This document describes an automated anti-theft and misuse alerting system for ATMs that uses face detection. The system uses a Raspberry Pi board running a face detection algorithm based on Haar classifiers to detect a user's face before opening the ATM door. Vibration sensors on the door and ATM trigger an alarm if forced entry is detected. The system is designed to prevent theft and attacks at ATMs by only granting access after verifying the user's identity and alerting authorities if intrusion is detected.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...IJAEMSJORNAL
This paper is a study of a fingerprint recognition system based on minutiae based fingerprint algorithms used in various techniques. This line of track mainly involves extraction of minutiae points from the model fingerprint images and fingerprint matching based on the number of minutiae pairings among to fingerprints. This paper also provides the design method of fingerprint based student attendance with help of GSM. This system ignores the requirement for stationary materials and personnel for keeping of records. The main objective of this project is to develop an embedded system, which is used for security applications. The biometrics technology is rapidly progressing and offers attractive opportunities. In recent years, biometric authentication has grown in popularity as a means of personal identification in college administration systems. The prominent biometric methods that may be used for authentication include fingerprint, palmprint, and handprint, face recognition, speech recognition, dental and eye biometrics. In this paper, a microcontroller based prototype of attendance system using fingerprint sensor and face recognition module is implemented. The tracking module is used here to identify the location of the missing person.
The Internet-based security Soft-i-Robot is modeled using Soft computing paradigms for problem solving and decision-making in complex and ill-structured situations. Soft-i-Robot monitors the workspace with multimedia devices and sensor using an Internet application program. The model has sensory subsystems such as Intruder detection which, detects intruder, captures image and sends to server, and an Obstacle Avoidance Unit to detect the objects in the path of the mobile robot. These multiple features with hybrid Soft computing techniques depart the developed Soft-i-Robot from the existing developments, proving that the streaming technology-based approach greatly improves the sensibility of robot tele-operation. The relatively powerful online robots available today provoke the simple question, in terms of two competing goals: recognition accuracy and computing time. Improved recognition accuracy and reduced computing time for face recognition of the intruder is obtained using Morphological Shared Weight Neural Network. To obtain a collision-free optimized path, Soft-i-Robot uses derivative free Genetic Algorithm. With rapid expansion of Robotics and Soft computing paradigms, robotic technology touches upon self-understanding of humans, socio-economic, legal and ethical issues leading to improved performance rate and information processing capabilities.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...IJAEMSJORNAL
This paper is a study of a fingerprint recognition system based on minutiae based fingerprint algorithms used in various techniques. This line of track mainly involves extraction of minutiae points from the model fingerprint images and fingerprint matching based on the number of minutiae pairings among to fingerprints. This paper also provides the design method of fingerprint based student attendance with help of GSM. This system ignores the requirement for stationary materials and personnel for keeping of records. The main objective of this project is to develop an embedded system, which is used for security applications. The biometrics technology is rapidly progressing and offers attractive opportunities. In recent years, biometric authentication has grown in popularity as a means of personal identification in college administration systems. The prominent biometric methods that may be used for authentication include fingerprint, palmprint, and handprint, face recognition, speech recognition, dental and eye biometrics. In this paper, a microcontroller based prototype of attendance system using fingerprint sensor and face recognition module is implemented. The tracking module is used here to identify the location of the missing person.
The Internet-based security Soft-i-Robot is modeled using Soft computing paradigms for problem solving and decision-making in complex and ill-structured situations. Soft-i-Robot monitors the workspace with multimedia devices and sensor using an Internet application program. The model has sensory subsystems such as Intruder detection which, detects intruder, captures image and sends to server, and an Obstacle Avoidance Unit to detect the objects in the path of the mobile robot. These multiple features with hybrid Soft computing techniques depart the developed Soft-i-Robot from the existing developments, proving that the streaming technology-based approach greatly improves the sensibility of robot tele-operation. The relatively powerful online robots available today provoke the simple question, in terms of two competing goals: recognition accuracy and computing time. Improved recognition accuracy and reduced computing time for face recognition of the intruder is obtained using Morphological Shared Weight Neural Network. To obtain a collision-free optimized path, Soft-i-Robot uses derivative free Genetic Algorithm. With rapid expansion of Robotics and Soft computing paradigms, robotic technology touches upon self-understanding of humans, socio-economic, legal and ethical issues leading to improved performance rate and information processing capabilities.
Two Step Design for Personal Authentication Using Finger Vein Recognition and...IJTET Journal
Abstract— This paper has proposed another methodology of constant implanted finger vein distinguishment alongside GSM innovation for individual validation and security is made. [1]Unique human attributes are utilized to distinguish an individual or to confirm a character. Finger vein recognizer, is utilized as a first level security for a confirmation process furthermore for showing or alarming unapproved individual if entered. The equipment is the procedure with the assistance of Finger vein recognizer and transformed utilizing MATLAB programming, which is modest and dependable in all the structures. GSM innovation is utilized as a second level security, where the client sends a Novel code to the GSM recipient which on distinguishment sends a secret key to the Client for opening. [2]The proposed framework takes just 0.5 seconds to confirm one info finger vein test and the normal mistake rate (ERR) of 0.06.
Biometrics technology is rapidly progressing and offers attractive opportunities. In recent years, biometric authentication has grown in popularity as a means of personal identification in ATM authentication systems. The prominent biometric methods that may be used for authentication include fingerprint, palmprint, handprint, face recognition, speech recognition, dental and eye biometrics. In this paper, a microcontroller based prototype of ATM cashbox access system using fingerprint sensor module is implemented. An 8-bit PIC16F877A microcontroller developed by Microchip Technology is used in the system. The necessary software is written in Embedded 'C' and the system is tested.
Biometric system is a pattern identification system that recognizes an individual by determining the originality of the physical features and behavioral characteristic of that person. Of all the recently used biometric techniques, fingerprint identification systems have gained the most popularity because of the prolonged existence of fingerprints and its extensive use. Fingerprint is dependable biometric trait as it is an idiosyncratic and dedicated. It is a technology that is increasingly used in various fields like forensics and security purpose. The vital objective of our system is to make ATM transaction more secure and user friendly. This system replaces traditional ATM cards with fingerprint. Therefore, there is no need to carry ATM cards to perform transactions. The money transaction can be made more secure without worrying about the card to be lost. In our system we are using embedded system with biometrics i.e r305 sensor and UART microcontroller. The Fingerprint and the user_id of all users are stored in the database. Fingerprints are used to identify whether the Person is genuine. A Fingerprint scanner is used to acquire the fingerprint of the individual, after which the system requests for the PIN (Personal Identification Number). The user gets three chances to get him authenticated. If the fingerprints do not match further authentication will be needed. After the verification with the data stored in the system database, the user is allowed to make transactions.
International Journal of Research in Engineering and Science is an open access peer-reviewed international forum for scientists involved in research to publish quality and refereed papers. Papers reporting original research or experimentally proved review work are welcome. Papers for publication are selected through peer review to ensure originality, relevance, and readability.
A Modern Technique for Unauthorized Human Detection and Intimationijtsrd
"Technological advancements are inevitable and the field of IoT is no exception. The utilization of the technologies in various sectors is highly employed. Even though we use technology in various sectors, the employment of technology for security purposes is very low. The Existing security in various places only CCTV is used for monitoring and recording. Even there are existing security systems where an alert is sent via an email which requires a stable internet connection. It is unlikely that we expect the user to be always connected to an internet source. In the Proposed system, authorized users faces will be trained and stored in a Database. Initially, when an unknown known person enters in the zone the camera module will capture the intruders face. The captured intruder's face will be compared with the trained faces in the database. If the person's face doesn't match, the micro controller will send an alert SMS to the recognized user and also the intruder's captured image will be E mailed to the user. The authorized user should acknowledge the SMS message. If he fails to acknowledge the message within a threshold time limit, an alert call will be made to the concerned user. By this the user gets intimated in real time. Keerthanna G. S | Praveen Kumar P | Vishnu Prasad K | Ms. S. Sri Heera ""A Modern Technique for Unauthorized Human Detection and Intimation"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21659.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/21659/a-modern-technique-for-unauthorized-human-detection-and-intimation/keerthanna-g-s"
An Automatic Car Engine Startup and Brake Oil Monitoring Using SensorsIJRES Journal
The primary concern of “An Automatic Car Engine Startup and Brake Oil Monitoring Using Sensors” is to monitor the level of brake oil and to monitor the exact amount of engine fuel in digital form. It also shows the importance of unimodal biometric in order to identify or to verify a person that wants to start the engine of the car. A fingerprint sensor is placed on the car’s door and one in the dashboard to start the engine. If the person’s fingerprint matches then he can get into the car and start the engine.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
In this paper we design a system which takes student attendance and the attendance records are maintained
automatically in an academic institute. Taking the attendance manually and maintaining its record till end
of year (or even beyond) is very difficult job as well as wastage of time and paper. This necessitates an
efficient system that would be fully automatic. Top level design of the system includes marking attendance
with the help of a finger-print sensor module and saving the records to a computer or server. Fingerprint sensor module and LCD screen are portable although they can also be fixed to a location for e.g. entry/ exit points. To begin with, a student needs to be registered in the finger-print sensor module. Thereafter every time the student attends a lecture he/ she will place his/her finger on the fingerprint sensor module. The
finger-print sensor module will update the attendance record in database. The student can see the notification on LCD screen.
Recent Developments and Analysis of Electromagnetic Metamaterial with all of ...IOSR Journals
Recent advances in metamaterials (MMs) research have highlighted the possibility to create novel
devices with electromagnetic functionality. The metamaterial have the power which can easily construct
materials with a user-designed EM response with a particular target frequency. This is the important
phenomena of THz frequency region that can make a considerable progress in design fabrication, and define the
characteristics of MMs at THz frequencies. This article illustrates the latest advancements of THz MMs
research.
Two Step Design for Personal Authentication Using Finger Vein Recognition and...IJTET Journal
Abstract— This paper has proposed another methodology of constant implanted finger vein distinguishment alongside GSM innovation for individual validation and security is made. [1]Unique human attributes are utilized to distinguish an individual or to confirm a character. Finger vein recognizer, is utilized as a first level security for a confirmation process furthermore for showing or alarming unapproved individual if entered. The equipment is the procedure with the assistance of Finger vein recognizer and transformed utilizing MATLAB programming, which is modest and dependable in all the structures. GSM innovation is utilized as a second level security, where the client sends a Novel code to the GSM recipient which on distinguishment sends a secret key to the Client for opening. [2]The proposed framework takes just 0.5 seconds to confirm one info finger vein test and the normal mistake rate (ERR) of 0.06.
Biometrics technology is rapidly progressing and offers attractive opportunities. In recent years, biometric authentication has grown in popularity as a means of personal identification in ATM authentication systems. The prominent biometric methods that may be used for authentication include fingerprint, palmprint, handprint, face recognition, speech recognition, dental and eye biometrics. In this paper, a microcontroller based prototype of ATM cashbox access system using fingerprint sensor module is implemented. An 8-bit PIC16F877A microcontroller developed by Microchip Technology is used in the system. The necessary software is written in Embedded 'C' and the system is tested.
Biometric system is a pattern identification system that recognizes an individual by determining the originality of the physical features and behavioral characteristic of that person. Of all the recently used biometric techniques, fingerprint identification systems have gained the most popularity because of the prolonged existence of fingerprints and its extensive use. Fingerprint is dependable biometric trait as it is an idiosyncratic and dedicated. It is a technology that is increasingly used in various fields like forensics and security purpose. The vital objective of our system is to make ATM transaction more secure and user friendly. This system replaces traditional ATM cards with fingerprint. Therefore, there is no need to carry ATM cards to perform transactions. The money transaction can be made more secure without worrying about the card to be lost. In our system we are using embedded system with biometrics i.e r305 sensor and UART microcontroller. The Fingerprint and the user_id of all users are stored in the database. Fingerprints are used to identify whether the Person is genuine. A Fingerprint scanner is used to acquire the fingerprint of the individual, after which the system requests for the PIN (Personal Identification Number). The user gets three chances to get him authenticated. If the fingerprints do not match further authentication will be needed. After the verification with the data stored in the system database, the user is allowed to make transactions.
International Journal of Research in Engineering and Science is an open access peer-reviewed international forum for scientists involved in research to publish quality and refereed papers. Papers reporting original research or experimentally proved review work are welcome. Papers for publication are selected through peer review to ensure originality, relevance, and readability.
A Modern Technique for Unauthorized Human Detection and Intimationijtsrd
"Technological advancements are inevitable and the field of IoT is no exception. The utilization of the technologies in various sectors is highly employed. Even though we use technology in various sectors, the employment of technology for security purposes is very low. The Existing security in various places only CCTV is used for monitoring and recording. Even there are existing security systems where an alert is sent via an email which requires a stable internet connection. It is unlikely that we expect the user to be always connected to an internet source. In the Proposed system, authorized users faces will be trained and stored in a Database. Initially, when an unknown known person enters in the zone the camera module will capture the intruders face. The captured intruder's face will be compared with the trained faces in the database. If the person's face doesn't match, the micro controller will send an alert SMS to the recognized user and also the intruder's captured image will be E mailed to the user. The authorized user should acknowledge the SMS message. If he fails to acknowledge the message within a threshold time limit, an alert call will be made to the concerned user. By this the user gets intimated in real time. Keerthanna G. S | Praveen Kumar P | Vishnu Prasad K | Ms. S. Sri Heera ""A Modern Technique for Unauthorized Human Detection and Intimation"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21659.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/21659/a-modern-technique-for-unauthorized-human-detection-and-intimation/keerthanna-g-s"
An Automatic Car Engine Startup and Brake Oil Monitoring Using SensorsIJRES Journal
The primary concern of “An Automatic Car Engine Startup and Brake Oil Monitoring Using Sensors” is to monitor the level of brake oil and to monitor the exact amount of engine fuel in digital form. It also shows the importance of unimodal biometric in order to identify or to verify a person that wants to start the engine of the car. A fingerprint sensor is placed on the car’s door and one in the dashboard to start the engine. If the person’s fingerprint matches then he can get into the car and start the engine.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
In this paper we design a system which takes student attendance and the attendance records are maintained
automatically in an academic institute. Taking the attendance manually and maintaining its record till end
of year (or even beyond) is very difficult job as well as wastage of time and paper. This necessitates an
efficient system that would be fully automatic. Top level design of the system includes marking attendance
with the help of a finger-print sensor module and saving the records to a computer or server. Fingerprint sensor module and LCD screen are portable although they can also be fixed to a location for e.g. entry/ exit points. To begin with, a student needs to be registered in the finger-print sensor module. Thereafter every time the student attends a lecture he/ she will place his/her finger on the fingerprint sensor module. The
finger-print sensor module will update the attendance record in database. The student can see the notification on LCD screen.
Recent Developments and Analysis of Electromagnetic Metamaterial with all of ...IOSR Journals
Recent advances in metamaterials (MMs) research have highlighted the possibility to create novel
devices with electromagnetic functionality. The metamaterial have the power which can easily construct
materials with a user-designed EM response with a particular target frequency. This is the important
phenomena of THz frequency region that can make a considerable progress in design fabrication, and define the
characteristics of MMs at THz frequencies. This article illustrates the latest advancements of THz MMs
research.
Factor analysis as a tool for evaluation of spatial and temporal variations i...IOSR Journals
In this case study, factor analysis was applied for evaluation of temporal/spatial variations in the
groundwater quality of Aravakurichi block, Karur district, Tamil Nadu, India. This statistical technique was
employed for the better interpretation of large complex water quality data set obtained from twenty five
groundwater locations in four seasons during the year 2012. The water samples were characterized for the
physico-chemical parameters such as pH, total alkalinity, electrical conductivity, total hardness, calcium ions,
magnesium ions, total dissolved solids, fluorides, chlorides and sulphates. Factor analysis indicated four factors
initially and when rotation of the factor axis was executed, it yielded two factors with clear indication of high
loadings for some variable and low loadings for others, facilitating data interpretation in terms of original
variables. Overall, this case study demonstrated the effectiveness of factor analysis to identify marker variables
for assessing the chemistry of groundwater besides earmarking representative sampling stations to undertake
suitable water quality management in a shortest possible time.
‘Indian Agriculture: A Fresh Approach Towards Green Revolution 2.0’IOSR Journals
The agriculture sector which employs more than 55% of the country workforce whereas share of agriculture and allied sector to total GDP is 14.1% (2011-12). The farm sector achieved 3.6% growth during the 11th Five Year Plan (2007-12), falling short of the 4% growth target, although it was much higher than growth of 2.5 and 2.4% during 9th and 10th plan respectively. Thus, the sector needs urgent reforms to boost crop yields and private investment in infrastructure so as to motivate farmers and feed the growing population. At the latest Economic Survey (2012-13) points out that “India is at a juncture where further reforms are urgently required to achieve greater efficiency and productivity in agriculture for sustaining growth. There is a need to have stable and consistent policies where markets play a deserving role and private investment in infrastructure is stepped up. An efficient supply chaim that firmly establishes the linkage between retail demand and the farmer will be important”
Characteristic Comparison of U-Shaped Monopole and Complete Monopole Antenna.IOSR Journals
Abstract: A monopole antenna is a type of radio antenna formed by replacing one half of a dipole antenna with a ground plane at right-angles to the remaining half. Monopoles may be used from a few hundred KHz through several GHz in frequency and are commonly one-quarter of a wave length long, but may be shorter or longer. Monopole antennas exhibit high gain and improved efficiency in a surprisingly small package. Monopole antenna can be designed to exhibit wideband capabilities. The different available monopole antennas are dual band printed monopole antenna, cross-slot monopole antenna, U-shaped monopole antenna, triangular shaped monopole antenna and a wideband monopole antenna. This paper deals with the comparison obtained from the results such as return loss, VSWR, current distribution, and the radiation pattern of simple U-shaped and complete monopole antenna. Keywords- CPW, CST, FR4, LAN, WiMAX
Prediction of Consumer Purchase Decision using Demographic Variables: A Study...IOSR Journals
The demographic environment is of major interest to marketers because it involves people and people make up market. Fragmentation of the mass market into numerous micro markets differentiated by age, sex, education, life style, geography and so on. Because each group has strong preferences and consumer characteristics that can be easily reached through increasingly targeted communication and distribution channels. Most of marketers’ strategic decision making heavily depend on the demographic variables of people in the region where they focus on marketing their products. This study makes known the vital demographic structure of premium car owners in Chennai city and provides models for predicting the consumer’s decision to buy a car when his exact demographic profile is known. The relationship established between the demographic variables and the different stages of consumer’s purchase decision process further helps identifying the significant demographic variables. This will be definitely helpful to the marketers of cars to know their target group and to evolve marketing strategies to make them becoming a car owner.
Isolation and Purification of Secoisolariciresinoldiglucoside oligomers (Lign...IOSR Journals
The present study aimed to extract and purify the compound of Secoisolariciresinoldiglucoside
oligomers (lignan) from flax seed (Linumusitatissimum) and its antioxidant activity. The Lignan was extracted
by solvents which gave the best results were ethanol : 1,4 dioxane (1:1, v:v).SDG release after alkaline
hydrolysisby using a methanolicNaOH , 20 mM, pH=8 at 50 ºC.followed by using following chromatographic
techniques: Liquid-liquid, Sephadex LH-20 column chromatography, thin layer chromatographic (TLC), high
performance liquid chromatographic (HPLC) and Fourier Transform Infra-Red(FTIR) . The EC50 values of
Pure lignan extract (9 μg/ml) was shown possess DPPH radical scavenging activity compared to reference
substances BHT and vitamin C (EC50= 3 and 4.2 μg/ml) respectively, and this was higher than partial pure
lignan component (EC50= 25.5 μg/ml).The total phenolic content of the pure lignanwas higher than partial
pure lignan which gave 22.312 and 14.85 g/ml respectively.
Study of Optical Property of Gel Grown Mercuric Iodate CrystalsIOSR Journals
Mercuric Iodate Crystals were grown by a simple gel technique using diffusion method. The optimum growth conditions were established for the growth of these crystals by changing various parameters such as pH of the gel solution, gel concentration, gel setting time, concentrations of reactants etc. The grown Mercuric Iodate crystals were spherical in shape. These crystals were opaque. The crystals were characterized using UV-VIS Specrophotometrry.
Influence of chimney effect on the radon effective dose of the lung simulated...IOSR Journals
One of the well-known radon prone areas of the world is Ramsar in Iran, which is surrounded by the
Alborz Mountain in its southern part and Caspian Sea on the north. The annual effective dose in the district of
Talesh-Mahalleh is higher than the annual dose limits for radiation workers. In this study, the indoor radon
level and effective dose of the lung were estimated using a Prassi portable radon gas survey meter in a model
house containing top soil samples from different parts of Ramsar. For the extremely hot samples, the effective
dose of the lung in winter season was 27.75±2.55mSv, when the windows and exhaust part of chimney were
closed. However, when the chimney was turned on and the exhaust part of chimney was open, the effective dose
of the lung was reduced to 1.27±0.23mSv. Also the seasonal radon effective doses of the lung with other samples
were reduced to low values. The results suggest by using chimney effect and chimney heaters a significant
lessening of the radon seasonal effective dose in dwellings of Ramsar can be achieved.
Simple Thinking Makes Chemistry Metabolic and Interesting - A Review ArticleIOSR Journals
First of all I give my love to all the students who reside in ‘Chemistry Phobia zone’. In this short article I shall try to share my simple thinking that I achieved during my last 16 years of journey in the route of Chemical Education. Before starting my journey it was a big encounter for me to change the conventional methods and makes chemistry easier and interesting to such student who belongs to Chemistry Paranoia Zone. I believe that students are just like flowers and it is our duty to nourish them properly as a gardener. In my infinitely small area of knowledge, I just try to innovate fourteen (14) teaching methodologies by including thirty four (34) completely new formulae in the chemistry world which were followed by different eminent writers in their books since last 90-95 years namely Sir G.Wilkinson, Prof. F. Albert Cotton, Prof. I.L.Finar, Prof. R.T. Morrison, Prof. R.N. Boyd, Prof. Solomons and Prof. Fryhle, Prof. J.G. Smith etc..
Zooplanktonic Diversity and Trophic Status of Pashupatinath Pond in Relation ...IOSR Journals
Present investigation were carried out to physico chemical characterstics and trophic status of
Pashupatinath pond Mandsour (M.P.).water sample were collected seasonal basis for a period of December
2008 to September 2010 using plastic container .standard procedure were followed during collection
,preservation and analysis of water sample for various physicochemical and biological parameter .
The water quality is remained moderately alkaline PH (8.11) while electrical conductivity (0.2176 ms/cm), TDS
(187ppm) chloride (22.123ppm), Hardness(139.166ppm) and alkalinity (75.33ppm) show low mean value
.Average dissolve oxygen levels were at (7.771 ppm) ,while average nitrate and phosphate The water remained
modertly alkaline PH (7.95) while electrical conductance (0.2165ms/cm),TDS (153.66ppm)chloride (22.83ppm)
hardness (138.66ppm )and alkalinity (62.166 ppm) showed low mean values .Average dissolved oxygen level
were at (7.58 ppm ) while average nitrate and phosphate level were (0.2126ppm) and (0.5868 ppm) respectely
.On the basis of water quality parameter .Mirzapur dam was found to be oligotrophic. A low density of
Zooplankton were also observed during the study period
Neural Network For The Estimation Of Ammonia Concentration In Breath Of Kidne...IOSR Journals
Neural networks are an extremely powerful tool for data mining. They are especially useful in cases
involving data classification where it is difficult to establish a pattern in the search space. In an era when
artificial intelligence is increasingly being utilised in industrial and medical applications throughout the world,
it is becoming evident that this is an emerging trend. This paper explores the idea of artificial intelligence by
employing the use of a feed-forward neural network with two process layers to determine the concentration of
ammonia in exhaled human breath. The human mouth contains many kinds of substances both in liquid and
gaseous form. The individual concentrations of each of these substances could provide useful insight to the
health condition of the entire body. Ammonia is one of such substances whose concentration in the mouth has
revealed the presence or absence of diseases in the body. Kidney failure is one diesease which is identified by
an extremely high ammonia content in human breath. This disease is as a result of the kidneys’ inability to
process the body’s liquid waste. The result of this is the release of urea throughout the body which is dissipated
in the form of ammonia through oral breath. The neural simulation is carried out using NeuroSolutions version
5 software. The neural network correctly identified the concentration of oral ammonia as an indication of
kidney failure with an accuracy of 85%.
Synthesis, Characterization and Antibacterial Activity of New Complexes of So...IOSR Journals
Complexes of some lanthanide picrates (Ln3+ = Pr3+, Nd3+ and Dy3+) with benzo-18-crown-6 and 221-cryptand were synthesized and characterized by elemental analysis, FTIR, and UV-Visible. Spectrophotometric methods, thermal analysis (TGA & DTG), melting point, magnetic susceptibility and molar conductance. Also an in-vitro study on gram positive (Staphylococcus aureus) and gram negative bacteria (Escherichia coli, Salmonella and pseudomonas aeruginosa) was performed and the results were compared to those of the broad spectrum antibiotic Chloramphinicol. The benzo-18-crown-6 complexes have the general formula of [Ln.L.(Pic)2]Pic.nH2O , where; (Ln3+ = Pr3+, Nd3+, and Dy3+) , (L = Benzo-18-crown-6) , (Pic = Picrate anion) , (n = 1-2). In these complexes two picrate anions are coordinated to the metal ion through the phenolic oxygen and oxygen of the ortho nitro group, thus, the metal ions in these complexes have a coordination number of (10). The complexes of 221-cryptand have the general formula of [Ln.L.(Pic)]Pic2.nH2O where; (Ln3+ = Pr3+, Nd3+, and Dy3+), (L = 221-cryptand), (Pic = Picrate anion), (n = 1,2 or 7). In these complexes one picrate anion is coordinated to the metal ion, also through the phenolic oxygen and the oxygen from the ortho nitro group, thus the metal ions in the cryptand complexes have a coordination number of (9).
“Trade-Off between Detection and Resolution of Two Point Objects Under Variou...IOSR Journals
It is a well-experienced fact that whenever one tries to detect a weak object point in the vicinity of an intense point object, viz., a binary star-SIRUS and its companion weak satellite star, there is always loss of resolution of the optical system. In other words, one wants to improve the defectively of the system, there is always a loss of resolution capabilities of the system. Thus, there is a trade-off between Detection and Resolution of optical systems under various imaging situations. In this first paper of discussion of this trade-off, we have derived the Fourier analytical formulation of this problem. This formulation will be used to find out a compatible trade-off between Detection and Resolution in our further publications
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...IJERA Editor
In today's modern world, security plays an important role. For that purpose, we proposed advance security systems for banking locker system and the bank customers. This specialized security is proposed through four different modules in combination i.e. face detection technique, Password verification, finger prints and Iris verification .All these steps are followed in the sequence if anything goes wrong he or she is unable to access the system. We are also providing some additional billing with it i.e. it will always for after 1 transaction. It will give the intimation of first transaction is complete and you are left with prescribed number transaction mentioned in system.
Development of a Secured Door Lock System Based on Face Recognition using Ras...ijtsrd
Security is an important part of everyday life. The main aim of the system is to develop a secured door lock system. The system consists of three sections. The first section is the face recognition system that is based on Haar like features detection method and Local Binary Pattern LBP recognition algorithm. The second section is the password security system. And the last section is the alert system through GSM module. The system is composed by the combination of face recognition security system, password security system and the alert system through the GSM module. In this system, the iteration used in face recognition system is reduced by using Local Binary Pattern LBP algorithm. In saving time, the processing time of this system, therefore, is better than that of the normal system. Soe Sandar | Saw Aung Nyein Oo "Development of a Secured Door Lock System Based on Face Recognition using Raspberry Pi and GSM Module" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25280.pdfPaper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/25280/development-of-a-secured-door-lock-system-based-on-face-recognition-using-raspberry-pi-and-gsm-module/soe-sandar
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
Abstract Technological innovation in Automotive Electronics has led to the development of Engine Immobilisers. The present day Engine Immobiliser based on Radio Frequency Identification Device (RFID) are growing unsafe as professional hackers have been able to break into them. In 2005, a group of students in the Johns Hopkins University, USA hacked an RFID Engine Immobiliser and stole the vehicle in under twenty minutes. It is disturbing that almost a decade later the field of Engine Immobilisers has seen very little advancement. As a result the number of vehicle theft cases has risen exponentially in the past decade globally. The need of the hour is to design a system which enhances the security of the vehicle removing the drawbacks of the existing RFID system. We propose a system which replaces the prevalent technology with a Face Recognition System. Additionally, the system gives the owner remote access to the vehicle’s ignition system further reducing chances of vehicle theft. Measures are also taken to enhance passenger safety. Ease of operation is supplemented through a Keyless Entry module. Keywords: RFID; Face Recognition; NI LabVIEW; Keyless Entry; Arduino UNO.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IRIS Recognition Based Authentication System In ATMIJTET Journal
Security and Authentication of individuals is necessary for our daily lives especially in ATMs. It has been improved by using biometric verification techniques like face recognition, fingerprints, voice and other traits, comparing these existing traits, there is still need for considerable computer vision. Iris recognition is a particular type of biometric system that can be used to reliably identify a person uniquely by analyzing the patterns found in the iris. Initially Iris images are collected as datasets and maintained in agent memory. Then the Iris and pupil are detected from the image, removing noises. The features of the iris were encoded by convolving the normalized iris region with 2DGabor filter. The Hamming distance was chosen as a matching metric, which gave the measure of how many bits disagreed between the templates of the iris.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
PHP Frameworks: I want to break free (IPC Berlin 2024)
S0102297102
1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 2, Ver. II (Mar - Apr.2015), PP 97-102
www.iosrjournals.org
DOI: 10.9790/2834-102297102 www.iosrjournals.org 97 | Page
An Automated Anti-Theft and Misusealerting System for ATMs
S.Karthikeyan1
, S.Sainath2
, K.P.Tharun Aswin3
, K.Abimanyu4
1
Assistant professor, 2, 3, 4
UG Student, 1,2,3,4
Velammal Institute of Technology
Abstract:In this paper we intend to implement a real time face detection system in ATMs to avoid robbery and
attacks occurring inside the ATM.The whole operation is programmed in a Raspberry pi board which is a
combination of SoC with GPU based architecture.The User has to pass through a security camera check placed
at the ATM entry. The camera detects the face features and matches the captured image with the trained Haar
features using an image processing module. After confirming that the user is not wearing any masks or helmet it
opens the Entry door for the user to access the ATM.Vibration sensors are placed, one on the entry door and
other on the ATM machine to trigger an alarm just in case a break-in occurs.ATM doors will be closed using a
DC Motor and then a message will be sent to the nearby police station and to the corresponding bank through
the GSM.The image processing tasks is completed using the SimpleCV and OpenCV libraries developed by
Intel, which is compatible with the Raspberry Pi board. The whole operation is programmed in a raspberry pi
board which can be used for Independent Functions.
Keywords:ATM, Face Detection, Haar Classifier, GSM, Raspberry pi, SimpleCV, Viola-Jones Algorithm.
I. Introduction
In today‟s technically advanced world, autonomous systems are gaining rapid popularity. As the social
computerization and automation has increased, credit and debit cards have become popular with wider use of
ATMs. They simplify financial and banking activity. However the theft and attacks occurring in ATMs has been
rising in proportion to the ratio of spread out of automation devices. Those crimes for the financial organization
have been increased gradually from year 1999 to 2003, a bit decreased in 2004 which then increased again from
the year 2005.The case related to theft and robbery in ATMs have been increased gradually during past 12 years
which even includes attacks on customers inside the ATM. The manufacturers are the developing security
features fortheir products by introducing advanced technologies to avoid thefts.
Usually, biometric and non-biometric methods are used to provide such security features. In non-
biometric methods, personal ID and password are used to identify the person, where in the possibility of theft
remains. Biometric methods involve no such possibilities, because, they employ techniques such as voice
recognition, signature recognition, retinal recognition, iris recognition, fingerprint recognition and face
recognition.These methods are sophisticated and costlier. Our project is intended to reduce these crimes by
implementing simpler yet secure method of accessing ATMs.
II. Haar Classifier Algorithm for Face Detection
The face detection algorithm proposed by Viola and Jones is the basis of our design. Face detection
proposed by Viola and Jones‟s is the most used face detection method based on statistical methods for rapid
frontal face detection system using Haar-like features. Viola and Jones devised an algorithm, called Haar
Classifiers, to rapidly detect any object, including human faces, using AdaBoost classifier cascades that are
based on Haar-like features and not pixels. The face detection algorithm looks for specific Haar features of a
human face. When the chosen features match, the algorithm allows the candidate to pass through to the next
stage of detection.
The three main parts of this algorithm are:
Integral Image, which allows very fast feature evaluation.
Classifier function which is built using small number of important features.
The method of combining the classifiers in a cascade structure to increase the speed of the detector by
focusing on the promising regions of interest.
2.1 Integral Image
The integral image is defined as the summation of the pixel values of the original image. The value at
any location (x, y) of the integral image is the sum of the image‟s pixels above and to the left of location (x, y).
2. An Automated Anti-Theft and Misusealerting System for ATMs
DOI: 10.9790/2834-102297102 www.iosrjournals.org 98 | Page
2.2Haar Features
Haar features are composed of either two or three rectangles. Face candidates are scanned and searched
for Haar features of the current stage. The weight and size of each feature and the features themselves are
generated by the learning algorithm- AdaBoost. Each Haar feature has a value that is calculated by taking the
area of each rectangle, multiplying each by their respective weights, and then summing the results. The area of
each rectangle is easily found using the integral image. The coordinate of the any corner of a rectangle can be
used to get the sum of all the pixels above and to the left of that location using the integral image. By using each
corner of a rectangle, the area can be computed quickly.
2.3 Haar Classifier
A Haar classifier uses the rectangle integral to calculate the value of a Haar feature. The Haar classifier
multiplies the weight of each rectangle by its area and the results are added together. Several Haar classifiers
compose a stage. A stage accumulator sums all the Haar classifier results in a stage and a stage comparator
compares this summation with a stage threshold. The threshold is also a constant obtained from the AdaBoost
algorithm. Each stage does not have a set number of Haar features. Depending on the parameters of the training
data individual stages can have a varying number of Haar features.
2.4Cascade
The Viola and Jones face detection algorithm eliminates face candidates quickly using a cascade of
stages. The cascade eliminates candidates by making stricter requirements in each stage with later stages being
much more difficult for a candidate to pass. Candidates exit the cascade if they pass all stages or fail any stage.
A face is detected if a candidate passes all stages. This process is shown in Figure 1
Figure 1: Cascaded of stages. Must pass all the stages to detect Face
III. System Design
The proposed security system have the capability of capturing a live video stream, detect any faces in
the frame and recognize the face using a face detection algorithm. Our system comprises of two main sections.
First is the decision making section which uses the face detection algorithm to detect the facial features of the
user. The Second section is the controlling section which comprises of PIC Microcontroller and other supporting
components. The block diagram of our system is illustrated in fig 2.
Figure 2.Block diagram of our system
3.1 Hardware description:
The important hardware modules are briefly described.
3. An Automated Anti-Theft and Misusealerting System for ATMs
DOI: 10.9790/2834-102297102 www.iosrjournals.org 99 | Page
3.1.1Camera module
The camera module here used is a webcam to acquire the image of user who is standing near the ATM
entry. The Webcam is fixed in a rigid location for capturing the face of the person.
3.1.2 Raspberry Pi (model b)
Raspberry Piboard is a miniature marvel, packing considerable computing power into a footprint no
larger than a credit card. The processor at the heart of the Raspberry Pi system is a Broadcom BCM2835
system-on-chip (SoC), which includes a 700 MHz ARM1176JZF-S processor, Video Core IV GPU, and RAM.
It has a Level 2 cache of 128 KB, used primarily by the GPU, not the CPU. It has 26 GPIO pins. This board runs
the face detection algorithm and provides the results for further operation.
3.1.3 PIC 16F877A
PIC 16F877A is a 40-pin, 8-bit microcontroller based on RISC architecture. Its operating frequency is
20MHz.It has 8Kb flash memory and EEPROM data memory of 256 bytes. Its instruction set contains only 35
instruction and have both parallel and serial communications. Many pins have dual operation and it is easy to
interface with external components. Here the pic microcontroller is used for control operation following the face
detection result of raspberry pi.
3.1.4 Vibration Sensor
This sensor works on the principle of piezoelectric effect. As the transducer is displaced from the
mechanical neutral axis,creates strain within the piezoelectric element and generates voltages. If the assembly is
supported by its mounting points and left to vibrate “in free space” the device will behave as a form of vibration
sensor. Sensor Value 500 roughly corresponds to 0g acceleration. Acceleration will deflect the sensing element
up or down, causing Sensor Value to swing either way. In the system we will be using a vibrating sensor
(piezoelectric transducer) to find vibration from ATM machine and the door.
3.1.5 GSM
Global system for mobile communication (GSM) is a globally accepted standard for digital cellular
communication. GSM is the name of a standardization
Group established in 1982 to create a common European mobile telephone standard that would
formulate specifications for a pan-European mobile cellular radio system operating at 900 MHz‟s. A GSM
modem is a wireless modem that works with a GSM wireless network. Wireless modem behaves like a dial-up
modem. The main difference between them is that a dial-up modem sends and receives data through a fixed
telephone line while a wireless modem sends and receives data through radio waves. The working of GSM
modem is based on commands, the commands <CR> character. For example, the dialing command is
ATD<number>; ATD3314629080; here the dialing command ends with semicolon. The AT commands are
given to the GSM modem with the help of PC or Controller. The GSM modem is serially interfaced with the
controller with the help of MAX 232.
IV. Implementation
4.1 Training of Haar cascade classifier:
For this project around 500 positive images and 1000 negative images were taken as sample datasets
in-order to train the Face, Eye and Mouth Classifiers.
In this algorithm, first the image is acquired by the webcam for processing. Then the Haar cascade file
face.xml is used to search and detect the faces in each individual frame. If no face is detected then another frame
is acquired. If a face is detected, then a region of interest in marked within the face. This region of interest
contains the eyes and mouth. Defining a region of interest significantly reduces the computational requirements
of the system
4.2 Working:
The process starts right from capturing the image of the person standing near the entry way or door.
The camera module is placed in such a way to get the clear picture of the user. The captured is then analyzed
with the help of Haar cascade classifier algorithm which run in Raspberry pi.
The captured image is analyzed for Haar features. The face detection algorithm detects the Haar
features in the captured image and compares it with the trained data set. If the Haar features are matched then a
signal is sent to the PIC microcontroller through the GPIO pins of raspberry pi module. The pic microcontroller
upon receiving the TRUE signal from raspberry pi, checks whether vibration sensor is ON. If the input from the
vibration sensor is true then Door is locked, if not the pic microcontroller drives the dc motor to open the door.
4. An Automated Anti-Theft and Misusealerting System for ATMs
DOI: 10.9790/2834-102297102 www.iosrjournals.org 100 | Page
The image of every user entering the ATM is stored in the memory unit of Raspberry pi with date and
time of their entry. This images can be used by the police in case of robbery occurs. If the vibration sensor on
the door or ATM machine is triggered the door will be automatically closed and SMS alert will be sent to both
the officials and the police control room. The alarm placed in the ATM booth will be triggered and alerts the
public around the area. The original setup of proposed model is shown in figure 3.
Figure 3.Original setup of proposed model
The process flow diagram shown in figure 4 shows the clear picture of how the entire system works.
Figure 4. Flowchart of the entire process
V. Result
The result of face detection algorithm is shown in Figure 5.The frames extracted from the video.
Sometimes, the algorithm produces more than one result even though there is only one face in the frame. In that
case, the post processing has been used. If the detector provides more than one rectangle, which indicates the
position of the face, the distance of center points of these rectangles has been calculated. If the distance is
smaller than a pre-set threshold, the average of these rectangles will be computed and set as the final position of
the detectedface.
5. An Automated Anti-Theft and Misusealerting System for ATMs
DOI: 10.9790/2834-102297102 www.iosrjournals.org 101 | Page
Fig 5. Face detected which shows a green rectangle around the face.
When the face is detected the door opens automatically and displays the message “FACE DETECTED DOOR
OPENS” in the LCD display. It is shown in figure 6.
Figure 6.ATM door opens when face detected.
Figure 7. Face not detected.
When face is partially covered or fully covered the face is not detected and the ATM door will not be opened.
When there is a person inside the ATM the door will not open and shows the message “full wait”.
Figure 8.When the ATM is occupied the door will not open.
6. An Automated Anti-Theft and Misusealerting System for ATMs
DOI: 10.9790/2834-102297102 www.iosrjournals.org 102 | Page
VI. Conclusion
In this paper we implemented a real time face detection system in ATMs to avoid robbery and attacks
occurring inside the ATM. The algorithm presented in this paper forms the basis of many „Real Time System‟
which gives highly accurate results in less time The system has been developed with a special motive that it will
prevent not only the robbery but also attacks on person‟s present inside the ATM.
Thus our system provides an easy and efficient access resulting in reduced theft environment. ATM
rooms will be more secured on implementing our proposed methods as our experimental results are promising.
Acknowledgement
We express our sincere gratitude to our project guide Mr.S.Karthikeyan for his constant help and support.
References:
[1]. P. Viola and M. J. Lee, "Robust real-time face detection," Int. J.Comput. Vis., vol. 57, no. 2, May 2004, pp. 137-154.
[2]. P. Viola and M. Jones, “Rapid object detection using a boosted cascade of simple features,” in Proc. IEEE Computer Vision Pattern
Recognition, 2001, vol. 1, pp. 511–518.
[3]. Phillip I.W., Dr. John F. “Facial feature detection using haar classifiers”, JCSC 21, 4 (April 2006)
[4]. K. T. Talele, S. Kadam, A. Tikare, “Efficient Face Detection using Adaboost”, IJCA Proc on International Conference in
Computational Intelligence”, 2012
[5]. G. Bradski and A. Kaehler, “Learning OpenCV: Computer Vision with the OpenCV Library”, O'Reilly Media, Inc., 2008.
[6]. http://opencv.org/
[7]. Kim, Bo-Ra, “Domestic ATM status and meanings”, Payment and Settlement, and IT, Vol. 44, pp. 76, 2011.
[8]. Daniel Hefenbrock, “Accelerating Viola-Jones face detection to FPGA-level using GPUs”, Proceedings of the 2010 18th IEEE
Annual International Symposium on Field-Programmable Custom Computing Machines, 2010, pp.11-18.
[9]. Open Computer Vision Library [Electronic resource], 2012, Mode of access: http://sourceforge.net/projects/opencvlibrary. – Date
of access: 25.06.2012.
[10]. R. Chellappa, J. Ni, and V.M. Patel, “Remote identification of faces: Problems, prospects, and progress,” Pattern Recognition
Letters, vol. 33, no. 14, pp. 1849– 1859, 2012.