SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 365
Smart Door Monitoring and Locking system
Immadisetty Naga Venkata Sai Kedharnadh
1
, Padakandla Yaswanth
2
, Gunjal PatikPrakash
3
,
Gopisetty Sandeep Kumar4, Sangisetty Gopinath5, kanwalijeet singh
6
1,2,3,4,5
B-Tech students, Department of Electronics and Communication Engineering, LovelyProfessional
University, Jalandhar - Delhi, Grand Trunk Rd, Phagwara, Punjab 144001.
6
Assistant Professor, Department of Electronics and Communication Engineering, Lovely
Professional University, Jalandhar - Delhi, Grand Trunk Rd, Phagwara, Punjab 144001.
--------------------------------------------------------------------------***-------------------------------------------------------------------
Abstract:
Protection, security, and safety are the most important things in our daily life. These days, the advancement of
Technology has evolved into one of the leading IoT-based projects such as smart home technology. For An instance, this type of
system makes livelihood more safe, convenient, and secure. people are more familiar with these technologies nowadays and
smart home applications provide a controlled way of action just within the tip of a finger, for example, managing the
schedules for home lightning, electricity bills,groceries list, and home security as well. the facial and fingerprint recognition of
authorized persons is well established to keep the homes more secured for accessibility. A setup of a display monitor connection
with the camera in front of the door is also required to send the information to the owner who is trying to enter his house
through that door and the owner has the right to give access to the person who wants to open the door. Even we can provide
voice lock by texting voice with raspberry pi arm processor which can revert any messages to the owner. To satisfy all these
needs we came up with a new solution that is more secure, reliable, looks, and works smart. For this, we used a raspberry pi
microcontroller linked with a biometric sensor for fingerprint recognition and a camera module for capturing the user image
and used a bot in telegram for communication like sending alert messages and receiving commands from the owner.
Keywords: Door access control through Telegram Bot, Fingerprint recognition, Raspberry Pi; Relay,Web camera
module.
Introduction:
The way of living, the lifestyle of people is changing. security and safety became the most precious things these days.
People lookfor comfort in their day-to-day activities andtherefore demand for digitalization is the need of the hour. As a
result, automation is the key to a technological era. One of them is video surveillance. Video Surveillance is often done
where security must be there, to prevent theft, or else to monitor the work ofemployees. Elderly people, differently-abled
people, or kids are most of the time at home,without anyone over to supervise them. Providing security and safety is our
major concern here. This paper proposes a” DOOR MONITORING AND SECURITY SYSTEM” ,using face detection,
fingerprint recognition, and automated doorlocks (to open and close the door) using raspberry pi. A data set with the
fingerprintsof the permitted people are made and stored.When some face is detected in front of the camera, the frame will
be captured as a temporary image file in the face detection part. Next, the user will start accessing the door by using
biometrics. Here, fingerprint recognition will be done by comparing the user’s fingerprint with the fingerprints stored in
the dataset. If a match is found, thatis, the person is been successfully recognized. The signal will be given toraspberry pi,
access will be granted and the door will be opened. If there is no match, access will be denied and the door will not open.
then comes the second situation now the captured image is sent to the owner through a telegram message and asks for
access if granted, the door will open otherwise it remains closed.
This paper will use python inbuilt libraries (Ex: Tele pot) and APIs to implement this. Python is a huge and rich community
with proper documentation and works to be used.The proposed work is less costly and affordable to working people for
their households. The system is efficient and easyto use
1. Literature Survey
Nowadays people are more concerned about the security of keeping their assets securely. And many people are facing
difficulties in securing their assets. So, securing the placesbecame more and more important. Without providing rightful
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 366
security to the system, it can be accessed by an Unauthorized Person.As there are various researches done on the door
locking systems, such as face recognition systems, Thumb Scanner, Radio Frequency Identification based, and manymore.
There are several ways to make smart door lock systems which are important for securing places like homes, offices,
banks, vehicles, etc. In these places possibility of robberies constantly rising. Over the last fewyears research has been done
on different types of smart door locking systems consisting of sound alarms, but with the emergence of technologies smart
doors nowwork on microcontrollers, sensor-based IoTbased Global Positioning Systems, and sometechnologies like MP
lab, GSM, proteus, Iris scanner, biometric locks, a smart card with chip and password, etc. Each one of them hasits pros and
cons. In most systems, communication is done through SMS so the system can be cost-efficient and the messagewill be
delivered quickly.
Here, in this paper, we have chosen the mostsecured, reliable smart locking system whichis a biometric door locking system
with image capture. We opted for the biometric- based lock technology which is more secure when compared to other
locking systems. The gsm-centered thumb locking system scans the fingerprint and provides access to authorized
individuals [4]. Then it captures the photograph of the person who is near to the camera, PIR sensor detects if any personis
standing in front of the door and it’s designed in such a way it will only capture the photograph of the person if he is
standing from a certain distance from the door which was stored in the database system. Firstly, the system scans the
fingerprint and it will start the process of recognizing the user print which was storedin the database. It minimizes the
chance of error in detecting the person [5].
When an unauthorized person tries to enterthe door motion sensor detects the presenceof the person, captures the image,
and sends it to the owner through a bot created in telegram API. which can pretty much be secured and reliable. For
suppose a person whose fingerprint details are not stored in the database system wants to enter the roomwith the owner’s
permission, it can be done by the image capture which will beforwarded to the owner through SMS in Telegram. Then the
owner can grant access by the open or close command which will beonly available to the owner
2. System setup:
The goal of our project is to get an effective and home automated entrance lock system using, Fingerprint sensor, camera,
Raspberry Pi, Telegram bot API, and electronic lock. Human detection is to control the door lock automatically. Humansare
tracked in actual time using a frontal face XML file once the human face is detected, then send an instruction to the
Raspberry PiBoard to open the Door Lock. These instructions are sent serially from the VisualBasic application.
Fig 2.1 Schematic Diagram of Proposed work
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 367
3.1 Hardware components used:
3.1.1 Raspberry Pi: As known, the microcontroller is one of the major components for any IoT device as a part of this
we selected raspberry pi for this proposed system. As it contains inbuilt Wi-Fi and Bluetooth modules int and has a BCM
2835 SOC processor and contains a 1 GHz clock speed and 512 MB RAM
3.1.2 RELAY: We used an SPDT type relay it operates at twelve volts. It is electrically operated to pass the current
through its coil.
The relay would be on when logic ‘one’ is passed through the port. It is turned off when logic ‘zero’ is passed through the
port.
3.1.3 PIR Sensor: Passive InfraRed sensors,also known as PIR, are often used to detect objects or humans. These sensors
are widelyused to sense a person’s presence in smart systems like alarms and automated light systems. Here in this case
PIR sensor is placed to detect a person who comes near tothe system.
3.1.4 FINGERPRINT SENSOR: Biometric or fingerprint sensors are used to scan,authenticate and recognize the person
or individual who is trying to access the system.these sensors replaced the password or pin system as this is more reliable.
Here in this system fingerprint sensor is placed to check whether the authorized user is trying to enter the door or not
3.2 Software Requirements:
3.2.1 Python Idle: we used it to do programming as per our requirements. Programming is done in Python language. It
is open-source software that makes it easy towrite and upload to the Raspberry Pi.
3.2.2 Telegram Bot API: Telegram Bot APIis a new and advanced opensource feature which is developed by Telegram
to create and develop bots in an HTTP interface most easily and efficiently for free
3. Working model in a flow chart:
Fig-4.1: Flowchart of the proposed work
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 368
5. Result:
So, in this project System consists of mainly two things fingerprint recognition and face capturing.
If anyone tries to open the door using a fingerprint sensor, the system will check whether the fingerprint matches the
database. If the fingerprint is matched with the database the door gets open (shown in fig 5.1).
If the fingerprint is not matched with the database, then the system captures theimage and sends the image as a message
or notification to the owner (shown in fig 5.2). After the owner checked the message or notification received in the
telegram thenthe owner decides whether to give access ornot. If the owner gives access the door gets open otherwise door
remains closed.
Figure - 5.1:
Figure- 5.2:
6. CONCLUSION
Automation is the need of the hour and people look for comfort in their daily lives through different automation and IoT
techniques and products. In this paper, we implemented a door unlocking system using fingerprints and Raspberry pi have
been used. This Smart Door Unlocking system is designed in such a manner that it is cost- efficient and everyone can afford
it. Several issues of common security cameras can be solved using this dual mechanism of automatically closing the door
and securing the area. Since this system is small and integrated into the door itself it occupies very less space. When a
user/person comes in front of the door the motion sensor detects the user/person and the camera clicks the photo of the
user/person. The user/person then uses a fingerprint to unlock the door if the fingerprint used ispresent in the database
the door is opened and a picture is sent to the user via telegramand if it does not match with the database thesystem sends a
photo to the owner through telegram and ask for permission to open thedoor. If permission is granted by the owner the
door opens and if not it remains closed. This system could help people make their lifeeasier and safer at the same time from
intruders.
7. FUTURE WORKS
This project has a lot of scope in the future asit focuses on security and safety and can be installed in all the homes around
the world as it is cost-efficient so that everyone can afford it. Over the coming time, AI can also beimplemented with this
system to know how many times the door was accessed at what time of the day, and how a user behaves can be recorded
with help of AI. This type of technology can further smartly secure our homes and business. If further developed this
technology can be used as a mic and a speaker installed at the door and the owner can talk to the user from his place.
These aresome of the uses and future works of the smart door unlocking system.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 369
8. References:
1. Pradnya R. Nehete, J. P. Chaudhari, S. R.Pachpande, K. P. Rane, (2016) [1]
2. DAHE, S. A. (2015). Study conceptual design of biometrics technology in door locksecurity system. Journal of Kerbala
University, Vol. 13 No.3 Scientific, 312-328. [2]
3. Hussaini, H., Adamu, M. Z, Ajagun, A. S., Ijemaru, G. K. & Oresanya, B. O. (2014): Design of a GSM-Based Biometric
Access Control System Control Theory and Informatics, Vol.4(8), pp 1-21. [3]
4. Kawser Wazed Nafi, Tonny Shekha Kar, Sayed Anisul Hoque, “ AN ADVANCED DOORLOCK SECURITY SYSTEM USING
PALMTOP RECOGNITION SYSTEM”, International Journal of Computer Applications (0975 – 8887), Volume 56– No.17,
October 2012.[5]
5. Suraj Pawar, Vipul Kithani, Sagar Ahuja, Sagar Ahuja, “Smart Home Security using IoT and Face Recognition”, IEEE
2018.[5]
6. Dwi Ana Ratna, Wati Dika Abadianto, “Design of Face Detection and Recognition System for Smart Home Security
Application”, 2017 2nd ICITISEE.[6]
7. Karan Maheshwari, Nalini N, “Facial Recognition Enabled Smart Door Using Microsoft Face API”, IJETA 2017. [7]
8. Prof.M.R.Sanghavi, Srujal Sancheti, BhaktiPatel, Sanjana Shinde, Neha Lunkad, “Smart Door Unlock System Using Face
Recognitionand Voice Commands”, IRJET 2020.[8]
9. Shaik Anwar, Shaik Anwar, “IOT based Smart Home Security System with Alert and Door Access Control using
Smartphone”, IJERT 2016. [9]
10. A.Ibrahim, A.Paravath, P.Aswin, S.M.Iqbal and S.U.Abdulla, "GSM based digital door lock security system" in Power,
Instrumentation, Contro[10]

More Related Content

Similar to Smart Door Monitoring and Locking system

IRJET - Smart Door System
IRJET - Smart Door SystemIRJET - Smart Door System
IRJET - Smart Door System
IRJET Journal
 
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET Journal
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET Journal
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET Journal
 
Bank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image ProcessingBank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image Processing
IRJET Journal
 
RealNET – Internet of Things in Everyday Life using Raspberry Pi
RealNET – Internet of Things in Everyday Life using Raspberry PiRealNET – Internet of Things in Everyday Life using Raspberry Pi
RealNET – Internet of Things in Everyday Life using Raspberry Pi
IRJET Journal
 
IRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoTIRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoT
IRJET Journal
 
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET-  	  Design and Implementation of Smart Home Security System based on IoTIRJET-  	  Design and Implementation of Smart Home Security System based on IoT
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET Journal
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA Algorithm
IRJET Journal
 
Smart Home for Senior Citizens
Smart Home for Senior CitizensSmart Home for Senior Citizens
Smart Home for Senior Citizens
IRJET Journal
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
IJRTEMJOURNAL
 
IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
IRJET Journal
 
IRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing Review
IRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing ReviewIRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing Review
IRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing Review
IRJET Journal
 
IRJET- IOT based Intrusion Detection and Tracking System
IRJET- IOT based Intrusion Detection and Tracking SystemIRJET- IOT based Intrusion Detection and Tracking System
IRJET- IOT based Intrusion Detection and Tracking System
IRJET Journal
 
IRJET- An Alert System for Home Security based on Internet of Thing
IRJET- An Alert System for Home Security based on Internet of ThingIRJET- An Alert System for Home Security based on Internet of Thing
IRJET- An Alert System for Home Security based on Internet of Thing
IRJET Journal
 
IRJET- Implementation of Smart Surveillance System Based on Bio-Metrics
IRJET-  	  Implementation of Smart Surveillance System Based on Bio-MetricsIRJET-  	  Implementation of Smart Surveillance System Based on Bio-Metrics
IRJET- Implementation of Smart Surveillance System Based on Bio-Metrics
IRJET Journal
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptx
Pooja541216
 
IRJET- Smart Door Security System using Raspberry Pi with Telegram
IRJET- Smart Door Security System using Raspberry Pi with TelegramIRJET- Smart Door Security System using Raspberry Pi with Telegram
IRJET- Smart Door Security System using Raspberry Pi with Telegram
IRJET Journal
 

Similar to Smart Door Monitoring and Locking system (20)

IRJET - Smart Door System
IRJET - Smart Door SystemIRJET - Smart Door System
IRJET - Smart Door System
 
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
 
Bank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image ProcessingBank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image Processing
 
RealNET – Internet of Things in Everyday Life using Raspberry Pi
RealNET – Internet of Things in Everyday Life using Raspberry PiRealNET – Internet of Things in Everyday Life using Raspberry Pi
RealNET – Internet of Things in Everyday Life using Raspberry Pi
 
IRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoTIRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoT
 
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET-  	  Design and Implementation of Smart Home Security System based on IoTIRJET-  	  Design and Implementation of Smart Home Security System based on IoT
IRJET- Design and Implementation of Smart Home Security System based on IoT
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA Algorithm
 
Smart Home for Senior Citizens
Smart Home for Senior CitizensSmart Home for Senior Citizens
Smart Home for Senior Citizens
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
ppt2 (1).pptx
ppt2 (1).pptxppt2 (1).pptx
ppt2 (1).pptx
 
IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
 
IRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing Review
IRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing ReviewIRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing Review
IRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing Review
 
IRJET- IOT based Intrusion Detection and Tracking System
IRJET- IOT based Intrusion Detection and Tracking SystemIRJET- IOT based Intrusion Detection and Tracking System
IRJET- IOT based Intrusion Detection and Tracking System
 
IRJET- An Alert System for Home Security based on Internet of Thing
IRJET- An Alert System for Home Security based on Internet of ThingIRJET- An Alert System for Home Security based on Internet of Thing
IRJET- An Alert System for Home Security based on Internet of Thing
 
IRJET- Implementation of Smart Surveillance System Based on Bio-Metrics
IRJET-  	  Implementation of Smart Surveillance System Based on Bio-MetricsIRJET-  	  Implementation of Smart Surveillance System Based on Bio-Metrics
IRJET- Implementation of Smart Surveillance System Based on Bio-Metrics
 
Pxc3891504
Pxc3891504Pxc3891504
Pxc3891504
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptx
 
IRJET- Smart Door Security System using Raspberry Pi with Telegram
IRJET- Smart Door Security System using Raspberry Pi with TelegramIRJET- Smart Door Security System using Raspberry Pi with Telegram
IRJET- Smart Door Security System using Raspberry Pi with Telegram
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
An Approach to Detecting Writing Styles Based on Clustering Techniques
An Approach to Detecting Writing Styles Based on Clustering TechniquesAn Approach to Detecting Writing Styles Based on Clustering Techniques
An Approach to Detecting Writing Styles Based on Clustering Techniques
ambekarshweta25
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
Kamal Acharya
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
zwunae
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 

Recently uploaded (20)

NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
An Approach to Detecting Writing Styles Based on Clustering Techniques
An Approach to Detecting Writing Styles Based on Clustering TechniquesAn Approach to Detecting Writing Styles Based on Clustering Techniques
An Approach to Detecting Writing Styles Based on Clustering Techniques
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 

Smart Door Monitoring and Locking system

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 365 Smart Door Monitoring and Locking system Immadisetty Naga Venkata Sai Kedharnadh 1 , Padakandla Yaswanth 2 , Gunjal PatikPrakash 3 , Gopisetty Sandeep Kumar4, Sangisetty Gopinath5, kanwalijeet singh 6 1,2,3,4,5 B-Tech students, Department of Electronics and Communication Engineering, LovelyProfessional University, Jalandhar - Delhi, Grand Trunk Rd, Phagwara, Punjab 144001. 6 Assistant Professor, Department of Electronics and Communication Engineering, Lovely Professional University, Jalandhar - Delhi, Grand Trunk Rd, Phagwara, Punjab 144001. --------------------------------------------------------------------------***------------------------------------------------------------------- Abstract: Protection, security, and safety are the most important things in our daily life. These days, the advancement of Technology has evolved into one of the leading IoT-based projects such as smart home technology. For An instance, this type of system makes livelihood more safe, convenient, and secure. people are more familiar with these technologies nowadays and smart home applications provide a controlled way of action just within the tip of a finger, for example, managing the schedules for home lightning, electricity bills,groceries list, and home security as well. the facial and fingerprint recognition of authorized persons is well established to keep the homes more secured for accessibility. A setup of a display monitor connection with the camera in front of the door is also required to send the information to the owner who is trying to enter his house through that door and the owner has the right to give access to the person who wants to open the door. Even we can provide voice lock by texting voice with raspberry pi arm processor which can revert any messages to the owner. To satisfy all these needs we came up with a new solution that is more secure, reliable, looks, and works smart. For this, we used a raspberry pi microcontroller linked with a biometric sensor for fingerprint recognition and a camera module for capturing the user image and used a bot in telegram for communication like sending alert messages and receiving commands from the owner. Keywords: Door access control through Telegram Bot, Fingerprint recognition, Raspberry Pi; Relay,Web camera module. Introduction: The way of living, the lifestyle of people is changing. security and safety became the most precious things these days. People lookfor comfort in their day-to-day activities andtherefore demand for digitalization is the need of the hour. As a result, automation is the key to a technological era. One of them is video surveillance. Video Surveillance is often done where security must be there, to prevent theft, or else to monitor the work ofemployees. Elderly people, differently-abled people, or kids are most of the time at home,without anyone over to supervise them. Providing security and safety is our major concern here. This paper proposes a” DOOR MONITORING AND SECURITY SYSTEM” ,using face detection, fingerprint recognition, and automated doorlocks (to open and close the door) using raspberry pi. A data set with the fingerprintsof the permitted people are made and stored.When some face is detected in front of the camera, the frame will be captured as a temporary image file in the face detection part. Next, the user will start accessing the door by using biometrics. Here, fingerprint recognition will be done by comparing the user’s fingerprint with the fingerprints stored in the dataset. If a match is found, thatis, the person is been successfully recognized. The signal will be given toraspberry pi, access will be granted and the door will be opened. If there is no match, access will be denied and the door will not open. then comes the second situation now the captured image is sent to the owner through a telegram message and asks for access if granted, the door will open otherwise it remains closed. This paper will use python inbuilt libraries (Ex: Tele pot) and APIs to implement this. Python is a huge and rich community with proper documentation and works to be used.The proposed work is less costly and affordable to working people for their households. The system is efficient and easyto use 1. Literature Survey Nowadays people are more concerned about the security of keeping their assets securely. And many people are facing difficulties in securing their assets. So, securing the placesbecame more and more important. Without providing rightful
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 366 security to the system, it can be accessed by an Unauthorized Person.As there are various researches done on the door locking systems, such as face recognition systems, Thumb Scanner, Radio Frequency Identification based, and manymore. There are several ways to make smart door lock systems which are important for securing places like homes, offices, banks, vehicles, etc. In these places possibility of robberies constantly rising. Over the last fewyears research has been done on different types of smart door locking systems consisting of sound alarms, but with the emergence of technologies smart doors nowwork on microcontrollers, sensor-based IoTbased Global Positioning Systems, and sometechnologies like MP lab, GSM, proteus, Iris scanner, biometric locks, a smart card with chip and password, etc. Each one of them hasits pros and cons. In most systems, communication is done through SMS so the system can be cost-efficient and the messagewill be delivered quickly. Here, in this paper, we have chosen the mostsecured, reliable smart locking system whichis a biometric door locking system with image capture. We opted for the biometric- based lock technology which is more secure when compared to other locking systems. The gsm-centered thumb locking system scans the fingerprint and provides access to authorized individuals [4]. Then it captures the photograph of the person who is near to the camera, PIR sensor detects if any personis standing in front of the door and it’s designed in such a way it will only capture the photograph of the person if he is standing from a certain distance from the door which was stored in the database system. Firstly, the system scans the fingerprint and it will start the process of recognizing the user print which was storedin the database. It minimizes the chance of error in detecting the person [5]. When an unauthorized person tries to enterthe door motion sensor detects the presenceof the person, captures the image, and sends it to the owner through a bot created in telegram API. which can pretty much be secured and reliable. For suppose a person whose fingerprint details are not stored in the database system wants to enter the roomwith the owner’s permission, it can be done by the image capture which will beforwarded to the owner through SMS in Telegram. Then the owner can grant access by the open or close command which will beonly available to the owner 2. System setup: The goal of our project is to get an effective and home automated entrance lock system using, Fingerprint sensor, camera, Raspberry Pi, Telegram bot API, and electronic lock. Human detection is to control the door lock automatically. Humansare tracked in actual time using a frontal face XML file once the human face is detected, then send an instruction to the Raspberry PiBoard to open the Door Lock. These instructions are sent serially from the VisualBasic application. Fig 2.1 Schematic Diagram of Proposed work
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 367 3.1 Hardware components used: 3.1.1 Raspberry Pi: As known, the microcontroller is one of the major components for any IoT device as a part of this we selected raspberry pi for this proposed system. As it contains inbuilt Wi-Fi and Bluetooth modules int and has a BCM 2835 SOC processor and contains a 1 GHz clock speed and 512 MB RAM 3.1.2 RELAY: We used an SPDT type relay it operates at twelve volts. It is electrically operated to pass the current through its coil. The relay would be on when logic ‘one’ is passed through the port. It is turned off when logic ‘zero’ is passed through the port. 3.1.3 PIR Sensor: Passive InfraRed sensors,also known as PIR, are often used to detect objects or humans. These sensors are widelyused to sense a person’s presence in smart systems like alarms and automated light systems. Here in this case PIR sensor is placed to detect a person who comes near tothe system. 3.1.4 FINGERPRINT SENSOR: Biometric or fingerprint sensors are used to scan,authenticate and recognize the person or individual who is trying to access the system.these sensors replaced the password or pin system as this is more reliable. Here in this system fingerprint sensor is placed to check whether the authorized user is trying to enter the door or not 3.2 Software Requirements: 3.2.1 Python Idle: we used it to do programming as per our requirements. Programming is done in Python language. It is open-source software that makes it easy towrite and upload to the Raspberry Pi. 3.2.2 Telegram Bot API: Telegram Bot APIis a new and advanced opensource feature which is developed by Telegram to create and develop bots in an HTTP interface most easily and efficiently for free 3. Working model in a flow chart: Fig-4.1: Flowchart of the proposed work
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 368 5. Result: So, in this project System consists of mainly two things fingerprint recognition and face capturing. If anyone tries to open the door using a fingerprint sensor, the system will check whether the fingerprint matches the database. If the fingerprint is matched with the database the door gets open (shown in fig 5.1). If the fingerprint is not matched with the database, then the system captures theimage and sends the image as a message or notification to the owner (shown in fig 5.2). After the owner checked the message or notification received in the telegram thenthe owner decides whether to give access ornot. If the owner gives access the door gets open otherwise door remains closed. Figure - 5.1: Figure- 5.2: 6. CONCLUSION Automation is the need of the hour and people look for comfort in their daily lives through different automation and IoT techniques and products. In this paper, we implemented a door unlocking system using fingerprints and Raspberry pi have been used. This Smart Door Unlocking system is designed in such a manner that it is cost- efficient and everyone can afford it. Several issues of common security cameras can be solved using this dual mechanism of automatically closing the door and securing the area. Since this system is small and integrated into the door itself it occupies very less space. When a user/person comes in front of the door the motion sensor detects the user/person and the camera clicks the photo of the user/person. The user/person then uses a fingerprint to unlock the door if the fingerprint used ispresent in the database the door is opened and a picture is sent to the user via telegramand if it does not match with the database thesystem sends a photo to the owner through telegram and ask for permission to open thedoor. If permission is granted by the owner the door opens and if not it remains closed. This system could help people make their lifeeasier and safer at the same time from intruders. 7. FUTURE WORKS This project has a lot of scope in the future asit focuses on security and safety and can be installed in all the homes around the world as it is cost-efficient so that everyone can afford it. Over the coming time, AI can also beimplemented with this system to know how many times the door was accessed at what time of the day, and how a user behaves can be recorded with help of AI. This type of technology can further smartly secure our homes and business. If further developed this technology can be used as a mic and a speaker installed at the door and the owner can talk to the user from his place. These aresome of the uses and future works of the smart door unlocking system.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 369 8. References: 1. Pradnya R. Nehete, J. P. Chaudhari, S. R.Pachpande, K. P. Rane, (2016) [1] 2. DAHE, S. A. (2015). Study conceptual design of biometrics technology in door locksecurity system. Journal of Kerbala University, Vol. 13 No.3 Scientific, 312-328. [2] 3. Hussaini, H., Adamu, M. Z, Ajagun, A. S., Ijemaru, G. K. & Oresanya, B. O. (2014): Design of a GSM-Based Biometric Access Control System Control Theory and Informatics, Vol.4(8), pp 1-21. [3] 4. Kawser Wazed Nafi, Tonny Shekha Kar, Sayed Anisul Hoque, “ AN ADVANCED DOORLOCK SECURITY SYSTEM USING PALMTOP RECOGNITION SYSTEM”, International Journal of Computer Applications (0975 – 8887), Volume 56– No.17, October 2012.[5] 5. Suraj Pawar, Vipul Kithani, Sagar Ahuja, Sagar Ahuja, “Smart Home Security using IoT and Face Recognition”, IEEE 2018.[5] 6. Dwi Ana Ratna, Wati Dika Abadianto, “Design of Face Detection and Recognition System for Smart Home Security Application”, 2017 2nd ICITISEE.[6] 7. Karan Maheshwari, Nalini N, “Facial Recognition Enabled Smart Door Using Microsoft Face API”, IJETA 2017. [7] 8. Prof.M.R.Sanghavi, Srujal Sancheti, BhaktiPatel, Sanjana Shinde, Neha Lunkad, “Smart Door Unlock System Using Face Recognitionand Voice Commands”, IRJET 2020.[8] 9. Shaik Anwar, Shaik Anwar, “IOT based Smart Home Security System with Alert and Door Access Control using Smartphone”, IJERT 2016. [9] 10. A.Ibrahim, A.Paravath, P.Aswin, S.M.Iqbal and S.U.Abdulla, "GSM based digital door lock security system" in Power, Instrumentation, Contro[10]