorship in the school milieu. This has helped strengthen teachers’ classroom practices in secondary schools in the South West Region of Cameroon. With the results confirming each other, the study recommends that mentoring should focus on helping teachers employ social interactions and instructional practices feedback and clarity in teaching that have direct measurable impact on students’ learning achievements. Andrew Ngeim Sumba | Frederick Ebot Ashu | Peter Agborbechem Tambi "The Role of Mentoring and Its Influence on the Effectiveness of the Teaching of Physics in Secondary Schools in the South West Region of Cameroon" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64524.pdf Paper Url: https://www.ijtsrd.com/management/management-development/64524/the-role-of-mentoring-and-its-influence-on-the-effectiveness-of-the-teaching-of-physics-in-secondary-schools-in-the-south-west-region-of-cameroon/andrew-ngeim-sumba
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
This study primarily focuses on the design of a high side buck converter using an Arduino microcontroller. The converter is specifically intended for use in DC DC applications, particularly in standalone solar PV systems where the PV output voltage exceeds the load or battery voltage. To evaluate the performance of the converter, simulation experiments are conducted using Proteus Software. These simulations provide insights into the input and output voltages, currents, powers, and efficiency under different state of charge SoC conditions of a 12V,70Ah rechargeable lead acid battery. Additionally, the hardware design of the converter is implemented, and practical data is collected through operation, monitoring, and recording. By comparing the simulation results with the practical results, the efficiency and performance of the designed converter are assessed. The findings indicate that while the buck converter is suitable for practical use in standalone PV systems, its efficiency is compromised due to a lower output current. Chan Myae Aung | Dr. Ei Mon "Design Simulation and Hardware Construction of an Arduino-Microcontroller Based DC-DC High-Side Buck Converter for Standalone PV System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64518.pdf Paper Url: https://www.ijtsrd.com/engineering/mechanical-engineering/64518/design-simulation-and-hardware-construction-of-an-arduinomicrocontroller-based-dcdc-highside-buck-converter-for-standalone-pv-system/chan-myae-aung
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
Energy becomes sustainable if it meets the needs of the present without compromising the ability of future generations to meet their own needs. Some of the definitions of sustainable energy include the considerations of environmental aspects such as greenhouse gas emissions, social, and economic aspects such as energy poverty. Generally far more sustainable than fossil fuel are renewable energy sources such as wind, hydroelectric power, solar, and geothermal energy sources. Worthy of note is that some renewable energy projects, like the clearing of forests to produce biofuels, can cause severe environmental damage. The sustainability of nuclear power which is a low carbon source is highly debated because of concerns about radioactive waste, nuclear proliferation, and accidents. The switching from coal to natural gas has environmental benefits, including a lower climate impact, but could lead to delay in switching to more sustainable options. “Carbon capture and storage” can be built into power plants to remove the carbon dioxide CO2 emissions, but this technology is expensive and has rarely been implemented. Leading non renewable energy sources around the world is fossil fuels, coal, petroleum, and natural gas. Nuclear energy is usually considered another non renewable energy source, although nuclear energy itself is a renewable energy source, but the material used in nuclear power plants is not. The paper addresses the issue of sustainable energy, its attendant benefits to the future generation, and humanity in general. Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku "Sustainable Energy" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64534.pdf Paper Url: https://www.ijtsrd.com/engineering/electrical-engineering/64534/sustainable-energy/paul-a-adekunte
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
This paper aims to outline the executive regulations, survey standards, and specifications required for the implementation of the Sudan Survey Act, and for regulating and organizing all surveying work activities in Sudan. The act has been discussed for more than 5 years. The Land Survey Act was initiated by the Sudan Survey Authority and all official legislations were headed by the Sudan Ministry of Justice till it was issued in 2022. The paper presents conceptual guidelines to be used for the Survey Act implementation and to regulate the survey work practice, standardizing the field surveys, processing, quality control, procedures, and the processes related to survey work carried out by the stakeholders and relevant authorities in Sudan. The conceptual guidelines are meant to improve the quality and harmonization of geospatial data and to aid decision making processes as well as geospatial information systems. The established comprehensive executive regulations will govern and regulate the implementation of the Sudan Survey Geomatics Act in all surveying and mapping practices undertaken by the Sudan Survey Authority SSA and state local survey departments for public or private sector organizations. The targeted standards and specifications include the reference frame, projection, coordinate systems, and the guidelines and specifications that must be followed in the field of survey work, processes, and mapping products. In the last few decades, there has been a growing awareness of the importance of geomatics activities and measurements on the Earths surface in space and time, together with observing and mapping the changes. In such cases, data must be captured promptly, standardized, and obtained with more accuracy and specified in much detail. The paper will also highlight the current situation in Sudan, the degree to which survey standards are used, the problems encountered, and the errors that arise from not using the standards and survey specifications. Kamal A. A. Sami "Concepts for Sudan Survey Act Implementations - Executive Regulations and Standards" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63484.pdf Paper Url: https://www.ijtsrd.com/engineering/civil-engineering/63484/concepts-for-sudan-survey-act-implementations--executive-regulations-and-standards/kamal-a-a-sami
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
The discussions between ellipsoid and geoid have invoked many researchers during the recent decades, especially during the GNSS technology era, which had witnessed a great deal of development but still geoid undulation requires more investigations. To figure out a solution for Sudans local geoid, this research has tried to intake the possibility of determining the geoid model by following two approaches, gravimetric and geometrical geoid model determination, by making use of GNSS leveling benchmarks at Khartoum state. The Benchmarks are well distributed in the study area, in which, the horizontal coordinates and the height above the ellipsoid have been observed by GNSS while orthometric heights were carried out using precise leveling. The Global Geopotential Model GGM represented in EGM2008 has been exploited to figure out the geoid undulation at the benchmarks in the study area. This is followed by a fitting process, that has been done to suit the geoid undulation data which has been computed using GNSS leveling data and geoid undulation inspired by the EGM2008. Two geoid surfaces were created after the fitting process to ensure that they are identical and both of them could be counted for getting the same geoid undulation with an acceptable accuracy. In this respect, statistical operation played an important role in ensuring the consistency and integrity of the model by applying cross validation techniques splitting the data into training and testing datasets for building the geoid model and testing its eligibility. The geometrical solution for geoid undulation computation has been utilized by applying straightforward equations that facilitate the calculation of the geoid undulation directly through applying statistical techniques for the GNSS leveling data of the study area to get the common equation parameters values that could be utilized to calculate geoid undulation of any position in the study area within the claimed accuracy. Both systems were checked and proved eligible to be used within the study area with acceptable accuracy which may contribute to solving the geoid undulation problem in the Khartoum area, and be further generalized to determine the geoid model over the entire country, and this could be considered in the future, for regional and continental geoid model. Ahmed M. A. Mohammed. | Kamal A. A. Sami "Towards the Implementation of the Sudan Interpolated Geoid Model (Khartoum State Case Study)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63483.pdf Paper Url: https://www.ijtsrd.com/engineering/civil-engineering/63483/towards-the-implementation-of-the-sudan-interpolated-geoid-model-khartoum-state-case-study/ahmed-m-a-mohammed
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
Sudan is witnessing an acceleration in the processes of development and transformation in the performance of government institutions to raise the productivity and investment efficiency of the government sector. The development plans and investment opportunities have focused on achieving national goals in various sectors. This paper aims to illuminate the path to the future and provide geospatial data and information to develop the investment climate and environment for all sized businesses, and to bridge the development gap between the Sudan states. The Sudan Survey Authority SSA is the main advisor to the Sudan Government in conducting surveying, mappings, designing, and developing systems related to geospatial data and information. In recent years, SSA made a strategic partnership with the Ministry of Investment to activate Geospatial Information for Sudans Sustainable Investment and in particular, for the preparation and implementation of the Sudan investment map, based on the directives and objectives of the Ministry of Investment MI in Sudan. This paper comes within the framework of activating the efforts of the Ministry of Investment to develop technical investment services by applying techniques adopted by the Ministry and its strategic partners for advancing investment processes in the country. Kamal A. A. Sami "Activating Geospatial Information for Sudan's Sustainable Investment Map" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63482.pdf Paper Url: https://www.ijtsrd.com/engineering/information-technology/63482/activating-geospatial-information-for-sudans-sustainable-investment-map/kamal-a-a-sami
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
In a rapidly changing global landscape, the importance of education as a unifying force cannot be overstated. This paper explores the crucial role of educational unity in fostering a stronger and more inclusive society through the embrace of diversity. By examining the benefits of diverse learning environments, the paper aims to highlight the positive impact on societal strength. The discussion encompasses various dimensions, from curriculum design to classroom dynamics, and emphasizes the need for educational institutions to become catalysts for unity in diversity. It highlights the need for a paradigm shift in educational policies, curricula, and pedagogical approaches to ensure that they are reflective of the diverse fabric of society. This paper also addresses the challenges associated with implementing inclusive educational practices and offers practical strategies for overcoming barriers. It advocates for collaborative efforts between educational institutions, policymakers, and communities to create a supportive ecosystem that promotes diversity and unity. Mr. Amit Adhikari | Madhumita Teli | Gopal Adhikari "Educational Unity: Embracing Diversity for a Stronger Society" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64525.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/64525/educational-unity-embracing-diversity-for-a-stronger-society/mr-amit-adhikari
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
The diversity of indigenous knowledge systems in India is vast and can vary significantly between different communities and regions. Preserving and respecting these knowledge systems is crucial for maintaining cultural heritage, promoting sustainable practices, and fostering cross cultural understanding. In this paper, an overview of the prospects and challenges associated with incorporating Indian indigenous knowledge into management is explored. It is found that IIKS helps in management in many areas like sustainable development, tourism, food security, natural resource management, cultural preservation and innovation, etc. However, IIKS integration with management faces some challenges in the form of a lack of documentation, cultural sensitivity, language barriers legal framework, etc. Savita Lathwal "Integration of Indian Indigenous Knowledge System in Management: Prospects and Challenges" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63500.pdf Paper Url: https://www.ijtsrd.com/management/accounting-and-finance/63500/integration-of-indian-indigenous-knowledge-system-in-management-prospects-and-challenges/savita-lathwal
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
The COVID 19 pandemic has highlighted the crucial need of preventive measures, with widespread use of face masks being a key method for slowing the viruss spread. This research investigates face mask identification using deep learning as a technological solution to be reducing the risk of coronavirus transmission. The proposed method uses state of the art convolutional neural networks CNNs and transfer learning to automatically recognize persons who are not wearing masks in a variety of circumstances. We discuss how this strategy improves public health and safety by providing an efficient manner of enforcing mask wearing standards. The report also discusses the obstacles, ethical concerns, and prospective applications of face mask detection systems in the ongoing fight against the pandemic. Dilip Kumar Sharma | Aaditya Yadav "DeepMask: Transforming Face Mask Identification for Better Pandemic Control in the COVID-19 Era" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64522.pdf Paper Url: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/64522/deepmask-transforming-face-mask-identification-for-better-pandemic-control-in-the-covid19-era/dilip-kumar-sharma
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
Efficient and accurate data collection is paramount in clinical trials, and the design of Electronic Case Report Forms eCRFs plays a pivotal role in streamlining this process. This paper explores the integration of machine learning techniques in the design and implementation of eCRFs to enhance data collection efficiency. We delve into the synergies between eCRF design principles and machine learning algorithms, aiming to optimize data quality, reduce errors, and expedite the overall data collection process. The application of machine learning in eCRF design brings forth innovative approaches to data validation, anomaly detection, and real time adaptability. This paper discusses the benefits, challenges, and future prospects of leveraging machine learning in eCRF design for streamlined and advanced data collection in clinical trials. Dhanalakshmi D | Vijaya Lakshmi Kannareddy "Streamlining Data Collection: eCRF Design and Machine Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63515.pdf Paper Url: https://www.ijtsrd.com/biological-science/biotechnology/63515/streamlining-data-collection-ecrf-design-and-machine-learning/dhanalakshmi-d
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
Iván Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
2. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD56188 | Volume – 7 | Issue – 2 | March-April 2023 Page 868
access control system that uses GSM and GPRS for
remote monitoring and data transmission. The system
is designed for use in small to medium-sized
buildings and provides secure access control using
fingerprint biometrics. The authors report high
accuracy in fingerprint recognition and reliable data
transmission.
"A Study on Fingerprint Biometric System with
GSM/GPRS" by Pudukudy and Soman (2015)
presents a study on the integration of fingerprint
biometrics with GSM and GPRS technologies for
secure access control applications. The authors report
high accuracy in fingerprint recognition and reliable
data transmission using the proposed system.
"Design and Implementation of a Fingerprint-Based
Security System with GSM Interface" by O.
Adeyemo et al.: The study proposed a fingerprint-
based security system with a GSM interface that can
be used to secure homes, offices, and other small-
scale applications. The system was evaluated in terms
of its reliability and effectiveness in providing access
control.
"Fingerprint Identification System Based on GSM
and GPRS Technology" by Zhang and Hu (2019)
presents a fingerprint identification system that uses
GSM and GPRS technology for data transmission and
remote monitoring. The system is designed for use in
secure access control applications, such as building
entrances, vaults, and laboratories. The authors report
high accuracy in fingerprint recognition and reliable
data transmission.
"Development of a Fingerprint Access Control
System Using GSM and GPRS Technologies" by
Abdulqadir and Abdulqadir (2019) presents a
fingerprint access control system that uses GSM and
GPRS technologies for data transmission and remote
monitoring. The system is designed for use in small to
medium-sized buildings and provides secure access
control using fingerprint biometrics. The authors
report high accuracy in fingerprint recognition and
reliable data transmission.
Block Diagram:
ESP32 is used as a main controller in this system. Internal peripherals of the ESP32 are configured for the
system to work. WiFi module is connected to the ESP32 via serial port 1 and the Fingerprint sensor is connected
to the serial port 2. Buzzer is connected to ESP32 via a GPOI and LED indication is connected parallel to the
buzzer. Hence whenever buzzer will blow LED will also indicate the same. Relaymodule is connected to ESP32
via a GPIO. Whenever relay will switch then automatically lock will open and close with respect to the state of
the relay. CAM32 module is also connected to the ESP32 via a GPIO in accordance with the controlling pin.
WiFi module provides GSM and GPRS interfacing. Power supply gives the power to the ESP32 for functioning.
Power supply is having step down transformer and 7805 regulator to convert the 12V output of the transformer
to the regulated 5V.
3. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD56188 | Volume – 7 | Issue – 2 | March-April 2023 Page 869
Schematic Diagram:
Actual Project:
Working:
The system is totally built up on the ESP32 module.
General purpose Input and Output port of the ESP32
is used to handle Relay, Buzzer, Camera module. Wi-
Fi Module and the Fingerprint sensor is access using
serial ports.
A fingerprint security system is a biometric
authentication method that uses a person's unique
fingerprint to grant access to a secured location or
device. The system works by capturing an image of
the person's fingerprint and analyzing it to determine
if it matches the stored template of an authorized user.
Here's how a fingerprint security system typically
works:
Initialisation: At Power ON, power supply turns on
the system and initialised all the peripherals. GSM
module, GPRS Module, CAM32 and ESP32.
4. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD56188 | Volume – 7 | Issue – 2 | March-April 2023 Page 870
Enrolment: The user's fingerprint is captured and
stored in the system's database. The fingerprint is
usually scanned several times from different angles to
create a complete and accurate image.
Authentication: When the user wants to gain access to
a secured location or device, theyplace their finger on
a fingerprint scanner. The scanner captures an image
of their fingerprint and compares it to the stored
template in the database.
Verification: If the captured fingerprint matches the
stored template, the system grants access to the user
and GSM module also send a message to the
registered mobile number that that “ Access given to
unlock the door”. If captured fingerprint does not
match then access is denied. Buzzer blows and LED
indication turn ON to indicate that un-authorised
person tried to access the door. Also when buzzer
turned ON, camera module turns ON and image of
the person get captured. As soon as image is captured
GPRS module is enabled and image is sent to the
registered Emil ID. Also GSM module send message
to the registered mobile number that “Un-authorised
person tried to access the door”.
The fingerprint security system works by using
advanced algorithms to analyze the unique features of
a person's fingerprint, such as the ridges, valleys, and
minutiae points. These features are used to create a
mathematical representation of the fingerprint, which
is then compared to the stored template for
authentication.
Fingerprint security systems are highly secure and
accurate, as each person's fingerprint is unique and
cannot be replicated. Additionally, they are easy to
use and convenient, as users do not need to remember
passwords or carry access cards.
Program:
#include <Adafruit_Fingerprint.h>
#include <HardwareSerial.h>
int BUZZ = 25;
int RELAY1 = 14;
//**************ProjectDefine**************//
#define COUNTRY_CODE "+91"
#define MOBILE_NO_1 "8652882630"
#define TIME_OF_RESPONSE 1000
#define DOOR_OPEN_DELAY 6000
#define SEND_PHOTO_DELAY 5000
String MobileNo1 = String(COUNTRY_CODE) +
String(MOBILE_NO_1);
int fing Action Counter = 0;
//***************************************//
//Create all require OBJCETS
//Finger PRINT Objects creation
#if (defined(__AVR__) || defined(ESP8266)) &&
!defined(__AVR_ATmega2560__)
// For UNO and others without hardware serial, we
must use software serial...
// pin #2 is IN from sensor (GREEN wire)
// pin #3 is OUT from arduino (WHITE wire)
// Set up the serial port to use softwareserial..
SoftwareSerial mySerial(2, 3);
#else
// On Leonardo/M0/etc, others with hardware serial,
use hardware serial!
// #0 is green wire, #1 is white
#define mySerial Serial2
#endif
Adafruit_Fingerprint finger =
Adafruit_Fingerprint(&mySerial);
// The serial object GSM module
//SoftwareSerial GSM_Serial(GSM_RX, GSM_TX);
#define GSM_Serial Serial1
//***************************************//
void setup()
{
Serial.begin(ESP32_BAUDRATE);
GSM_Serial.begin(GSM_BAUDRATE);
pinMode (RELAY1,OUTPUT);
pinMode (BUZZ ,OUTPUT);
//configure pin 2 as an input and enable the internal
pull-up resistor
pinMode(CAPTURE_IMAGE_PIN, OUTPUT); //
Applying ZERO volt will toggle
offRelay(CAPTURE_IMAGE_PIN);
printOnLCD("Initializing...");
initFingerPrint();
gsmInit();
printOnLCD("Initializing Done.");
delay(2000);
digital Write(RELAY1,HIGH);
delay(5000);
digital Write(RELAY1,LOW);
}
void loop()
{
digital Write(RELAY1,LOW);
uint8_t status FP = getFingerprintID();
switch(status FP)
{
case FINGERPRINT_OK:
//OK status
printOnLCD("Sending SMS...");
5. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD56188 | Volume – 7 | Issue – 2 | March-April 2023 Page 871
sendSMS(MobileNo1, "Access given to unlock
Door.");
digital Write(RELAY1,HIGH);
delay(5000);
digital Write(RELAY1,LOW);
printOnLCD("SMS Sent.");
fing Action Counter = 0;
delay(2000);
break;
case FINGERPRINT_NOTFOUND:
fing Action Counter = fing Action Counter + 1;
if(fing Action Counter >= 2)
{
digital Write(BUZZ,HIGH);
printOnLCD("Sending SMS...");
sendSMS(MobileNo1, "Un-authorised person tried to
access Door");
printOnLCD("Sending Photo in Email...");
sendPhoto();
delay(5000);
printOnLCD("Photo Sent.");
delay(1000);
fing Action Counter = 0;
digital Write(BUZZ,LOW);
}
break;
default:
//Error
break;
}
delay(2000);
}
//***************************************//
void initFingerPrint()
{
Serial.println("nnFingerprint Sensor Detect test...");
// set the data rate for the sensor serial port
finger.begin(FINGER_PRINT_BAUDRATE);
delay(5);
if (finger.verifyPassword())
{
Serial.println("Found fingerprint sensor!");
}
else
{
Serial.println("Did not find fingerprint sensor :(");
while (1) { delay(1); }
}
finger.getTemplateCount();
if (finger.templateCount == 0)
{
Serial.print("Sensor doesn't contain any fingerprint
data. Please run the 'enroll' example.");
}
else
{
Serial.println("Waiting for valid finger...");
Serial.print("Sensor contains ");
Serial.print(finger.templateCount);
Serial.println(" templates");
}
}
bool readFinger()
{
uint8_t status FP = getFingerprintID();
switch(status FP)
{
case FINGERPRINT_OK:
//OK status
return (true);
break;
case FINGERPRINT_NOTFOUND:
default:
//Error
return (false);
}
return (true);
}
uint8_t getFingerprintID()
{
uint8_t p = finger.getImage();
switch(p)
{
case FINGERPRINT_OK:
Serial.println("Image taken");
break;
case FINGERPRINT_NOFINGER:
Serial.println("No finger detected");
return p;
case FINGERPRINT_PACKETRECIEVEERR:
Serial.println("Communication error");
return p;
case FINGERPRINT_IMAGEFAIL:
Serial.println("Imaging error");
return p;
default:
Serial.println("Unknown error");
return p;
}
// OK success!
p = finger.image2Tz();
switch(p)
{
6. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD56188 | Volume – 7 | Issue – 2 | March-April 2023 Page 872
case FINGERPRINT_OK:
Serial.println("Image converted");
break;
case FINGERPRINT_IMAGEMESS:
Serial.println("Image too messy");
return p;
case FINGERPRINT_PACKETRECIEVEERR:
Serial.println("Communication error");
return p;
case FINGERPRINT_FEATUREFAIL:
Serial.println("Could not find fingerprint features");
return p;
case FINGERPRINT_INVALIDIMAGE:
Serial.println("Could not find fingerprint features");
return p;
default:
Serial.println("Unknown error");
return p;
}
// OK converted!
p = finger.fingerSearch();
if (p == FINGERPRINT_OK)
{
Serial.println("Found a print match!");
}
else if (p ==
FINGERPRINT_PACKETRECIEVEERR)
{
Serial.println("Communication error");
return p;
}
else if (p == FINGERPRINT_NOTFOUND)
{
Serial.println("Did not find a match");
return p;
}
else
{
Serial.println("Unknown error");
return p;
}
// found a match!
Serial.print("Found ID #");
Serial.print(finger.fingerID);
Serial.print(" with confidence of ");
Serial.println(finger.confidence);
//return finger.fingerID;
return FINGERPRINT_OK;
}
// returns -1 if failed, otherwise returns ID #
int getFingerprintIDez()
{
uint8_t p = finger.getImage();
if (p != FINGERPRINT_OK) return -1;
p = finger.image2Tz();
if (p != FINGERPRINT_OK) return -1;
p = finger.fingerFastSearch();
if (p != FINGERPRINT_OK) return -1;
// found a match!
Serial.print("Found ID #");
Serial.print(finger.fingerID);
Serial.print(" with confidence of ");
Serial.println(finger.confidence);
return finger.fingerID;
}
void onRelay(int pin)
{
if( RELAY_LOG == HIGH )
{
digital Write(pin, HIGH);
}
else
{
digital Write(pin, LOW);
}
}
void offRelay(int pin)
{
if( RELAY_LOG == HIGH )
{
digital Write(pin, LOW);
}
else
{
digital Write(pin, HIGH);
}
}
void onLed(int pin)
{
if( LED_LOG == HIGH )
{
digital Write(pin, HIGH);
}
else
{
digital Write(pin, LOW);
}
}
void offLed(int pin)
{
if( LED_LOG == HIGH )
{
digital Write(pin, LOW);
7. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD56188 | Volume – 7 | Issue – 2 | March-April 2023 Page 873
}
else
{
digital Write(pin, HIGH);
}
}
void gsmInit()
{
//Deleting Messages
for(int i = 1; i < 10 ;i++)
{
Serial.println(sendCommandAndGetResponse("AT+
CMGD=" + String(i) ));
}
}
void sendSMS(String mob_no, String msg)
{
Serial.println(sendCommandAndGetResponse("AT+
CMGS="" + mob_no + """));
Serial.println(sendCommandAndGetResponse(msg));
}
String sendCommandAndGetResponse(String
command)
{
long prev_time;
//Serial output i arudio terminal
printOnLCD(command);
GSM_Serial.println(command);
prev_time = millis();
while( ( millis() - prev_time ) <
TIME_OF_RESPONSE )
{
if( GSM_Serial.available() > 0)
{
return GSM_Serial.readString();
}
}
return "";
}
int checkForNewSMS()
{
int msg_no;
//printOnLCD("Waiting for any new message...");
while(true)
{
if( GSM_Serial.available() > 0 )
{
String str = GSM_Serial.readString();
if( str.indexOf("+CMTI: "SM",") > 0 )
{
str.trim();
if( str.length() > 13 )
{
msg_no = (str.substring(12, 14)).toInt();
}
else
{
msg_no = (str.substring(12, 13)).toInt();
}
return msg_no;
}
else
{
return -1;
}
}
}
}
//This function will only returns new message if
receive. It does not check for any mobile number
String getActualMessage(int mesg_no)
{
String str =
sendCommandAndGetResponse("AT+CMGR=" +
String(mesg_no) );
//printOnLCD("Mess Contents:nn" + str);
for(int i = 20; i < str.length() ; i++)
{
if( str.charAt(i) == 'n' )
{
return str.substring((i+1), (str.length()-8) );
}
}
}
//This function will only return message value for
correct mobile no.
String getActualMessage(int mesg_no, String
from_no)
{
int len = 60;
String str =
sendCommandAndGetResponse("AT+CMGR=" +
String(mesg_no) );
if( ( str.substring(0, len) ).indexOf(from_no) > 0 )
{
for(int i = 20; i < str.length() ; i++)
{
if( str.charAt(i) == 'n' )
{
return str.substring((i+1), (str.length()-8) );
}
}
}
else
{
return "";
8. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD56188 | Volume – 7 | Issue – 2 | March-April 2023 Page 874
}
}
void printOnLCD(String val)
{
if( SERIAL_PRINT_WITH_LCD == true )
Serial.println( "n" + val );
}
void sendPhoto()
{
onRelay(CAPTURE_IMAGE_PIN);
delay(SEND_PHOTO_DELAY);
offRelay(CAPTURE_IMAGE_PIN);
}
Code Explnation:
1. void loop function: The loop function starts by
turning off a relay using digital Write function. It
then calls a function named getFingerprintID to
get the status of the fingerprint sensor, which is
stored in a variable named status FP. The program
then uses a switch-case statement to check the
value of status FP and perform different actions
accordingly. If status FP is FINGERPRINT OK,
the program prints a message on an LCD display,
sends an SMS to a mobile number, turns on the
relay for 5 seconds using digital Write function,
and resets a counter variable named fing Action
Counter to 0. If status FP is FINGERPRINT
NOTFOUND, the program increments the value
of fing Action Counter by 1. If fing Action
Counter becomes greater than or equal to 2, the
program sounds a buzzer using digital Write
function, sends an SMS to a mobile number,
sends a photo in an email, and resets fing Action
Counter to 0. If status FP is any other value, the
program does nothing. Finally, the program waits
for 2 seconds using the delay function and repeats
the loop.
2. void initFingerPrint function: This code defines a
function named initFingerPrint that initializes the
fingerprint sensor and performs some basic
checks to ensure that it is working properly. The
function starts by printing a message on the Serial
monitor to indicate that the fingerprint sensor is
being detected. It then initializes the sensor by
setting the data rate for the sensor serial port and
verifying its password using the verify Password
function of the Adafruit Fingerprint library. If the
password is verified, the program prints a
message indicating that the sensor has been
found. If not, the program prints an error message
and enters an infinite loop. The program then
calls the getTemplateCount function to get the
number of templates stored in the sensor. If the
sensor does not contain any templates, the
program prints an error message and suggests
running the enroll example. Otherwise, the
program prints a message indicating that it is
waiting for a valid finger and the number of
templates stored in the sensor.
3. bool read Finger function: This code defines a
function named read Finger that reads the
fingerprint sensor and returns a boolean value
based on the status of the sensor. The function
calls the get Fingerprint ID function to get the
status of the fingerprint sensor, which is stored in
a variable named status FP. The program then
uses a switch-case statement to check the value of
status FP and perform different actions
accordingly. If status FP is FINGERPRINT OK,
the function returns true, indicating that the
fingerprint has been recognized. If status FP is
FINGERPRINT NOTFOUND or any other value,
the function returns false, indicating that the
fingerprint has not been recognized.
4. uint8 t getFingerprintID function:
The function getFingerprintID() retrieves the ID of a
fingerprint from the fingerprint sensor. Firstly, it calls
the getImage() function to capture an image of the
fingerprint, and the status of the fingerprint sensor is
stored in a variable named ’p’. The function uses a
switch-case statement to check the value of ’p’ and
perform different actions accordingly. If ’p’ is
FINGERPRINT_OK, the function prints "Image
taken" he program then outputs the results to the
serial monitor and continues to the next step. If ’p’ is
FINGERPRINT_NOFINGER, the function prints
"No finger detected" to the serial monitor and returns
’p’. If ’p’ is
FINGERPRINT_PACKETRECIEVEERR, the
function prints "Communication error" to the serial
monitor and returns ’p’. If ’p’ is
FINGERPRINT_IMAGEFAIL, the function prints
"Imaging error" to the serial monitor and returns ’p’.
If ’p’ is any other value, the function prints
"Unknown error" to the serial monitor and returns ’p’.
The function then calls the image2Tz() function to
convert the fingerprint image to a template, and the
status of the fingerprint sensor is stored in the
variable ’p’ again. The function uses another switch-
case statement to check the value of ’p’ and perform
different actions accordingly. If ’p’ is
FINGERPRINT_OK, the function prints "Image
converted" the program then outputs the results to the
serial monitor and continues to the next step. If ’p’ is
FINGERPRINT_IMAGEMESS, the function prints
"Image too messy" to the serial monitor and returns p.
If p is FINGERPRINT_PACKETRECIEVEERR, the
function prints "Communication error" to the serial
9. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD56188 | Volume – 7 | Issue – 2 | March-April 2023 Page 875
monitor and returns p. If p is
FINGERPRINT_FEATUREFAIL, the function prints
"Could not find fingerprint features" to the serial
monitor and returns p. If p is
FINGERPRINT_INVALIDIMAGE, the function
prints "Invalid image" to the serial monitor and
returns p. If p is any other value, the function prints
"Unknown error" to the serial monitor and returns p.
The function then calls the fingerSearch() function to
search for a matching fingerprint template. The status
of the fingerprint sensor is stored in the variable p
again. The function uses an if-else statement to check
the value of p and perform different actions
accordingly. If p is FINGERPRINT_OK, the function
prints "Found a print match!" the program then
outputs the results to the serial monitor and continues
to the next step. If p is
FINGERPRINT_PACKETRECIEVEERR, the
function prints "Communication error" to the serial
monitor and returns p. If p is
FINGERPRINT_NOTFOUND, the function prints
"Did not find a match" to the serial monitor and
returns p. If p is any other value, the function prints
"Unknown error" to the serial monitor and returns p.
If a match is found, the function prints the ID and
confidence level of the matching fingerprint to the
serial monitor and returns FINGERPRINT_OK.
Otherwise, it returns the value of p.
5. intgetFingerprintIDez function:
This is a modified version of the get Fingerprint ID
function function. Instead of searching the whole
database, it uses finger Fast Search function to
quickly search for a match against the enrolled
fingerprints. This function returns the finger ID of the
matched fingerprint or -1 if no match is found.
6. void onRelay,void offRelay, void onLed,void
offLed:
These are four functions that control the relay and
LED outputs based on the RELAY LOG and LED
LOG variables. The on Relay function turns on the
relay by setting the specified pin to HIGH if RELAY
LOG is HIGH, and LOW if RELAY LOG is LOW.
The off Relay function turns off the relay by setting
the specified pin to LOW if RELAY LOG is HIGH,
and HIGH if RELAY LOG is LOW. The on Led
function turns on the LED by setting the specified pin
to HIGH if LED LOG is HIGH, and LOW if LED
LOG is LOW. The off Led function turns off the LED
by setting the specified pin to LOW if LED LOG is
HIGH, and HIGH if LED LOG is LOW. The RELAY
LOG and LED LOG variables likely determine the
polarity of the relay and LED, respectively.
7. The code provided is a set of functions for a
GSM module. The functions perform the
following tasks:
gsmInit function: Deletes any SMS message stored in
the GSM modules memory.
sendSMS String mob no, String msg : Sends an SMS
message to the specified mobile number.
sendCommandAndGetResponse String command :
Sends a command to the GSM module and returns the
response received from the module.
checkForNewSMS function: Checks if there is any
new SMS message received by the GSM module and
returns the message number.
getActualMessage int mesg no : Gets the actual
message from the specified message number.
getActualMessage int mesg no, String from no : Gets
the actual message from the specified message
number, but only if it is received from the specified
mobile number.
printOnLCD String val : Prints the specified string on
the serial monitor, if enabled.
sendPhoto function: Sends a signal to capture a photo
by activating a relay for a specified delay, after which
the relay is deactivated.
Future Scope:
1. Improving fingerprint recognition algorithms: The
accuracy and reliability of fingerprint recognition
algorithms are essential for any fingerprint
security system. Researchers can work on
improving the accuracy and reliability of these
algorithms to make them more robust and
effective.
2. Enhancing communication channel security:
GSM and GPRS networks are susceptible to
different types of attacks such as interception and
eavesdropping. Future research can focus on
developing methods to enhance the security of
communication channels between the fingerprint
scanner and the central server, including using
encryption or other secure communication
protocols.
3. Integrating other biometric modalities:
Fingerprint recognition is just one of many
biometric modalities that can be used for security
purposes. Future research can explore the
feasibility of integrating other biometric
modalities such as facial recognition, iris
recognition, or voice recognition to enhance the
security of the system.
4. Investigating the potential use of blockchain
technology: Blockchain technology has gained
popularity recently because of its security and
decentralization features. Future work can
10. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD56188 | Volume – 7 | Issue – 2 | March-April 2023 Page 876
investigate the feasibility of using blockchain
technology to enhance the security and privacy of
fingerprint security systems.
5. Evaluating the system's performance in real-world
scenarios: While fingerprint security systems
using GSM and GPRS show promise in
laboratory environments, it is essential to evaluate
their performance in real-world scenarios. Future
work can focus on conducting large-scale field
trials to assess the system's effectiveness and
identify potential limitations or challenges.
Conclusion:
In summary, a fingerprint security system that
employs GSM and GPRS can serve as a secure and
efficient method for authentication and access
control. The system's ability to validate a person's
identity based on their unique fingerprints makes it
difficult for unauthorized individuals to access
sensitive information or restricted areas. Additionally,
the real-time communication between the fingerprint
scanner and the central server facilitated by GSM and
GPRS technology enables quick response times and
remote monitoring.
Nevertheless, to guarantee the system's effectiveness
and security, further research is necessary to improve
the accuracy and reliability of fingerprint recognition
algorithms, enhance the security of communication
channels, explore the integration of other biometric
modalities, investigate the potential for using
blockchain technology, and evaluate the system's
performance in real-world scenarios.
Reference:
[1] Fingerprint-Based Security System Using GSM
Technology." by T. Manikandan and S.
Sivakumar, International Journal of Innovative
Research in Computer and Communication
Engineering, Vol. 4, Issue 6, June 2016.
[2] "Design of Fingerprint-Based Security System
Using GSM Technology." by B. V. Venkata
Krishna and P. Ravi Kumar, International
Journal of Computer Science and Mobile
Computing, Vol. 5, Issue 8, August 2016.
[3] "Fingerprint Recognition System for Access
Control and Security Using GSM and GPRS."
by D. D. Dhanwate and A. R. Chaudhari,
International Journal of Computer Applications,
Vol. 95, No. 13, June 2014.
[4] "Fingerprint Based Security System Using
GSM and GPRS." by A. R. Khan and S. A.
Khan, International Journal of Computer
Applications, Vol. 46, No. 6, May 2012.
[5] "Design and Implementation of Fingerprint-
Based SecuritySystem Using GSM and GPRS."
by A. R. Khan and S. A. Khan, International
Journal of Computer Applications, Vol. 32, No.
9, October 2011.
MEET THE TEAM
PREETI BHOSALE
preetibhosale89@gmail.co
m
Navi Mumbai,
Maharashtra
NISHANT PARSEKAR
nishparsekar@icloud.com
Thane, Maharashtra
SURAJ MANE
surajm161096@gmail.com
Mumbai, Maharashtra
PRANAV SARVANKAR
pranavsarvankar2715@gmail.co
m
Dombivli, Maharashtra