SlideShare a Scribd company logo
1 of 12
SRI VENKATESWARA COLLEGE OF ENGINEERING AND TECHNOLOGY
CHITTOOR(AUTONOMOUS)
BACHELOR OF TECHNOLOGY
IN
ELECTRONICS AND COMMUNICATION ENGINEERING
ARTIFICAL INTELLGENCE BASED SECURITY SYSTEM FOR JEWELLERY SHOPS
BATCH NO: B3
20781A04C3 : P S VENKATESH
20781A04C4 : P UDAY KIRAN
20781A04C9 : P YUGANDHAR
20781A04B8 : N PRAVEEN
20781A0498 : M LOKESH
Under the Guidance of
M Sumathi mam ,
OUTLINE
• ABSTRACT
• INTRODUCTION
• PROJECT TITLE JUSTIFICATION
• EXPLANATION OF IDENTIFIED PROBLEM
• GANTT CHART
• REFERENCES
ABSTRACT
• Technology has presented many security framework to society of which IoT based
security is more populous.
• For many security purposes, sensors and camera act as backbone of the system
which look no more than an alarming system detecting movement.
• This work investigates the potential of full security control which is the aim of the
automation systems in near future.
• An automated security system using Internet of Things along with alert text is
presented in this project.
INTRODUCTION
In the proposed system, we are doing normal surveillance in the shop or bank with the
help of camera during working hours. During the closure time of the shop or bank the
authorized person will turn on the security mechanism through the webpage. Once the
security mechanism is turned on, then the microcontroller will activate the PIR sensor for
detecting any human presence in that area. And if any human presence is detected, then
the camera will capture the image of the person entered . Then the image of the person
will be sent to the police and authorized person through email and also alert message will
be sent with the help of IOT. And in addition to that, to avoid the escape of burglar, the
microprocessor will produce the irritating sound and the harmless gas to make sure the
person doesn’t exit.
BLOCK DIAGRAM
MICRO
CONTROLL
ER
POWER
SUPPLY
PIR SENSOR
LCD
IOT /
GSM
EYE
IRRITATING
GAS
SONIC
INFLUENCER
PROJECT TITLE JUSTIFICATION
Relevance : Jewelry shops face unique security challenges due to the high-value nature of
their inventory, making them prime targets for theft and fraudulent activities
Significance : The implementation of an AI-based security system in jewelry shops holds
immense significance in mitigating security risks and minimizing potential losses. With the
ability to continuously monitor the shop floor, display cases, and other sensitive areas, AI
algorithms can detect anomalies, such as loitering, unusual behavior, or tampering with
security measures, alerting staff to potential security threats in real-time.
APPLICATIONS:
• Facial recognition
• Inventory management
• Access control
• Behavioral analysis
• Remote monitoring
• Integration with alarm system
ADVANTAGES
• Crime prevention
• Theft prevention
• Continuous monitoring
• Protecting the valuable things
• Quick response time
GANTT CHART (Change Months from feb)
REFERENCES
[1] Mavroudis, Shuang Hao, Yanick Fratantonio , Federico Maggi, Christopher Kruegel , and Giovanni
Vigna. On the Privacy and Security of the Ultrasound Ecosystem. Privacy enhancing technologies, 2017.
[2] Christopher Kruegel , Giovanni Vigna, Shuang Hao, Federico Maggi, Yanick Fratantonio , and
Vasilios Mavroudis. Talking Behind Your Back: Attacks and Countermeasures of Ultrasonic Cross
device Tracking. In BlackhatEu, 2016.
[3] Lei Yang, Yi Guo, Xuan Ding, Jinsong Han, Yunhao Liu, Cheng Wang, and Changwei Hu.
Unlocking Smart Phone through Handwaving Biometrics. IEEE Transactions on Mobile Computing,
2015.
[4] Shahriar Nirjon, Jeremy Gummeson, Dan Gelb, and Kyu-Han Kim. TypingRing: A Wearable Ring
Platform for Text Input. In Proceedings of ACM MobiSys, 2015.
[5] Abhinav Parate, Meng-Chieh Chiu, Chaniel Chadowitz, Deepak Ganesan, and Evangelos
Kalogerakis. RisQ: Recognizing Smoking Gestures with Inertial Sensors on a Wristband. In Proceedings
of ACM MobiSys, 2014.
[6] Shubham Jain, Carlo Borgiattino, Yanzhi Ren, Marco Gruteser, Yingying Chen, and Carla Fabiana
Chiasserini. LookUp: Enabling Pedestrian Safety Services via Shoe Sensing. In Proceedings of ACM
MobiSys, 2015.
[7] Weixi Gu, Longfei Shangguan, Zheng Yang, and Yunhao Liu. Sleep Hunter: Towards Fine Grained
Sleep Stage Tracking with Smartphones. IEEE Transactions on Mobile Computing, 2016.
[8] Xuefeng Liu, Jiannong Cao, Shaojie Tang, Zongjian He, and Jiaqi Wen. Drive Now, Text Later:
Nonintrusive Texting-While-Driving Detection Using Smartphones. IEEE Transactions on Mobile
Computing, 2017.
[9] Ravi Kishore Kodali, Vishal Jain, Suvadeep Bose and Lakshmi Boppana, “IoT based smart security
and home automation system,” in International Conference on Computing, Communication and
Automation, 2016.
[10] Pooja Dahiya, Neha, Dr. SRN Reddy, “IoT based home alert system using Wi-Fi and cloud
technologies,” IoT based Home Alert System using Wi-Fi and Cloud Technologies, Jul. 2016.
[11] Edison Lancy D’souza, Roopa S, Rohan D Salins, “Integrated realtime intrusion detection system
using IoT,” International Journal of Innovative Research in Science, Engineering and Technology,
2016.
[12] Snehal Boob, Priyanka Jadhav,“Wireless intrusion detection system,” International Journal of
Computer Applications (0975-8887), Aug. 2010.
[13] B. R. Pavithra, D., “Iot based monitoring and control system for home automation,” Apr. 2015.
[14] S. Vishal, G. Prashanth, “Motion detection using IoT and embedded system concepts,”
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering,
2016.
THANK YOU

More Related Content

Similar to Zeroth_Review[1].pptx venkatesh yugander

Pay-Cloak:Biometric
Pay-Cloak:BiometricPay-Cloak:Biometric
Pay-Cloak:Biometricijtsrd
 
Final copy HS11.pptxgfhehrdjrdjytdjysjrtrs
Final copy HS11.pptxgfhehrdjrdjytdjysjrtrsFinal copy HS11.pptxgfhehrdjrdjytdjysjrtrs
Final copy HS11.pptxgfhehrdjrdjytdjysjrtrsAnup464706
 
76 s201917
76 s20191776 s201917
76 s201917IJRAT
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET Journal
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEOIRJET Journal
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxInfosectrain3
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Asiri Hewage
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security TechnologiesRuchikaSachdeva4
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMIRJET Journal
 
Io t platform-infotech_arpanpal
Io t platform-infotech_arpanpalIo t platform-infotech_arpanpal
Io t platform-infotech_arpanpalArpan Pal
 
Cybersecurity_&_Physical_Security_Final_Paper_.pdf
Cybersecurity_&_Physical_Security_Final_Paper_.pdfCybersecurity_&_Physical_Security_Final_Paper_.pdf
Cybersecurity_&_Physical_Security_Final_Paper_.pdfgeorgeterekhov
 
Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT IJECEIAES
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTIJEACS
 
IoT and security
IoT and securityIoT and security
IoT and securityIET India
 
Motion Detection System for Security Using IoT- Survey
Motion Detection System for Security Using IoT- SurveyMotion Detection System for Security Using IoT- Survey
Motion Detection System for Security Using IoT- SurveyIRJET Journal
 
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET Journal
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Dr. Michael Agbaje
 

Similar to Zeroth_Review[1].pptx venkatesh yugander (20)

Pay-Cloak:Biometric
Pay-Cloak:BiometricPay-Cloak:Biometric
Pay-Cloak:Biometric
 
Android titles adrit solutions
Android titles adrit solutionsAndroid titles adrit solutions
Android titles adrit solutions
 
Final copy HS11.pptxgfhehrdjrdjytdjysjrtrs
Final copy HS11.pptxgfhehrdjrdjytdjysjrtrsFinal copy HS11.pptxgfhehrdjrdjytdjysjrtrs
Final copy HS11.pptxgfhehrdjrdjytdjysjrtrs
 
76 s201917
76 s20191776 s201917
76 s201917
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine Learning
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
 
Io t platform-infotech_arpanpal
Io t platform-infotech_arpanpalIo t platform-infotech_arpanpal
Io t platform-infotech_arpanpal
 
SMART SECURITY SYSTEM USING IOT - MID-TERM PROJECT.pptx
SMART SECURITY SYSTEM USING IOT - MID-TERM PROJECT.pptxSMART SECURITY SYSTEM USING IOT - MID-TERM PROJECT.pptx
SMART SECURITY SYSTEM USING IOT - MID-TERM PROJECT.pptx
 
Cybersecurity_&_Physical_Security_Final_Paper_.pdf
Cybersecurity_&_Physical_Security_Final_Paper_.pdfCybersecurity_&_Physical_Security_Final_Paper_.pdf
Cybersecurity_&_Physical_Security_Final_Paper_.pdf
 
Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOT
 
IoT and security
IoT and securityIoT and security
IoT and security
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Motion Detection System for Security Using IoT- Survey
Motion Detection System for Security Using IoT- SurveyMotion Detection System for Security Using IoT- Survey
Motion Detection System for Security Using IoT- Survey
 
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.
 

Recently uploaded

Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfJNTUA
 
History of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationHistory of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationEmaan Sharma
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxMustafa Ahmed
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfSkNahidulIslamShrabo
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfJNTUA
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfEr.Sonali Nasikkar
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...Amil baba
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1T.D. Shashikala
 
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTUUNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTUankushspencer015
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..MaherOthman7
 
15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon15-Minute City: A Completely New Horizon
15-Minute City: A Completely New HorizonMorshed Ahmed Rahath
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxkalpana413121
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...archanaece3
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Stationsiddharthteach18
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfragupathi90
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalSwarnaSLcse
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Studentskannan348865
 
Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Studentskannan348865
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
 

Recently uploaded (20)

Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdf
 
History of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationHistory of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & Modernization
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdf
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTUUNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
 
15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Station
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdf
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference Modal
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Students
 
Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Students
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 

Zeroth_Review[1].pptx venkatesh yugander

  • 1. SRI VENKATESWARA COLLEGE OF ENGINEERING AND TECHNOLOGY CHITTOOR(AUTONOMOUS) BACHELOR OF TECHNOLOGY IN ELECTRONICS AND COMMUNICATION ENGINEERING ARTIFICAL INTELLGENCE BASED SECURITY SYSTEM FOR JEWELLERY SHOPS BATCH NO: B3 20781A04C3 : P S VENKATESH 20781A04C4 : P UDAY KIRAN 20781A04C9 : P YUGANDHAR 20781A04B8 : N PRAVEEN 20781A0498 : M LOKESH Under the Guidance of M Sumathi mam ,
  • 2. OUTLINE • ABSTRACT • INTRODUCTION • PROJECT TITLE JUSTIFICATION • EXPLANATION OF IDENTIFIED PROBLEM • GANTT CHART • REFERENCES
  • 3. ABSTRACT • Technology has presented many security framework to society of which IoT based security is more populous. • For many security purposes, sensors and camera act as backbone of the system which look no more than an alarming system detecting movement. • This work investigates the potential of full security control which is the aim of the automation systems in near future. • An automated security system using Internet of Things along with alert text is presented in this project.
  • 4. INTRODUCTION In the proposed system, we are doing normal surveillance in the shop or bank with the help of camera during working hours. During the closure time of the shop or bank the authorized person will turn on the security mechanism through the webpage. Once the security mechanism is turned on, then the microcontroller will activate the PIR sensor for detecting any human presence in that area. And if any human presence is detected, then the camera will capture the image of the person entered . Then the image of the person will be sent to the police and authorized person through email and also alert message will be sent with the help of IOT. And in addition to that, to avoid the escape of burglar, the microprocessor will produce the irritating sound and the harmless gas to make sure the person doesn’t exit.
  • 5. BLOCK DIAGRAM MICRO CONTROLL ER POWER SUPPLY PIR SENSOR LCD IOT / GSM EYE IRRITATING GAS SONIC INFLUENCER
  • 6. PROJECT TITLE JUSTIFICATION Relevance : Jewelry shops face unique security challenges due to the high-value nature of their inventory, making them prime targets for theft and fraudulent activities Significance : The implementation of an AI-based security system in jewelry shops holds immense significance in mitigating security risks and minimizing potential losses. With the ability to continuously monitor the shop floor, display cases, and other sensitive areas, AI algorithms can detect anomalies, such as loitering, unusual behavior, or tampering with security measures, alerting staff to potential security threats in real-time.
  • 7. APPLICATIONS: • Facial recognition • Inventory management • Access control • Behavioral analysis • Remote monitoring • Integration with alarm system
  • 8. ADVANTAGES • Crime prevention • Theft prevention • Continuous monitoring • Protecting the valuable things • Quick response time
  • 9. GANTT CHART (Change Months from feb)
  • 10. REFERENCES [1] Mavroudis, Shuang Hao, Yanick Fratantonio , Federico Maggi, Christopher Kruegel , and Giovanni Vigna. On the Privacy and Security of the Ultrasound Ecosystem. Privacy enhancing technologies, 2017. [2] Christopher Kruegel , Giovanni Vigna, Shuang Hao, Federico Maggi, Yanick Fratantonio , and Vasilios Mavroudis. Talking Behind Your Back: Attacks and Countermeasures of Ultrasonic Cross device Tracking. In BlackhatEu, 2016. [3] Lei Yang, Yi Guo, Xuan Ding, Jinsong Han, Yunhao Liu, Cheng Wang, and Changwei Hu. Unlocking Smart Phone through Handwaving Biometrics. IEEE Transactions on Mobile Computing, 2015. [4] Shahriar Nirjon, Jeremy Gummeson, Dan Gelb, and Kyu-Han Kim. TypingRing: A Wearable Ring Platform for Text Input. In Proceedings of ACM MobiSys, 2015. [5] Abhinav Parate, Meng-Chieh Chiu, Chaniel Chadowitz, Deepak Ganesan, and Evangelos Kalogerakis. RisQ: Recognizing Smoking Gestures with Inertial Sensors on a Wristband. In Proceedings of ACM MobiSys, 2014. [6] Shubham Jain, Carlo Borgiattino, Yanzhi Ren, Marco Gruteser, Yingying Chen, and Carla Fabiana Chiasserini. LookUp: Enabling Pedestrian Safety Services via Shoe Sensing. In Proceedings of ACM MobiSys, 2015.
  • 11. [7] Weixi Gu, Longfei Shangguan, Zheng Yang, and Yunhao Liu. Sleep Hunter: Towards Fine Grained Sleep Stage Tracking with Smartphones. IEEE Transactions on Mobile Computing, 2016. [8] Xuefeng Liu, Jiannong Cao, Shaojie Tang, Zongjian He, and Jiaqi Wen. Drive Now, Text Later: Nonintrusive Texting-While-Driving Detection Using Smartphones. IEEE Transactions on Mobile Computing, 2017. [9] Ravi Kishore Kodali, Vishal Jain, Suvadeep Bose and Lakshmi Boppana, “IoT based smart security and home automation system,” in International Conference on Computing, Communication and Automation, 2016. [10] Pooja Dahiya, Neha, Dr. SRN Reddy, “IoT based home alert system using Wi-Fi and cloud technologies,” IoT based Home Alert System using Wi-Fi and Cloud Technologies, Jul. 2016. [11] Edison Lancy D’souza, Roopa S, Rohan D Salins, “Integrated realtime intrusion detection system using IoT,” International Journal of Innovative Research in Science, Engineering and Technology, 2016. [12] Snehal Boob, Priyanka Jadhav,“Wireless intrusion detection system,” International Journal of Computer Applications (0975-8887), Aug. 2010. [13] B. R. Pavithra, D., “Iot based monitoring and control system for home automation,” Apr. 2015. [14] S. Vishal, G. Prashanth, “Motion detection using IoT and embedded system concepts,” International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, 2016.