scholarly journals Security System to Prevent Tailgating Using Face Recognition and Ultrasonic Sensor

2020 ◽  
Vol 2 (5) ◽  
pp. 20-25
Author(s):  
Kannamma R ◽  
Bhargavi S ◽  
Bhavani Sree S ◽  
Mahalakshmi J

Tailgating is the one where an employee holds the office door for others to enter into the building with one access. This leads to insecure where in the unknown person can also enters into the building with the access of the original employee. To overcome this, introducing security system that prevents tailgating that provides authentication, accuracy, flexibility and gives more convenience to the security guards. It is an embedded based system and built under the Linux environment. First the faces of all the people is captured and trained using OpenCV python package for the purpose of further experimentation in the future. In this Raspberry pi is used as a main controller along with camera which enables to access image processing with any portable embedded system. When the person enters near to the gate, the ultrasonic sensor starts to sense and triggers the camera which detects the person face and checks with the trained dataset using the Haar Cascading algorithm, if it matches the gate gets opened. If suppose the person enters the gate with other person with one access control, then again, the camera gets triggered to capture the unauthorized person face and sends the mail of the detected person to the concerned authority through firebase cloud database.

2020 ◽  
Vol 9 (1) ◽  
pp. 284-291 ◽  
Author(s):  
Abd Kadir Mahamad ◽  
Sharifah Saon ◽  
Hamimi Hashim ◽  
Mohd Anuaruddin Ahmadon ◽  
Shingo Yamaguchi

Emergence of Industry 4.0 in current economic trend promotes the usage of Internet of Things (IoT) in product development. Counting people on streets or at entrances of places is indeed beneficial for security, tracking and marketing purposes. The usage of cameras or closed-circuit television (CCTV) for surveillance purposes has emerged the need of tools for the digital imagery content analysis to improve the system. The purpose of this project is to design a cloud-based people counter using Raspberry Pi embedded system and send the received data to ThingSpeak, IoT platform. The initial stage of the project is simulation and coding development using OpenCV and Python. For the hardware development, a Pi camera is used to capture the video footage and monitor the people movement. Raspberry Pi acts as the microcontroller for the system and process the video to perform people counting. Experiment have been conducted to measure the performance of the system in the actual environment, people counting on saved video footage and visualized the data on ThingSpeak platform.


2018 ◽  
Vol 7 (3.34) ◽  
pp. 231
Author(s):  
P Vasuki ◽  
Sesu Priya A ◽  
Soundarya R

In todays world, Security is a matter of great concern. Security controls play a vital role in protecting resources from espionage, sabotage, damage and theft. Our proposed system is to develop a security system with improved facilities, which tries to eliminate the limitations posed by the existing security systems. The current manual security system depends mostly on human involvement, which is prone to error, and the security is concentrated only at the front door which requires subjects cooperation. To solve these issues we have proposed a Smart Watchdog System. The system watches the environment, and if there is a human activity, the system captures it. The system automatically detects faces of the individual from the activity using firmware. We have planned to maintain the database of authorised inmates and workers of a place and verifies of every individual arriver. This feature enables the system to automatically recognises the unauthorised users and gives an alert when it encounters entry of unauthorised users even without the human assistance. The system also detects the unauthorised entry in the mass. The entire system is planned to be ported to Raspberry-Pi based Embedded System supported with DC power back up. This method can be employed in ladies hostels as well as to the secured places like the data centre, atomic research centre and military where the unauthorised entry is restricted.


2020 ◽  
Vol 9 (1) ◽  
pp. 1502-1504

Thieves are becoming smarter day-by-day which results in increase of looting of automobiles like scooters, cars and many other. To overcome this problem there is a crucial need for an effective system that diagnoses the vehicle theft. In this paper, an IoT based agile security system by using Raspberry Pi as the central processing unit of the entire system, a lightweight, cheap and efficient system is researched, built and explored. The Linux Embedded System gathers the data from Passive Infra-Red (PIR) motion sensors, pressure sensors, gas sensors, Global Positioning System (GPS), Pi camera, buzzer, and Liquid Crystal Display (LCD). The system has generally 2 modes. They are: Owner mode and Theft mode. If the system detects any intrusion in the vehicle it gives an alarm on detection, capture the image of the person by using image processing technique and identifies who is trying to unlock the vehicle and send coordinates of the vehicle when the intruder opens the vehicle door and starts moving the car, along with images of intruder to the owner by using a GSM module. By using GPS module, we can be to get the latitude and longitude of the vehicle remotely when the intruder has theft the vehicle.


Automatic Number Plate Recognition System is an embedded system that acknowledges the vehicle number plate automatically. Automatic Number Plate Recognition is a technology for computer vision to find the number plates of vehicles from the images. There are many applications like parking, access control, security system, etc. In this paper, we propose a technique of implementing Automatic Number Plate Recognition System using Python and Open Computer Vision Library. The different stages that are involved in the implementation are conversion into gray scale, conversion into binary image, detects the edges of the image, to find the contours and finally displays the number plate of a vehicle


Trictrac ◽  
2018 ◽  
Vol 10 ◽  
Author(s):  
Petru Adrian Danciu

Starting from the cry of the seraphim in Isaiahʹ s prophecy, this article aims to follow the rhythm of the sacred harmony, transcending the symbols of the angelic world and of the divine names, to get to the face to face meeting between man and God, just as the seraphim, reflecting their existence, stand face to face. The finality of the sacred harmony is that, during the search for God inside the human being, He reveals Himself, which is the reason for the affirmation of “I Am that I Am.” Through its hypnotic cyclicality, the profane temporality has its own musicality. Its purpose is to incubate the unsuspected potencies of the beings “caught” in the material world. Due to the fact that it belongs to the aeonic time, the divine music will exceed in harmony the mechanical musicality of profane time, dilating and temporarily cancelling it. Isaiah is witness to such revelation offering access to the heavenly concert. He is witness to divine harmonies produced by two divine singers, whose musical history is presented in our article. The seraphim accompanied the chosen people after their exodus from Egypt. The cultic use of the trumpet is related to the characteristics and behaviour of the seraphim. The seraphic music does not belong to the Creator, but its lyrics speak about the presence of the Creator in two realities, a spiritual and a material one. Only the transcendence of the divine names that are sung/cried affirms a unique reality: God. The chant-cry is a divine invocation with a double aim. On the one hand, the angels and the people affirm God’s presence and call His name and, on the other, the Creator affirms His presence through the angels or in man, the one who is His image and His likeness. The divine music does not only create, it is also a means of communion, implementing the relation of man to God and, thus, God’s connection with man. It is a relation in which both filiation and paternity disappear inside the harmony of the mutual recognition produced by music, a reality much older than Adam’s language.


2018 ◽  
Vol 12 (1) ◽  
pp. 1-24
Author(s):  
Koesparmono Irsan ◽  
Anggreany Haryani Putri

Brimob is a special top of Indonesian National Police Force, Brimob was trained to face special crimes using guns and other special weapon to face crimes using force. All politics is a struggle for power is violence. The reemergence in the early 1980s of terrorism motivated by a religions imperative and state-sponsored terrorist set in motion perfound changes in the nature, motivations and capabilitis of terrorist that are still unfolding. Torture is used as a strategic component of state security system to achieve board political ends thorugh the victimizaztion of individuals which serves pain of suffering, wether physical of metal, is intentionally inflicted : ‘many person, of course, harbor all sorts of radical and extreme belifts and opinion, and many of them belong to radical or even illegal of proscribed political organization. However, if they do not use violence in the pursuance of their beliefs, they cannot be considered terrorist. The willful application of force in such a way that is intentionally injurious to the person or group against whom it applied. Injury is under stood to include psychological as well as physical harm. Police use arms to protect himself and the people.


2020 ◽  
Vol 10 (3) ◽  
pp. 43-57
Author(s):  
See Seng Tan

Abstract: The longstanding effort to develop a people-based regionalism in Southeast Asia has been shaped by an inherent tension between the liberal inclination to privilege the individual and the community under formation, on the one hand, and the realist insistence on the primacy of the state, on the other. This article explores the conditions and constraints affecting ASEAN’s progress in remaking Southeast Asia into a people-focused and caring community in three areas: disaster management, development, and democratization (understood here as human rights). Arguably, the persistent gap in Southeast Asia between aspiration and expectation is determined less by political ideology than by the pragmatic responses of ASEAN member states to the forces of nationalism and protectionism, as well as their respective sense of local and regional responsibility.Resumen: El esfuerzo histórico para desarrollar un regionalismo basado en las personas del sudeste de Asia ha estado marcado por una tensión fundamental entre la inclinación liberal de privilegiar el individuo y la comunidad y la insistencia realista sobre la primacía del estado. Este artículo explora las condiciones y limitaciones que afectan el progreso de la ASEAN en la reestructuración de Asia sudoriental en una comunidad centrada en el cuidado de las personas en: gestión de desastres, desarrollo y democratización (i.e., derechos humanos). La brecha persistente en el sudeste asiático entre la aspiración y la expectativa está determinada por las respuestas pragmáticas de los miembros de la ASEAN sometidos a las fuerzas del nacionalismo y proteccionismo, así como su respectivo sentido de responsabilidad local y regional.Résumé: L’effort historique pour développer un régionalisme fondé sur les peuples en Asie du Sud-Est a été marqué par une tension fondamentale entre l’inclination libérale qui privilégie, d’une part, l’individu et la communauté et, d’autre part, l’insistance réaliste sur la primauté de l’État. Cet article explore les conditions et les contraintes qui nuisent aux progrès de l’ANASE dans le cadre d’une refonte de l’Asie du Sud-Est en une communauté centrée et attentive aux peuples dans trois domaines : la gestion des désastres, le développement et la démocratisation (en référence aux droits humains). Le fossé persistant en Asie du Sud-Est entre les aspirations et les attentes est vraisemblablement moins déterminé par l’idéologie politique que par les réponses pragmatiques des États membres de l’ANASE soumis aux forces du nationalisme et du protectionnisme ainsi que par leur sens respectif de la responsabilité locale et régionale.


Author(s):  
David Rondel

This chapter distinguishes between “vertical” and “horizontal” egalitarianism. The vertical and horizontal metaphors differentiate primarily between two types of relationship in which equality is said to play an important role—the “vertical” relationship between state and citizen, on the one hand, and the “horizontal” relationship between or among the people of a society, on the other. But the distinction may be used in a wider way to track several issues around which egalitarian theories tend to diverge: about what a commitment to equality ultimately means; about to whom or what egalitarian principles are meant to apply; about how equality is achieved and what its achievement looks like, and about how theorizing on equality is properly or most promisingly undertaken.


Author(s):  
Matthew H. Kramer
Keyword(s):  

Most critiques of edificatory perfectionism concentrate on the detrimental effects that will be undergone by the people whose lives the edificatory perfectionists are seeking to improve. Chapter 6 shifts the focus to the officials who formulate and implement the policies that produce such effects. On the one hand, Rawlsians and other contractualists quite rightly demur at the disrespect that is shown by edificatory perfectionists toward the putative beneficiaries of the measures which the perfectionists advocate. On the other hand, the contractualists largely neglect to take account of the ways in which the edificatory-perfectionist measures degrade the whole system of governance wherein they occur. Chapter 6 highlights that degradingness as it draws attention to the quidnunc mentality that is evinced by the officials who adopt and administer the laws for which the edificatory perfectionists have called.


Sign in / Sign up

Export Citation Format

Share Document