SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2880
Raspberry Pi Based Surveillance Robot for Home Security
Mr. Sujeet Potdar1, Mr.Sanket Ghule2, Mr. Rohit Nandiwale3, Mr. Baburao Chandkote4, Mr.
Samarth Patil5, Mrs. Yogini Patil6
[1, 2, 3, 4, 5]Diploma Student, Dept. of Computer Engineering, A G Patil polytechnic Institute solapur
[6] Professor, Dept. of Computer engineering, A G Patil polytechnic Institute solapur-
------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In today's world, robots play a vital role. It may
be used for security, to cut down on work time, and to
improve job productivity. The safety of the road, the house,
the office, and the building are all crucial aspects of human
existence. The study proposes a method for increasingpolice
patrolling capability in a givenregion. Thissystem includes a
robot-mounted night vision camera that can catch pictures,
record them, and then communicate them to the control
centre. This system is capable of sending real-timevideoand
audio signals to the control station. This sort of project may
be utilised both at night and during the day. Itcomprisesofa
camera that records high-definition footageandtransmitsit
to a control centre. The system will primarily be used to
identify and report various activities in the surrounding
region to the control station. Many police agencies are
currently employing various sorts of robots to carry out
various risky tasks.
Key Words: home safety, IoT, Raspberry Pi, ultrasonic
sensor, patrolling
1. INTRODUCTION
India's greatest threat is the safety of its women. Women
do not feel safe in a variety of situations. This has to be
addressed as quickly as feasible. Technology evolves and
develops on a daily basis, affecting how people live. As a
result, the focus of this article is on modernising the
technological framework in order to strengthen women's
safety mechanisms.
The term "robot" derives from the Czech word "serf,"
which means "forced labour." It was introduced by
dramatist Karel Capek, whose fictitious robotic devices
were made via chemical and biological means rather than
mechanical ones. A robot is defined as a mechanical
structure capable ofinteractingwithitssurroundings,such
as a wheeled platform, arm, or other building. Sensors to
perceive the surroundings and provide valuable feedback
to the device, and Systems to evaluate sensory data in the
context of the present scenario and direct the device to
respond appropriately.
The fundamental construction of a robot is the robot body,
which contains arms and wheels. To make the arms and
wheels turn under command, some power, like as
electricity, is necessary. One of the most fascinating
elements of a robot is its behaviour, which necessitates
intelligence. Robots are powered by a range of electric
motors that allow them to move in various programmed
motions. A motor's efficiency rating indicateshow muchof
the power it consumes is converted to mechanical energy.
The mechanical system is controlled by a digital logic
circuit. A bridge relay is frequently used to connect the
circuit to the mechanical construction. A control signal
causes a magnetic field in the relay's coil to close the
switch mechanically. Transistors, for example, are good
silicon switches that may be used to regulate mechanical
systems in a variety of technologies.
Robots employ microcontrollers, which are clever
electrical devices. They execute operations that are
comparable to those done by a microprocessor (CPU) in a
computer. Microcontrollers arebuiltforreal-worldcontrol
challenges and are slower and have less memory than
CPUs. The quantity of external componentsrequiredtorun
CPUs and microcontrollers is one of the most significant
disparities between them. Microcontrollers may run
without any additional components and just require an
external crystal or oscillator to function. A
microcontroller's three major factors to consider are
speed, size, and memory. Speed is measured in millions of
cycles per second and is expressed in clock cycles
(Megahertz, MHz). The size of the Microcontroller
determines how many bits of data it can handle in a single
step (for example, 4-, 8-, 16-, and 32-bits).
Women are skilled in organising various groups for a
variety of purposes. They frequently work across ethnic,
religious, ideological, and intellectual barriers.
to promote peace. We realise the importance of women's
security, but we must also recognise that it must be
adequately protected. In a crisis scenario, a woman's
physical strength is inferior to that of a male, and she need
assistance. The greatest method to reduce your risks of
being a victim of violent crime (robbery, sexual assault,
rape, or domestic abuse) is to identifyanduseservicesthat
can assist you in getting out of dangerous circumstances.
Having these applications on your phone can reduce your
risk and provide aid when you need it, whether you're in
an emergency or got separated from pals late at night and
don't know how to go home.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2881
2. LITERATURE SURVEY
The paper [1] proposes a voice catchphrase perceiving
application to perceive the client and enact the application
usefulness in any event, when the versatile keypad locked.
The GPS module tracks the longitude and scope to follow a
definite area of a client and sends the pre-put away crisis
message including area to the enlisted contact numbers.
The Audio Recording module begins the recording of the
discussion for five minutes and put away as confirmations.
The message goes in line if network issue and send when
organization gets accessible.
The paper [2] proposes a crisis reaction circumstance
perceiving application called as IPROB to give ladies
security even in the circumstance like psychological
oppressor assaults or catastrophic event, simply by
shaking the portable over the predefined edge esteem
naturally actuate the framework. It begins catching the
encompassing voice to test and affirm the hazardous
IPROB circumstance where it raised the notice and client
neglect to answer in predefine time then the messagealert
ships off the register contacts.
The paper [3] proposes a SCIWARS application (Spy
Camera Identification and Women Attack Rescue System)
which comprise of two modules. A first modulegoaboutas
a keen alarms framework which distinguishestheinfrared
beams coming from each Night-vision stowed away
cameras set in evolving rooms-inns room and so forth and
furthermore educated the client about perilous spot
through message. Presently it's the client obligation
regardless of whether to enlist an objection by sending the
notice with the area to lawful specialists like Police.
The paper [4] proposes an android application to give
security at two distinct circumstances as follows. TheFirst
module give security to Women at Emergency Situations
propose a Save Our Souls (SOS) application to gives the
security on a solitary snap of SOS button for the ladies
going around evening time or alone. Don't bother opening
the screen, rather simply by squeezing the power buttonit
straightforwardly sets off the application to run at the
foundation, to send the crisis message remembering the
area for the type of scope and longitude to the enrolled
contacts. The subsequent module proposes an android
based home security framework that gives security of
house assets and Senior Citizen in the client
nonappearance. Since the security of senior resident is
consistently a worry with expanding number of theft
occurrences.
The paper [5] proposes an application, where a solitary
snap of SOS communicates something specific containing
the area and additionally sound videocall tothewatchman
number. At recipient contact the area URL in the message
to see it in the Google Map. It likewise gives different assist
devices with enjoying First-Aid help, Fake Call Help and
video call. The First-Aid help instrumentgivestheassiston
different wellbeing with giving issues happened at an
unplanned or crisis circumstance during the evening time.
Medical aid help for different issues are as: oblivious and
not breathing, stifling, draining vigorously, consumes,
coronary episode, diabetes and so on.
The IEEE genuine venture [6] propose a computerized
exceptionally dependable ladies security gadget which
comprise of the high level sensors implanted in a wearable
dresses. It comprise of cutting edge sensors, GSM and
ATMEGA8 microcontroller with ARDUINO device which
hold client under perception at constantly. It screens the
heart beat-rate,temperature andvibrationin bodythrough
sensors to check for uncomfortable circumstance. In such
circumstance it will enact the GPS module to follow the
area and remote camera to catch the pictures that get ship
off the control room of the collector through GSM modules
to make vital moves.
The Paper [7] proposed a convenient gadget as a belt
which is consequently initiated base on the tension
distinction passes the boundary in hazardous
circumstance. A GPS module track the area and sends the
crisis messages to three crisis contactslikeclockwork with
refreshed area through GSM. The framework likewise
initiates the shouting caution that utilizes an alarm, to call
out for help and furthermore produces an electric shock to
hurt the assailant for self-protectionwhichmightassistthe
casualty with getting away. The gadget essentially
comprises of miniature regulatorontheATMega328board
which modified utilizing the ARDUINO programming
language.
The paper [8] proposes the ladies security gadget calledas
"Suraksha" which is a simple to work gadget. This gadget
can be initiated through-voice order, Press a switch key
and shock (for example at the point when the gadget is
tossed with force, a power sensor used to actuate the
gadget). In crisis circumstance it will send the message
including moment area to the police, through the
transmitter module and enlisted numbers by means of a
GSM module. At present the work is under cycletoinstall it
in gems, portable or other transporter like belt and so
forth.
The paper [9] proposes a drawn out vehicle global
positioning framework to follow the vehicle in light of GPS
with that it additionallygives thewellbeingthrougha crisis
button held under the vehicle seat utilizing GSM. As the
rising monetary development pace of a country, many
organizations are laying out their arrangementintheclose
by locale of the urban communities. Since, the security of
ladies workers' insidetheconfidential transportationisthe
organizations' liability. In the hazardous circumstance a
worker need to press the crisis buttontoinitiatethegadget
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2882
Teltonika-FM1100. It thus empowers at the same time the
android gadget used to catch thepicturesinsidethevehicle
and the GPS framework which track the vehiclepositionas
scope and longitude. An alarm message including the area
is send card to the organization exceptional group and
close by police headquarters throughGSMSIM.Afterthatit
is the obligation of police crew and company group to deal
with the circumstance.
3. PROPOSED ARCHITECTURE
In many parts of the world, home safety is currently the
most pressing worry. Women and men alike are still afraid
in isolated regions. So, utilising Raspberry PI, we suggest a
security patrolling robot.
Fig 1 block diagram of proposed system
The device secures any location by mounting cameras and
microphones on a robotic vehicle. Therobotic carfollowsa
predetermined course and has cameras and acoustic
sensors. While patrolling, it follows a predetermined
course. If sound is detected, it stops at specific locations
and carries on to the next. For patrolling thespecifiedarea,
the system employs an IR-based path-following system. It
uses a camera to monitor each location and detect any
problems. It has the capacity to listen in on the noise in the
area. The robot hears. After the environment has quieted
down, any anomalous activity begins to move towards the
sound on its predetermined course. It next scans the
surroundings with its camera,lookingforanyhumanfaces.
It instantaneously collects and transmits photographs of
the scenario to the IOT smartphone app. For receivingsent
photos and showing them to theuserwithalarmnoises,we
utilise IOT fairebase. As a result, we propose a completely
autonomous security robot that works around the clock
and patrols broad regions on its own to keep the facility
safe.
4. CONCLUSION
According to this system, a night vision camera isused
to monitor the whole region, andanautomatedsystem
detects abnormal behaviour by sending a robot down
a certain path to record the area and upload it through
IOT. This technology is a clever, automated approach
to patrol at night
5. REFERENCES
[1] Dongare Uma, Vyavahare Vishakha and Raut Ravina,
“An Android Application for Women Safety Based on
Voice Recognition”, Department of Computer
Sciences BSIOTR wagholi, Savitribai Phule Pune
University India, ISSN 2320–088X International
Journal of Computer Science and Mobile Computing
(IJCSMC) online at www.ijcsmc.com,Vol.4 Issue.3, pg.
216-220, March- 2015
[2] MAGESH KUMAR.S and RAJ KUMAR.M, “IPROB –
EMERGENCY APPLICATION FOR WOMEN”,
Department of Computer science Sree Krishna
College of Engineering UnaivillageVellore(TN)India,
ISSN 2250-3153 International Journal of Scientific
and Research Publications, online at the link
www.ijsrp.org , Volume 4, Issue 3, March 2014.
[3] Vaijayanti Pawar, Prof. N.R.Wankhade,Dipika Nikam,
Kanchan Jadhav andNeha Pathak,“SCIWARSAndroid
Application for Women Safety”, Department of
Computer Engineering, Late G.N.S.COE Nasik India,
ISSN: 2248-9622International Journal ofEngineering
Research and Applications Online at the link
www.ijera.com, Volume 4, Issue 3(Version 1),
pp.823826, March 2014.
[4] Bhaskar Kamal Baishya, “Mobile Phone Embedded
With Medical and SecurityApplications”,Department
of Computer Science NorthEasternRegional Institute
of Science and Technology Nirjuli Arunachal Pradesh
India, e-ISSN: 2278-0661 p- ISSN: 2278-8727 IOSR
Journal of Computer Engg (IOSR-JCE)
www.iosrjournals.org, Volume16,Issue3(VersionIX
), PP 30-3, May-Jun. 2014.
[5] Dr. Sridhar Mandapati, Sravya Pamidi and Sriharitha
Ambati, “A MobileBased WomenSafetyApplication(I
Safe Apps)”, Department of Computer Applications
R.V.R & J.C College of Engineering Guntur India,
eISSN: 2278-0661, p-ISSN: 2278-8727, IOSR Journal
of Computer Engg (IOSR-JCE) www.iosrjournals.org,
Volume 17, Issue 1 (Version I), PP 29-34, Jan.–Feb.
2015
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2883
[6] THOOYAVAN V, “ADVANCED SECURITYSYSTEMFOR
WOMEN”, Department of ECE Vidyaa VikasCollegeof
Engineering and Technology Vasai Thane India,Final
year project, Serial number HEM 128 IEEE 2014
Project List under real time target surveillance
system, slides share on www.slideshare.net, Jun 24,
2014.
[7] Prof. Basavaraj Chougula, Archana Naik, Monika
Monu, Priya Patil and Priyanka Das “SMART GIRLS
SECURITY SYSTEM”, Department of Electronics and
telecommunication KLE’s College of Engineeringand
Technology Belgaum India, ISSN 2319 – 4847
International Journal of Application or Innovation in
Engineering & Management (IJAIEM) Web Site:
www.ijaiem.org, Volume 3, Issue 4, April 2014.
[8] Nishant Bhardwaj and Nitish Aggarwal, “Design and
Development of “Suraksha”-AWomenSafetyDevice”,
Department of Electronics and Communication ITM
UNIVERSITY Huda Sector 23-A Gurgaon Delhi India,
ISSN 0974-2239 International Journal ofInformation
& Computation Technology online available at
http://www. irphouse.com, Volume 4, pp. 787-792,
November 2014.
[9] Poonam Bhilare, Akshay Mohite, Dhanashri Kamble,
Swapnil Makode and Rasika Kahane, “Women
Employee Security System usingGPSAndGSM Based
Vehicle Tracking”, Department of Computer
Engineering Vishwakarma IOT Savitribai Phule Pune
University India, E-ISSN:-2349-7610
INTERNATIONAL JOURNAL FOR RESEARCH IN
EMERGING SCIENCE AND TECHNOLOGY, Volume-2,
ISSUE-1, JAN-2015.

More Related Content

Similar to Raspberry Pi Based Surveillance Robot for Home Security

IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
IRJET Journal
 
IRJET- Multiple Motion Control System of Robotic Car Based on IoT
IRJET- Multiple Motion Control System of Robotic Car Based on IoTIRJET- Multiple Motion Control System of Robotic Car Based on IoT
IRJET- Multiple Motion Control System of Robotic Car Based on IoT
IRJET Journal
 
ATM System using Augmented Reality Technology
ATM System using Augmented Reality TechnologyATM System using Augmented Reality Technology
ATM System using Augmented Reality Technology
IRJET Journal
 
IRJET - Automatic Toll E-Tickting System for Transportation and Finding o...
IRJET -  	  Automatic Toll E-Tickting System for Transportation and Finding o...IRJET -  	  Automatic Toll E-Tickting System for Transportation and Finding o...
IRJET - Automatic Toll E-Tickting System for Transportation and Finding o...
IRJET Journal
 
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IRJET Journal
 
IRJET- TOUCH ME NOT-A Women Safety Device
IRJET- TOUCH ME NOT-A Women Safety DeviceIRJET- TOUCH ME NOT-A Women Safety Device
IRJET- TOUCH ME NOT-A Women Safety Device
IRJET Journal
 
Internet of Things (Iot) Based Robotic Arm
Internet of Things (Iot) Based Robotic ArmInternet of Things (Iot) Based Robotic Arm
Internet of Things (Iot) Based Robotic Arm
IRJET Journal
 
Intelligent vehicle using embedded system
Intelligent vehicle using embedded systemIntelligent vehicle using embedded system
Intelligent vehicle using embedded system
ijiert bestjournal
 
IRJET- Implementation of Children Tracking System on Android Mobile Termi...
IRJET-  	  Implementation of Children Tracking System on Android Mobile Termi...IRJET-  	  Implementation of Children Tracking System on Android Mobile Termi...
IRJET- Implementation of Children Tracking System on Android Mobile Termi...
IRJET Journal
 
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET Journal
 
Spy Robot with Wireless Camera using GSM
Spy Robot with Wireless Camera using GSMSpy Robot with Wireless Camera using GSM
Spy Robot with Wireless Camera using GSM
IRJET Journal
 
IRJET - Women Safety Device with GPS Tracking and Alerts
IRJET -  	  Women Safety Device with GPS Tracking and AlertsIRJET -  	  Women Safety Device with GPS Tracking and Alerts
IRJET - Women Safety Device with GPS Tracking and Alerts
IRJET Journal
 
IRJET- Vehicle Black Box System using IoT
IRJET- Vehicle Black Box System using IoTIRJET- Vehicle Black Box System using IoT
IRJET- Vehicle Black Box System using IoT
IRJET Journal
 
IRJET - Home Automation for Physically Challenged and Elder People
IRJET -  	  Home Automation for Physically Challenged and Elder PeopleIRJET -  	  Home Automation for Physically Challenged and Elder People
IRJET - Home Automation for Physically Challenged and Elder People
IRJET Journal
 
IRJET- Theft Control using IoT
IRJET-  	  Theft Control using IoTIRJET-  	  Theft Control using IoT
IRJET- Theft Control using IoT
IRJET Journal
 
IoT based Multipurpose Surveillance Robot
IoT based Multipurpose Surveillance RobotIoT based Multipurpose Surveillance Robot
IoT based Multipurpose Surveillance Robot
IRJET Journal
 
IRJET- IoT based Classroom Automation System
IRJET-  	  IoT based Classroom Automation SystemIRJET-  	  IoT based Classroom Automation System
IRJET- IoT based Classroom Automation System
IRJET Journal
 
IRJET- Smart Sensory Furniture
IRJET-  	  Smart Sensory FurnitureIRJET-  	  Smart Sensory Furniture
IRJET- Smart Sensory Furniture
IRJET Journal
 
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert Management
IRJET Journal
 
Smart Home for Senior Citizens
Smart Home for Senior CitizensSmart Home for Senior Citizens
Smart Home for Senior Citizens
IRJET Journal
 

Similar to Raspberry Pi Based Surveillance Robot for Home Security (20)

IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
 
IRJET- Multiple Motion Control System of Robotic Car Based on IoT
IRJET- Multiple Motion Control System of Robotic Car Based on IoTIRJET- Multiple Motion Control System of Robotic Car Based on IoT
IRJET- Multiple Motion Control System of Robotic Car Based on IoT
 
ATM System using Augmented Reality Technology
ATM System using Augmented Reality TechnologyATM System using Augmented Reality Technology
ATM System using Augmented Reality Technology
 
IRJET - Automatic Toll E-Tickting System for Transportation and Finding o...
IRJET -  	  Automatic Toll E-Tickting System for Transportation and Finding o...IRJET -  	  Automatic Toll E-Tickting System for Transportation and Finding o...
IRJET - Automatic Toll E-Tickting System for Transportation and Finding o...
 
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
 
IRJET- TOUCH ME NOT-A Women Safety Device
IRJET- TOUCH ME NOT-A Women Safety DeviceIRJET- TOUCH ME NOT-A Women Safety Device
IRJET- TOUCH ME NOT-A Women Safety Device
 
Internet of Things (Iot) Based Robotic Arm
Internet of Things (Iot) Based Robotic ArmInternet of Things (Iot) Based Robotic Arm
Internet of Things (Iot) Based Robotic Arm
 
Intelligent vehicle using embedded system
Intelligent vehicle using embedded systemIntelligent vehicle using embedded system
Intelligent vehicle using embedded system
 
IRJET- Implementation of Children Tracking System on Android Mobile Termi...
IRJET-  	  Implementation of Children Tracking System on Android Mobile Termi...IRJET-  	  Implementation of Children Tracking System on Android Mobile Termi...
IRJET- Implementation of Children Tracking System on Android Mobile Termi...
 
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
 
Spy Robot with Wireless Camera using GSM
Spy Robot with Wireless Camera using GSMSpy Robot with Wireless Camera using GSM
Spy Robot with Wireless Camera using GSM
 
IRJET - Women Safety Device with GPS Tracking and Alerts
IRJET -  	  Women Safety Device with GPS Tracking and AlertsIRJET -  	  Women Safety Device with GPS Tracking and Alerts
IRJET - Women Safety Device with GPS Tracking and Alerts
 
IRJET- Vehicle Black Box System using IoT
IRJET- Vehicle Black Box System using IoTIRJET- Vehicle Black Box System using IoT
IRJET- Vehicle Black Box System using IoT
 
IRJET - Home Automation for Physically Challenged and Elder People
IRJET -  	  Home Automation for Physically Challenged and Elder PeopleIRJET -  	  Home Automation for Physically Challenged and Elder People
IRJET - Home Automation for Physically Challenged and Elder People
 
IRJET- Theft Control using IoT
IRJET-  	  Theft Control using IoTIRJET-  	  Theft Control using IoT
IRJET- Theft Control using IoT
 
IoT based Multipurpose Surveillance Robot
IoT based Multipurpose Surveillance RobotIoT based Multipurpose Surveillance Robot
IoT based Multipurpose Surveillance Robot
 
IRJET- IoT based Classroom Automation System
IRJET-  	  IoT based Classroom Automation SystemIRJET-  	  IoT based Classroom Automation System
IRJET- IoT based Classroom Automation System
 
IRJET- Smart Sensory Furniture
IRJET-  	  Smart Sensory FurnitureIRJET-  	  Smart Sensory Furniture
IRJET- Smart Sensory Furniture
 
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert Management
 
Smart Home for Senior Citizens
Smart Home for Senior CitizensSmart Home for Senior Citizens
Smart Home for Senior Citizens
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
HODECEDSIET
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 

Recently uploaded (20)

ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 

Raspberry Pi Based Surveillance Robot for Home Security

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2880 Raspberry Pi Based Surveillance Robot for Home Security Mr. Sujeet Potdar1, Mr.Sanket Ghule2, Mr. Rohit Nandiwale3, Mr. Baburao Chandkote4, Mr. Samarth Patil5, Mrs. Yogini Patil6 [1, 2, 3, 4, 5]Diploma Student, Dept. of Computer Engineering, A G Patil polytechnic Institute solapur [6] Professor, Dept. of Computer engineering, A G Patil polytechnic Institute solapur- ------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In today's world, robots play a vital role. It may be used for security, to cut down on work time, and to improve job productivity. The safety of the road, the house, the office, and the building are all crucial aspects of human existence. The study proposes a method for increasingpolice patrolling capability in a givenregion. Thissystem includes a robot-mounted night vision camera that can catch pictures, record them, and then communicate them to the control centre. This system is capable of sending real-timevideoand audio signals to the control station. This sort of project may be utilised both at night and during the day. Itcomprisesofa camera that records high-definition footageandtransmitsit to a control centre. The system will primarily be used to identify and report various activities in the surrounding region to the control station. Many police agencies are currently employing various sorts of robots to carry out various risky tasks. Key Words: home safety, IoT, Raspberry Pi, ultrasonic sensor, patrolling 1. INTRODUCTION India's greatest threat is the safety of its women. Women do not feel safe in a variety of situations. This has to be addressed as quickly as feasible. Technology evolves and develops on a daily basis, affecting how people live. As a result, the focus of this article is on modernising the technological framework in order to strengthen women's safety mechanisms. The term "robot" derives from the Czech word "serf," which means "forced labour." It was introduced by dramatist Karel Capek, whose fictitious robotic devices were made via chemical and biological means rather than mechanical ones. A robot is defined as a mechanical structure capable ofinteractingwithitssurroundings,such as a wheeled platform, arm, or other building. Sensors to perceive the surroundings and provide valuable feedback to the device, and Systems to evaluate sensory data in the context of the present scenario and direct the device to respond appropriately. The fundamental construction of a robot is the robot body, which contains arms and wheels. To make the arms and wheels turn under command, some power, like as electricity, is necessary. One of the most fascinating elements of a robot is its behaviour, which necessitates intelligence. Robots are powered by a range of electric motors that allow them to move in various programmed motions. A motor's efficiency rating indicateshow muchof the power it consumes is converted to mechanical energy. The mechanical system is controlled by a digital logic circuit. A bridge relay is frequently used to connect the circuit to the mechanical construction. A control signal causes a magnetic field in the relay's coil to close the switch mechanically. Transistors, for example, are good silicon switches that may be used to regulate mechanical systems in a variety of technologies. Robots employ microcontrollers, which are clever electrical devices. They execute operations that are comparable to those done by a microprocessor (CPU) in a computer. Microcontrollers arebuiltforreal-worldcontrol challenges and are slower and have less memory than CPUs. The quantity of external componentsrequiredtorun CPUs and microcontrollers is one of the most significant disparities between them. Microcontrollers may run without any additional components and just require an external crystal or oscillator to function. A microcontroller's three major factors to consider are speed, size, and memory. Speed is measured in millions of cycles per second and is expressed in clock cycles (Megahertz, MHz). The size of the Microcontroller determines how many bits of data it can handle in a single step (for example, 4-, 8-, 16-, and 32-bits). Women are skilled in organising various groups for a variety of purposes. They frequently work across ethnic, religious, ideological, and intellectual barriers. to promote peace. We realise the importance of women's security, but we must also recognise that it must be adequately protected. In a crisis scenario, a woman's physical strength is inferior to that of a male, and she need assistance. The greatest method to reduce your risks of being a victim of violent crime (robbery, sexual assault, rape, or domestic abuse) is to identifyanduseservicesthat can assist you in getting out of dangerous circumstances. Having these applications on your phone can reduce your risk and provide aid when you need it, whether you're in an emergency or got separated from pals late at night and don't know how to go home.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2881 2. LITERATURE SURVEY The paper [1] proposes a voice catchphrase perceiving application to perceive the client and enact the application usefulness in any event, when the versatile keypad locked. The GPS module tracks the longitude and scope to follow a definite area of a client and sends the pre-put away crisis message including area to the enlisted contact numbers. The Audio Recording module begins the recording of the discussion for five minutes and put away as confirmations. The message goes in line if network issue and send when organization gets accessible. The paper [2] proposes a crisis reaction circumstance perceiving application called as IPROB to give ladies security even in the circumstance like psychological oppressor assaults or catastrophic event, simply by shaking the portable over the predefined edge esteem naturally actuate the framework. It begins catching the encompassing voice to test and affirm the hazardous IPROB circumstance where it raised the notice and client neglect to answer in predefine time then the messagealert ships off the register contacts. The paper [3] proposes a SCIWARS application (Spy Camera Identification and Women Attack Rescue System) which comprise of two modules. A first modulegoaboutas a keen alarms framework which distinguishestheinfrared beams coming from each Night-vision stowed away cameras set in evolving rooms-inns room and so forth and furthermore educated the client about perilous spot through message. Presently it's the client obligation regardless of whether to enlist an objection by sending the notice with the area to lawful specialists like Police. The paper [4] proposes an android application to give security at two distinct circumstances as follows. TheFirst module give security to Women at Emergency Situations propose a Save Our Souls (SOS) application to gives the security on a solitary snap of SOS button for the ladies going around evening time or alone. Don't bother opening the screen, rather simply by squeezing the power buttonit straightforwardly sets off the application to run at the foundation, to send the crisis message remembering the area for the type of scope and longitude to the enrolled contacts. The subsequent module proposes an android based home security framework that gives security of house assets and Senior Citizen in the client nonappearance. Since the security of senior resident is consistently a worry with expanding number of theft occurrences. The paper [5] proposes an application, where a solitary snap of SOS communicates something specific containing the area and additionally sound videocall tothewatchman number. At recipient contact the area URL in the message to see it in the Google Map. It likewise gives different assist devices with enjoying First-Aid help, Fake Call Help and video call. The First-Aid help instrumentgivestheassiston different wellbeing with giving issues happened at an unplanned or crisis circumstance during the evening time. Medical aid help for different issues are as: oblivious and not breathing, stifling, draining vigorously, consumes, coronary episode, diabetes and so on. The IEEE genuine venture [6] propose a computerized exceptionally dependable ladies security gadget which comprise of the high level sensors implanted in a wearable dresses. It comprise of cutting edge sensors, GSM and ATMEGA8 microcontroller with ARDUINO device which hold client under perception at constantly. It screens the heart beat-rate,temperature andvibrationin bodythrough sensors to check for uncomfortable circumstance. In such circumstance it will enact the GPS module to follow the area and remote camera to catch the pictures that get ship off the control room of the collector through GSM modules to make vital moves. The Paper [7] proposed a convenient gadget as a belt which is consequently initiated base on the tension distinction passes the boundary in hazardous circumstance. A GPS module track the area and sends the crisis messages to three crisis contactslikeclockwork with refreshed area through GSM. The framework likewise initiates the shouting caution that utilizes an alarm, to call out for help and furthermore produces an electric shock to hurt the assailant for self-protectionwhichmightassistthe casualty with getting away. The gadget essentially comprises of miniature regulatorontheATMega328board which modified utilizing the ARDUINO programming language. The paper [8] proposes the ladies security gadget calledas "Suraksha" which is a simple to work gadget. This gadget can be initiated through-voice order, Press a switch key and shock (for example at the point when the gadget is tossed with force, a power sensor used to actuate the gadget). In crisis circumstance it will send the message including moment area to the police, through the transmitter module and enlisted numbers by means of a GSM module. At present the work is under cycletoinstall it in gems, portable or other transporter like belt and so forth. The paper [9] proposes a drawn out vehicle global positioning framework to follow the vehicle in light of GPS with that it additionallygives thewellbeingthrougha crisis button held under the vehicle seat utilizing GSM. As the rising monetary development pace of a country, many organizations are laying out their arrangementintheclose by locale of the urban communities. Since, the security of ladies workers' insidetheconfidential transportationisthe organizations' liability. In the hazardous circumstance a worker need to press the crisis buttontoinitiatethegadget
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2882 Teltonika-FM1100. It thus empowers at the same time the android gadget used to catch thepicturesinsidethevehicle and the GPS framework which track the vehiclepositionas scope and longitude. An alarm message including the area is send card to the organization exceptional group and close by police headquarters throughGSMSIM.Afterthatit is the obligation of police crew and company group to deal with the circumstance. 3. PROPOSED ARCHITECTURE In many parts of the world, home safety is currently the most pressing worry. Women and men alike are still afraid in isolated regions. So, utilising Raspberry PI, we suggest a security patrolling robot. Fig 1 block diagram of proposed system The device secures any location by mounting cameras and microphones on a robotic vehicle. Therobotic carfollowsa predetermined course and has cameras and acoustic sensors. While patrolling, it follows a predetermined course. If sound is detected, it stops at specific locations and carries on to the next. For patrolling thespecifiedarea, the system employs an IR-based path-following system. It uses a camera to monitor each location and detect any problems. It has the capacity to listen in on the noise in the area. The robot hears. After the environment has quieted down, any anomalous activity begins to move towards the sound on its predetermined course. It next scans the surroundings with its camera,lookingforanyhumanfaces. It instantaneously collects and transmits photographs of the scenario to the IOT smartphone app. For receivingsent photos and showing them to theuserwithalarmnoises,we utilise IOT fairebase. As a result, we propose a completely autonomous security robot that works around the clock and patrols broad regions on its own to keep the facility safe. 4. CONCLUSION According to this system, a night vision camera isused to monitor the whole region, andanautomatedsystem detects abnormal behaviour by sending a robot down a certain path to record the area and upload it through IOT. This technology is a clever, automated approach to patrol at night 5. REFERENCES [1] Dongare Uma, Vyavahare Vishakha and Raut Ravina, “An Android Application for Women Safety Based on Voice Recognition”, Department of Computer Sciences BSIOTR wagholi, Savitribai Phule Pune University India, ISSN 2320–088X International Journal of Computer Science and Mobile Computing (IJCSMC) online at www.ijcsmc.com,Vol.4 Issue.3, pg. 216-220, March- 2015 [2] MAGESH KUMAR.S and RAJ KUMAR.M, “IPROB – EMERGENCY APPLICATION FOR WOMEN”, Department of Computer science Sree Krishna College of Engineering UnaivillageVellore(TN)India, ISSN 2250-3153 International Journal of Scientific and Research Publications, online at the link www.ijsrp.org , Volume 4, Issue 3, March 2014. [3] Vaijayanti Pawar, Prof. N.R.Wankhade,Dipika Nikam, Kanchan Jadhav andNeha Pathak,“SCIWARSAndroid Application for Women Safety”, Department of Computer Engineering, Late G.N.S.COE Nasik India, ISSN: 2248-9622International Journal ofEngineering Research and Applications Online at the link www.ijera.com, Volume 4, Issue 3(Version 1), pp.823826, March 2014. [4] Bhaskar Kamal Baishya, “Mobile Phone Embedded With Medical and SecurityApplications”,Department of Computer Science NorthEasternRegional Institute of Science and Technology Nirjuli Arunachal Pradesh India, e-ISSN: 2278-0661 p- ISSN: 2278-8727 IOSR Journal of Computer Engg (IOSR-JCE) www.iosrjournals.org, Volume16,Issue3(VersionIX ), PP 30-3, May-Jun. 2014. [5] Dr. Sridhar Mandapati, Sravya Pamidi and Sriharitha Ambati, “A MobileBased WomenSafetyApplication(I Safe Apps)”, Department of Computer Applications R.V.R & J.C College of Engineering Guntur India, eISSN: 2278-0661, p-ISSN: 2278-8727, IOSR Journal of Computer Engg (IOSR-JCE) www.iosrjournals.org, Volume 17, Issue 1 (Version I), PP 29-34, Jan.–Feb. 2015
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2883 [6] THOOYAVAN V, “ADVANCED SECURITYSYSTEMFOR WOMEN”, Department of ECE Vidyaa VikasCollegeof Engineering and Technology Vasai Thane India,Final year project, Serial number HEM 128 IEEE 2014 Project List under real time target surveillance system, slides share on www.slideshare.net, Jun 24, 2014. [7] Prof. Basavaraj Chougula, Archana Naik, Monika Monu, Priya Patil and Priyanka Das “SMART GIRLS SECURITY SYSTEM”, Department of Electronics and telecommunication KLE’s College of Engineeringand Technology Belgaum India, ISSN 2319 – 4847 International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org, Volume 3, Issue 4, April 2014. [8] Nishant Bhardwaj and Nitish Aggarwal, “Design and Development of “Suraksha”-AWomenSafetyDevice”, Department of Electronics and Communication ITM UNIVERSITY Huda Sector 23-A Gurgaon Delhi India, ISSN 0974-2239 International Journal ofInformation & Computation Technology online available at http://www. irphouse.com, Volume 4, pp. 787-792, November 2014. [9] Poonam Bhilare, Akshay Mohite, Dhanashri Kamble, Swapnil Makode and Rasika Kahane, “Women Employee Security System usingGPSAndGSM Based Vehicle Tracking”, Department of Computer Engineering Vishwakarma IOT Savitribai Phule Pune University India, E-ISSN:-2349-7610 INTERNATIONAL JOURNAL FOR RESEARCH IN EMERGING SCIENCE AND TECHNOLOGY, Volume-2, ISSUE-1, JAN-2015.