A software developer is a professional who designs, creates, and maintains software applications or systems. They typically have expertise in programming languages, software development methodologies, and tools necessary to build software. Software developers may specialize in areas such as web development, mobile app development, database management, or artificial intelligence. They often work in teams, collaborating with other developers, designers, and stakeholders to bring software projects to fruition. Strong problem-solving skills, attention to detail, and the ability to adapt to new technologies are essential qualities for a successful software developer.
Developing a smart system for infant incubators using the internet of things ...
Zeroth_Review[1].pptx venkatesh yugander
1. SRI VENKATESWARA COLLEGE OF ENGINEERING AND TECHNOLOGY
CHITTOOR(AUTONOMOUS)
BACHELOR OF TECHNOLOGY
IN
ELECTRONICS AND COMMUNICATION ENGINEERING
ARTIFICAL INTELLGENCE BASED SECURITY SYSTEM FOR JEWELLERY SHOPS
BATCH NO: B3
20781A04C3 : P S VENKATESH
20781A04C4 : P UDAY KIRAN
20781A04C9 : P YUGANDHAR
20781A04B8 : N PRAVEEN
20781A0498 : M LOKESH
Under the Guidance of
M Sumathi mam ,
3. ABSTRACT
• Technology has presented many security framework to society of which IoT based
security is more populous.
• For many security purposes, sensors and camera act as backbone of the system
which look no more than an alarming system detecting movement.
• This work investigates the potential of full security control which is the aim of the
automation systems in near future.
• An automated security system using Internet of Things along with alert text is
presented in this project.
4. INTRODUCTION
In the proposed system, we are doing normal surveillance in the shop or bank with the
help of camera during working hours. During the closure time of the shop or bank the
authorized person will turn on the security mechanism through the webpage. Once the
security mechanism is turned on, then the microcontroller will activate the PIR sensor for
detecting any human presence in that area. And if any human presence is detected, then
the camera will capture the image of the person entered . Then the image of the person
will be sent to the police and authorized person through email and also alert message will
be sent with the help of IOT. And in addition to that, to avoid the escape of burglar, the
microprocessor will produce the irritating sound and the harmless gas to make sure the
person doesn’t exit.
6. PROJECT TITLE JUSTIFICATION
Relevance : Jewelry shops face unique security challenges due to the high-value nature of
their inventory, making them prime targets for theft and fraudulent activities
Significance : The implementation of an AI-based security system in jewelry shops holds
immense significance in mitigating security risks and minimizing potential losses. With the
ability to continuously monitor the shop floor, display cases, and other sensitive areas, AI
algorithms can detect anomalies, such as loitering, unusual behavior, or tampering with
security measures, alerting staff to potential security threats in real-time.
7. APPLICATIONS:
• Facial recognition
• Inventory management
• Access control
• Behavioral analysis
• Remote monitoring
• Integration with alarm system
8. ADVANTAGES
• Crime prevention
• Theft prevention
• Continuous monitoring
• Protecting the valuable things
• Quick response time
10. REFERENCES
[1] Mavroudis, Shuang Hao, Yanick Fratantonio , Federico Maggi, Christopher Kruegel , and Giovanni
Vigna. On the Privacy and Security of the Ultrasound Ecosystem. Privacy enhancing technologies, 2017.
[2] Christopher Kruegel , Giovanni Vigna, Shuang Hao, Federico Maggi, Yanick Fratantonio , and
Vasilios Mavroudis. Talking Behind Your Back: Attacks and Countermeasures of Ultrasonic Cross
device Tracking. In BlackhatEu, 2016.
[3] Lei Yang, Yi Guo, Xuan Ding, Jinsong Han, Yunhao Liu, Cheng Wang, and Changwei Hu.
Unlocking Smart Phone through Handwaving Biometrics. IEEE Transactions on Mobile Computing,
2015.
[4] Shahriar Nirjon, Jeremy Gummeson, Dan Gelb, and Kyu-Han Kim. TypingRing: A Wearable Ring
Platform for Text Input. In Proceedings of ACM MobiSys, 2015.
[5] Abhinav Parate, Meng-Chieh Chiu, Chaniel Chadowitz, Deepak Ganesan, and Evangelos
Kalogerakis. RisQ: Recognizing Smoking Gestures with Inertial Sensors on a Wristband. In Proceedings
of ACM MobiSys, 2014.
[6] Shubham Jain, Carlo Borgiattino, Yanzhi Ren, Marco Gruteser, Yingying Chen, and Carla Fabiana
Chiasserini. LookUp: Enabling Pedestrian Safety Services via Shoe Sensing. In Proceedings of ACM
MobiSys, 2015.
11. [7] Weixi Gu, Longfei Shangguan, Zheng Yang, and Yunhao Liu. Sleep Hunter: Towards Fine Grained
Sleep Stage Tracking with Smartphones. IEEE Transactions on Mobile Computing, 2016.
[8] Xuefeng Liu, Jiannong Cao, Shaojie Tang, Zongjian He, and Jiaqi Wen. Drive Now, Text Later:
Nonintrusive Texting-While-Driving Detection Using Smartphones. IEEE Transactions on Mobile
Computing, 2017.
[9] Ravi Kishore Kodali, Vishal Jain, Suvadeep Bose and Lakshmi Boppana, “IoT based smart security
and home automation system,” in International Conference on Computing, Communication and
Automation, 2016.
[10] Pooja Dahiya, Neha, Dr. SRN Reddy, “IoT based home alert system using Wi-Fi and cloud
technologies,” IoT based Home Alert System using Wi-Fi and Cloud Technologies, Jul. 2016.
[11] Edison Lancy D’souza, Roopa S, Rohan D Salins, “Integrated realtime intrusion detection system
using IoT,” International Journal of Innovative Research in Science, Engineering and Technology,
2016.
[12] Snehal Boob, Priyanka Jadhav,“Wireless intrusion detection system,” International Journal of
Computer Applications (0975-8887), Aug. 2010.
[13] B. R. Pavithra, D., “Iot based monitoring and control system for home automation,” Apr. 2015.
[14] S. Vishal, G. Prashanth, “Motion detection using IoT and embedded system concepts,”
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering,
2016.