Analysis of Visible Light Communication using Integrated Avalanche Photodiode
Volume-4 | Issue-2
A Review on Identifying Suitable Machine Learning Approach for Internet of Things Applications
Volume-3 | Issue-3
TOWARDS GHZ METALLIC ACCESS NETWORKS
Volume-1 | Issue-1
REVIEW ON UBIQUITOUS CLOUDS AND PERSONAL MOBILE NETWORKS
Volume-1 | Issue-3
Process Control Ladder Logic Trouble Shooting Techniques Fundamentals
Volume-1 | Issue-4
TRUST BASED ROUTING ALGORITHM IN INTERNET OF THINGS (IoT)
Volume-1 | Issue-1
COMPUTATIONAL OFFLOADING FOR PERFORMANCE IMPROVEMENT AND ENERGY SAVING IN MOBILE DEVICES
Volume-1 | Issue-4
ANALYSIS OF ROUTING PROTOCOLS IN FLYING WIRELESS NETWORKS
Volume-1 | Issue-3
Dual Edge-Fed Left Hand and Right Hand Circularly Polarized Rectangular Micro-Strip Patch Antenna for Wireless Communication Applications
Volume-2 | Issue-3
Modified Gray Wolf Feature Selection and Machine Learning Classification for Wireless Sensor Network Intrusion Detection
Volume-3 | Issue-2
TRUST BASED ROUTING ALGORITHM IN INTERNET OF THINGS (IoT)
Volume-1 | Issue-1
Hybrid Micro-Energy Harvesting Model using WSN for Self-Sustainable Wireless Mobile Charging Application
Volume-3 | Issue-3
Three Phase Coil based Optimized Wireless Charging System for Electric Vehicles
Volume-3 | Issue-3
Cyber-attack and Measuring its Risk
Volume-3 | Issue-4
REVIEW ON UBIQUITOUS CLOUDS AND PERSONAL MOBILE NETWORKS
Volume-1 | Issue-3
Analysis of Solar Power Generation Performance Improvement Techniques
Volume-4 | Issue-3
Pollination Inspired Clustering Model for Wireless Sensor Network Optimization
Volume-3 | Issue-3
Design of Low Power Cam Memory Cell for the Next Generation Network Processors
Volume-3 | Issue-4
A STUDY OF RESEARCH NOTIONS IN WIRELESS BODY SENSOR NETWORK (WBSN)
Volume-1 | Issue-2
Computation of Constant Gain and NF Circles for 60 GHz Ultra-low noise Amplifiers
Volume-3 | Issue-3
Volume - 5 | Issue - 3 | september 2023
Published
10 August, 2023
The internet of Things (IoT)-based total security is the most broadly used protection framework introduced by the technological developments. Sensors and cameras play a vital role in detecting movement and alerting the humans in lots of security applications. As these security gadgets are always accompanied with alarm systems, it is more popularly used for preventing the theft in public places like shopping malls and shops. In such areas, conventional CCTV cameras are usually used as it helps in non-stop human tracking, and detections of crimes. The proposed system is also on such intelligent security system capable of identifying mis-happenings in the public places. With real-time image feedback, the proposed device provides the owner with assurance even when they are not around. These studies examine the possibility of implementing automation technologies in the near future to provide complete protective control. The research suggests a fully automated security system that uses alarm messages and the internet of things (IoT) to predict and prevent unwanted activities in the jewellery shop.
KeywordsESP32 Microcontroller PIR sensor Solenoid Valve Exhaust Fan Camera Buzzer
Full Article PDF