This document describes a security alarm system that monitors a diamond in a museum using infrared sensors. The system can monitor up to 4 sensors and will light an LED and sound an alarm if a sensor is triggered, indicating unauthorized access. It also sends a message to a programmed mobile phone. The system is designed using an Intel 8052 microcontroller, infrared sensors, an LCD display, buzzers and a Bluetooth module. It provides effective security monitoring of restricted areas.
One of the most helpful presentation for academic and non academic purpose. This presentation can be presented for 40-45 mins. It contains both technical and non technical details of working of a fingerprint bio-metric scanner.
TinyOS is a free open source operating system.
Designed for wireless sensor networks.
TinyOS began as a collaboration between University of California, Berkeley and Intel Research.
An embedded operating system written in nesC language.
It features a component based architecture.
As Digital Still Cameras (DSC) become smaller, cheaper and higher in resolution, photographs are increasingly prone to blurring from shaky hands. Optical image stabilization (OIS) is an effective solution that addresses the quality of images, and is an idea that has been around for at least 30 years. It has only recently made its way into the low-cost consumer camera market, and will soon be migrating to the higher end camera phones. This paper provides an overview of common design practices and considerations for optical image stabilization and how silicon-based MEMS dual-axis gyroscopes with their size, cost and performance advantages are enabling this vital function for image capturing devices
One of the most helpful presentation for academic and non academic purpose. This presentation can be presented for 40-45 mins. It contains both technical and non technical details of working of a fingerprint bio-metric scanner.
TinyOS is a free open source operating system.
Designed for wireless sensor networks.
TinyOS began as a collaboration between University of California, Berkeley and Intel Research.
An embedded operating system written in nesC language.
It features a component based architecture.
As Digital Still Cameras (DSC) become smaller, cheaper and higher in resolution, photographs are increasingly prone to blurring from shaky hands. Optical image stabilization (OIS) is an effective solution that addresses the quality of images, and is an idea that has been around for at least 30 years. It has only recently made its way into the low-cost consumer camera market, and will soon be migrating to the higher end camera phones. This paper provides an overview of common design practices and considerations for optical image stabilization and how silicon-based MEMS dual-axis gyroscopes with their size, cost and performance advantages are enabling this vital function for image capturing devices
modeling and predicting cyber hacking breaches Venkat Projects
Analyzing cyber incident data sets is an important method for deepening our understanding of the evolution of the threat situation. This is a relatively new research topic, and many studies remain to be done. In this paper, we report a statistical analysis of a breach incident data set corresponding to 12 years (2005–2017) of cyber hacking activities that include malware attacks. We show that, in contrast to the findings reported in the literature, both hacking breach incident inter-arrival times and breach sizes should be modeled by stochastic processes, rather than by distributions because they exhibit autocorrelations. Then, we propose particular stochastic process models to, respectively, fit the inter-arrival times and the breach sizes. We also show that these models can predict the inter-arrival times and the breach sizes. In order to get deeper insights into the evolution of hacking breach incidents, we conduct both qualitative and quantitative trend analyses on the data set. We draw a set of cybersecurity insights, including that the threat of cyber hacks is indeed getting worse in terms of their frequency, but not in terms of the magnitude of their damage.
The presentation gives a brief overview and history about steganography and discusses the various types and techniques of steganography.
The types of steganography included are:
Text
Image
Audio
The main objective of this project is to monitoring the earthquake issues by using Seismic Noise Detection Sensor and the relevant information will be displayed on the LCD display via Arduino Uno. The location of the earthquake will identified by using Accelerometer.
Virtual Mouse using hand gesture recognitionMuktiKalsekar
This project is to develop a Virtual Mouse using Hand Gesture Recognition. Hand gestures are the most effortless and natural way of communication. The aim is to perform various operations of the cursor. Instead of using more expensive sensors, a simple web camera can identify the gesture and perform the action. It helps the user to interact with a computer without any physical or hardware device to control mouse operation.
Biometric ATM are used for wide range of applications like for Banking, Coupons & Self service ATM. Biometrics ATM offer ATM type interface along with at-least one Biometrics capture device like Fingerprint Scanner, Iris camera, Palm/Finger Vein scanner , Face recognition camera. They are often called Multi-Biometrics ATM, Wall mount Biometrics ATM, Biometrics Devices / Machine.
Most of the ATM in the past have been using ID cards to identify users but with the wide acceptance of Biometrics , a new generation of Biometrics ATM are being deployed for wide range of applications worldwide.
Driver drowsiness monitoring system using visual behavior and Machine Learning.AasimAhmedKhanJawaad
Drowsy driving is one of the major causes of road accidents and death. Hence, detection of
driver’s fatigue and its indication is an active research area. Most of the conventional methods are
either vehicle based, or behavioral based or physiological based. Few methods are intrusive and
distract the driver, some require expensive sensors and data handling. Therefore, in this study, a low
cost, real time driver’s drowsiness detection system is developed with acceptable accuracy. In the
developed system, a webcam records the video and driver’s face is detected in each frame employing
image processing techniques. Facial landmarks on the detected face are pointed and subsequently the
eye aspect ratio, mouth opening ratio and nose length ratio are computed and depending on their
values, drowsiness is detected based on developed adaptive thresholding. Machine learning
algorithms have been implemented as well in an offline manner. A sensitivity of 95.58% and
specificity of 100% has been achieved in Support Vector Machine based classification.
In this presentation, we describe that how can we implemented in IoT or Internet of things using Python language there is plenty of library and module for IoT in python which we discussed in this presentation Thank You.
SCADA stands for Supervisory Control And Data Acquisition. SCADA software system is a device monitoring and controlling framework. The supervisory control includes, taking action and control through remote locations for various control mechanisms and processes.The front-end UI of Mobile App or Web dashboard along with backend business logic, database and a Gateway (as depicted in the above block diagram) manifests a SCADA solution for control and monitoring of devices in an IoT network.
https://www.embitel.com/blog/embedded-blog/what-is-scada-system-and-software-solution
Health monitoring is the major problem in today’s world. Due to lack of proper health monitoring, patient suffer from serious health issues. There are lots of IoT devices now days to monitor the health of patient over internet. Health experts are also taking advantage of these smart devices to keep an eye on their patients. With tons of new healthcare technology start-ups, IoT is rapidly revolutionizing the healthcare industry.
Here in this project, we will make an IoT based Health Monitoring System which records the patient heart beat rate and body temperature and also send an email/SMS alert whenever those readings goes beyond critical values. Pulse rate and body temperature readings are recorded over ThingSpeak and Google sheets so that patient health can be monitored from anywhere in the world over internet. A panic will also be attached so that patient can press it on emergency to send email/sms to their relative
modeling and predicting cyber hacking breaches Venkat Projects
Analyzing cyber incident data sets is an important method for deepening our understanding of the evolution of the threat situation. This is a relatively new research topic, and many studies remain to be done. In this paper, we report a statistical analysis of a breach incident data set corresponding to 12 years (2005–2017) of cyber hacking activities that include malware attacks. We show that, in contrast to the findings reported in the literature, both hacking breach incident inter-arrival times and breach sizes should be modeled by stochastic processes, rather than by distributions because they exhibit autocorrelations. Then, we propose particular stochastic process models to, respectively, fit the inter-arrival times and the breach sizes. We also show that these models can predict the inter-arrival times and the breach sizes. In order to get deeper insights into the evolution of hacking breach incidents, we conduct both qualitative and quantitative trend analyses on the data set. We draw a set of cybersecurity insights, including that the threat of cyber hacks is indeed getting worse in terms of their frequency, but not in terms of the magnitude of their damage.
The presentation gives a brief overview and history about steganography and discusses the various types and techniques of steganography.
The types of steganography included are:
Text
Image
Audio
The main objective of this project is to monitoring the earthquake issues by using Seismic Noise Detection Sensor and the relevant information will be displayed on the LCD display via Arduino Uno. The location of the earthquake will identified by using Accelerometer.
Virtual Mouse using hand gesture recognitionMuktiKalsekar
This project is to develop a Virtual Mouse using Hand Gesture Recognition. Hand gestures are the most effortless and natural way of communication. The aim is to perform various operations of the cursor. Instead of using more expensive sensors, a simple web camera can identify the gesture and perform the action. It helps the user to interact with a computer without any physical or hardware device to control mouse operation.
Biometric ATM are used for wide range of applications like for Banking, Coupons & Self service ATM. Biometrics ATM offer ATM type interface along with at-least one Biometrics capture device like Fingerprint Scanner, Iris camera, Palm/Finger Vein scanner , Face recognition camera. They are often called Multi-Biometrics ATM, Wall mount Biometrics ATM, Biometrics Devices / Machine.
Most of the ATM in the past have been using ID cards to identify users but with the wide acceptance of Biometrics , a new generation of Biometrics ATM are being deployed for wide range of applications worldwide.
Driver drowsiness monitoring system using visual behavior and Machine Learning.AasimAhmedKhanJawaad
Drowsy driving is one of the major causes of road accidents and death. Hence, detection of
driver’s fatigue and its indication is an active research area. Most of the conventional methods are
either vehicle based, or behavioral based or physiological based. Few methods are intrusive and
distract the driver, some require expensive sensors and data handling. Therefore, in this study, a low
cost, real time driver’s drowsiness detection system is developed with acceptable accuracy. In the
developed system, a webcam records the video and driver’s face is detected in each frame employing
image processing techniques. Facial landmarks on the detected face are pointed and subsequently the
eye aspect ratio, mouth opening ratio and nose length ratio are computed and depending on their
values, drowsiness is detected based on developed adaptive thresholding. Machine learning
algorithms have been implemented as well in an offline manner. A sensitivity of 95.58% and
specificity of 100% has been achieved in Support Vector Machine based classification.
In this presentation, we describe that how can we implemented in IoT or Internet of things using Python language there is plenty of library and module for IoT in python which we discussed in this presentation Thank You.
SCADA stands for Supervisory Control And Data Acquisition. SCADA software system is a device monitoring and controlling framework. The supervisory control includes, taking action and control through remote locations for various control mechanisms and processes.The front-end UI of Mobile App or Web dashboard along with backend business logic, database and a Gateway (as depicted in the above block diagram) manifests a SCADA solution for control and monitoring of devices in an IoT network.
https://www.embitel.com/blog/embedded-blog/what-is-scada-system-and-software-solution
Health monitoring is the major problem in today’s world. Due to lack of proper health monitoring, patient suffer from serious health issues. There are lots of IoT devices now days to monitor the health of patient over internet. Health experts are also taking advantage of these smart devices to keep an eye on their patients. With tons of new healthcare technology start-ups, IoT is rapidly revolutionizing the healthcare industry.
Here in this project, we will make an IoT based Health Monitoring System which records the patient heart beat rate and body temperature and also send an email/SMS alert whenever those readings goes beyond critical values. Pulse rate and body temperature readings are recorded over ThingSpeak and Google sheets so that patient health can be monitored from anywhere in the world over internet. A panic will also be attached so that patient can press it on emergency to send email/sms to their relative
The Home Automation & Security system is a basic model created using Arduino, Raspberry Pi and Relays to Automate the house. It is very basic in nature and is completed as a part of my internship project
Our future battle field system will have more difficulties to maintain security, because of increasing military competitive. Ability to understand, predict and adopt the vast array of inter-networked things is very difficult. Unwanted fire, unauthorized human intervention and other object movement will play major important role for affecting military environment. This project aims to help our future military environment by introducing new technology LoRaWAN in IoT (Internet of Things). LoRaWAN (Long Range Wide Area Network) is a state -of- art commercial of the self (COTS) technology. This project consist of sensors, embedded microcontrollers equipped with LoRaWAN, embedded processors equipped with LoRaWAN and cloud technology. By introducing this new technology in our future military environment we can easily find out criminal activities and fire hazards.
This is a Project Report Based on Laser Security System.
A Fully Explained Project report on laser security system,
This Project Report is made by : -
1. Chirag
2. Mohit Jangra
3. Shubham
Remote-Monitoring and Energy-Saving Room Architecture with Security System ba...Praveen Reddy
Now-a-days we are in need to avoid wastage of power in home. As more and more consumer electronics and home appliances are deployed and the size of them is becoming large, power consumption in home area tends to grow. Moreover, useless power consumption occurs during day time and also when the human being is not present in the room. So through this project we are overcoming the above mentioned threat by using various sensors to enhance security and to save power.
In this system, zigbee as wired or wireless networks are used to transfer the control information and the measured power. zigbee is a low-cost, low-power, wireless mesh networking proprietary standard. The low cost allows the technology to be widely deployed in wireless control and monitoring applications, the low power-usage allows longer life with smaller batteries, and the mesh networking provides high reliability and larger range. The user can also check the power consumption of the home appliances through the remote control unit.
The rule of thumb for the length a data cable depends on speed of the data, quality of the cable. Zigbee transmitter transmits the signal through a wireless communication and it covers a distance of about 10-100 meters. A liquid crystal display (LCD) is a thin, flat panel used for electronically displaying information such as text, images, and moving pictures. LCD is used to represent the home appliance which is working on the receiver side.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Ir sensor mechanism and interfacing with a micro controllers.PPTkhairunnesa2
I am a student of Computer Science and engineering in University of Asia Pacific Student. I have tried to explain working mechanism of IR sensor.I am a student of Computer Science and engineering in University of Asia Pacific Student. I have tried to explain working mechanism of IR sensor.Hope this slide will be helpful for your works.Thank u :)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
2. SYED AMER {13J01A0403}
MOHAMMED SIRAJ PASHA {13J01A0408}
3. Security is primary concern for every one. This Project describes a
design of effective security alarm system that can monitor the
diamond in a museum using IR sensors. A IR sensor is connected to this
system for visual indication of the safety of the diamond.
This Project describes a design of effective security alarm system that
can monitor the diamond security with two different sensors. Unauthorized
access can be monitored by the status of each individual sensor and is
indicated with an LED. This security system works perfectly all the time
i.e., whether someone is present in the place or not.
4. A maximum of 4 sensors can be connected to the burglar alarm. These
sensors need to have their contacts closed when in the inactive state (i.e.
Normally Closed). In addition, each sensor needs to have its tamper
connection wired as well. A power supply voltage of +5 VDC is
available for each sensor at the corresponding wiring terminals.
When the alarm has been activated, the LED of the sensor that caused
the alarm will light up.The uniqueness of this project is not only alerting
the neighbors by siren, it also sends a message to smart mobile which is
already programmed into the system.
5.
6. An embedded system is some combination of computer hardware
and software, with either fixed or programmable capabilities, that
is specifically designed for a particular kind of application device.
Embedded systems do a very specific task, they cannot be
programmed to do different things.
9. The Intel 8052 is, single chip microcontroller (µC) which was
developed by Intel in 1980 for use in embedded systems.
Microcontrollers are widely used in embedded systems products.
Microcontroller is a programmable device.
10. A liquid crystal display (LCD) is a thin, flat panel used for
electronically displaying information such as text, images, and
moving pictures.
Its uses include monitors for computers, televisions, instrument
panels, and other devices ranging from aircraft cockpit displays, to
every-day consumer devices such as gaming devices, clocks,
watches, calculators, and telephones.
Among its major features are its lightweight construction, its
portability, and its ability to be produced in much larger screen
sizes than are practical for the construction of cathode ray tube
(CRT) display technology.
11.
12. The buzzers are offered in lightweight compact sizes from the
smallest diameter of 12mm to large Piezo electric sounders.
The buzzer is connected to port 3 of the microcontroller.
Types of buzzers
13. Bluetooth is a wireless
technology standard for
exchanging data over short
distances from fixed and
mobile devices, and building
personal area networks
(PANs).
it was originally conceived as
a wireless alternative to RS-
232 data cables.
14. A mercury switch (also
known as a mercury tilt
switch) is a switch which
opens and closes an electrical
circuit when it is tilted at
certain angles.
When it is tilted, a small
amount of the liquid metal
mercury makes contact with
metal electrodes to close the
circuit.
15. A panic switch is an electronic device designed to assist in alerting
somebody in emergency situations where a threat to persons or
property exists.
The switch can be used to request emergency assistance.
16. A light-emitting diode (LED) is a semiconductor device that emits visible
light when an electric current passes through it. The light is not
particularly bright, but in most LEDs it is monochromatic, occurring at a
single wavelength. The output from an LED can range from red (at a
wavelength of approximately 700 nanometers) to blue-violet (about 400
nanometers).
An LED consists of two elements of processed material called P-type
semiconductors and N-type semiconductors. These two In this elements
are placed in direct contact, forming a region called the P-N junction. In
this respect, the LED resembles the most other type diode types, but there
are Important other differences between the light emitting diode and the
normal diodes.
17. Infrared Flame Detector:
Infrared (IR) flame detectors work within the infrared spectral
band. Hot gases emit a specific spectral pattern in the infrared
region, which can be sensed with a thermal imaging camera (TIC)
a type of thermo graphic camera.
False alarms can be caused by other hot surfaces and
background thermal radiation in the area as well as blinding from
water and solar energy.
A typical frequency where single frequency IR flame detector is
sensitive is in the 4.4 micrometre range. Typical response time is
3-5 seconds.
18. An LDR (Light dependent resistor), as its name suggests, offers
resistance in response to the ambient light. The resistance
decreases as the intensity of incident light increases, and vice
versa. In the absence of light, LDR exhibits a resistance of the
order of mega-ohms which decreases to few hundred ohms in the
presence of light. It can act as a sensor, since a varying voltage
drop can be obtained in accordance with the varying light. It is
made up of cadmium sulphide (CdS).
An LDR has a zigzag cadmium sulphide track. It is a bilateral
device, i.e., conducts in both directions in same fashion.
19. Keil software:
Keil compiler is a software used where the machine language
code is written and compiled. After compilation, the machine
source code is converted into hex code which is to be dumped into
the microcontroller for further processing. Keil compiler also
supports C language code.
21. We conclude that main objective of this project is to develop an
embedded system to monitor the unwanted persons in the
restricted areas.
It has been developed by integrating features of all the hardware
components used. Presence of every module has been reasoned out
and placed carefully thus contributing to the best working of the
unit.
22. .
For the further development of this project we can do the
programming in such away if any intruder enters into the
restricted area directly the call or message will be
forwarded to concerned area police station.
Automatically it will shutdown the premises if any
intruder enters into the restricted area.