Submit Search
Upload
IRJET- Integration of Physical System Monitoring, Crime Posting Alerting Dangerous Zone
•
0 likes
•
8 views
IRJET Journal
Follow
https://www.irjet.net/archives/V5/i4/IRJET-V5I4243.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
NEXTGEN’S HOSPILOGICS USING APACHE TOMCAT SERVER AND MYSQLDATABASE
NEXTGEN’S HOSPILOGICS USING APACHE TOMCAT SERVER AND MYSQLDATABASE
IJTRET-International Journal of Trendy Research in Engineering and Technology
IRJET- Online Voting System using Fingerprint Scanner
IRJET- Online Voting System using Fingerprint Scanner
IRJET Journal
IRJET- UID Secure Travel Identity
IRJET- UID Secure Travel Identity
IRJET Journal
DRINK AND DRIVE DETECTION SYSTEM
DRINK AND DRIVE DETECTION SYSTEM
AM Publications,India
IRJET-E-Nursing System
IRJET-E-Nursing System
IRJET Journal
An E-Governance Web Security Survey
An E-Governance Web Security Survey
IOSRjournaljce
TriEpic Final Project
TriEpic Final Project
Tam Cao Mai Thanh
A DISTRIBUTED MACHINE LEARNING BASED IDS FOR CLOUD COMPUTING
A DISTRIBUTED MACHINE LEARNING BASED IDS FOR CLOUD COMPUTING
IJTRET-International Journal of Trendy Research in Engineering and Technology
Recommended
NEXTGEN’S HOSPILOGICS USING APACHE TOMCAT SERVER AND MYSQLDATABASE
NEXTGEN’S HOSPILOGICS USING APACHE TOMCAT SERVER AND MYSQLDATABASE
IJTRET-International Journal of Trendy Research in Engineering and Technology
IRJET- Online Voting System using Fingerprint Scanner
IRJET- Online Voting System using Fingerprint Scanner
IRJET Journal
IRJET- UID Secure Travel Identity
IRJET- UID Secure Travel Identity
IRJET Journal
DRINK AND DRIVE DETECTION SYSTEM
DRINK AND DRIVE DETECTION SYSTEM
AM Publications,India
IRJET-E-Nursing System
IRJET-E-Nursing System
IRJET Journal
An E-Governance Web Security Survey
An E-Governance Web Security Survey
IOSRjournaljce
TriEpic Final Project
TriEpic Final Project
Tam Cao Mai Thanh
A DISTRIBUTED MACHINE LEARNING BASED IDS FOR CLOUD COMPUTING
A DISTRIBUTED MACHINE LEARNING BASED IDS FOR CLOUD COMPUTING
IJTRET-International Journal of Trendy Research in Engineering and Technology
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AM Publications
Healthcare Data Breaches: Biometric Technology to the Rescue
Healthcare Data Breaches: Biometric Technology to the Rescue
IRJET Journal
IRJET - Centralized Data for Transport Automation System using Android St...
IRJET - Centralized Data for Transport Automation System using Android St...
IRJET Journal
AUTOMATION IN ANESTHESIA ADMINISTRATION USING FIELD PROGRAMMABLE GATE ARRAY
AUTOMATION IN ANESTHESIA ADMINISTRATION USING FIELD PROGRAMMABLE GATE ARRAY
IJTRET-International Journal of Trendy Research in Engineering and Technology
IRJET- Aadhaar Based Voting System using Android Application
IRJET- Aadhaar Based Voting System using Android Application
IRJET Journal
IRJET - Plant Leaf Disease Detection and Automated Medicine using IoT
IRJET - Plant Leaf Disease Detection and Automated Medicine using IoT
IRJET Journal
IRJET- Automatic Attendance System using Arduino and GSM Module
IRJET- Automatic Attendance System using Arduino and GSM Module
IRJET Journal
IRJET - Remote Health Monitoring System using IoT
IRJET - Remote Health Monitoring System using IoT
IRJET Journal
SAFETY NOTIFICATION AND BUS MONITORING SYSTEM
SAFETY NOTIFICATION AND BUS MONITORING SYSTEM
IJTRET-International Journal of Trendy Research in Engineering and Technology
Risk management in Healthcare on Cloud
Risk management in Healthcare on Cloud
Sandeep Sharma IIMK Smart City,IoT,Bigdata,Cloud,BI,DW
IRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET Journal
Android Malware Detection in Official and Third Party Application Stores
Android Malware Detection in Official and Third Party Application Stores
Eswar Publications
AUTHENTICATED MEDICAL DOCUMENTS RELEASING WITH PRIVACY PROTECTION AND RELEAS...
AUTHENTICATED MEDICAL DOCUMENTS RELEASING WITH PRIVACY PROTECTION AND RELEAS...
IJTRET-International Journal of Trendy Research in Engineering and Technology
IRJET- Usage-Based Automotive Insurance System
IRJET- Usage-Based Automotive Insurance System
IRJET Journal
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET Journal
IRJET - Biometric based Medical Record System
IRJET - Biometric based Medical Record System
IRJET Journal
IRJET - Android based Application – Missing Person
IRJET - Android based Application – Missing Person
IRJET Journal
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET Journal
IRJET- Biometric Vehicle Starter and Security
IRJET- Biometric Vehicle Starter and Security
IRJET Journal
Ijsrdv7 i10842
Ijsrdv7 i10842
aissmsblogs
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET Journal
Fraud App Detection using Machine Learning
Fraud App Detection using Machine Learning
IRJET Journal
More Related Content
What's hot
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AM Publications
Healthcare Data Breaches: Biometric Technology to the Rescue
Healthcare Data Breaches: Biometric Technology to the Rescue
IRJET Journal
IRJET - Centralized Data for Transport Automation System using Android St...
IRJET - Centralized Data for Transport Automation System using Android St...
IRJET Journal
AUTOMATION IN ANESTHESIA ADMINISTRATION USING FIELD PROGRAMMABLE GATE ARRAY
AUTOMATION IN ANESTHESIA ADMINISTRATION USING FIELD PROGRAMMABLE GATE ARRAY
IJTRET-International Journal of Trendy Research in Engineering and Technology
IRJET- Aadhaar Based Voting System using Android Application
IRJET- Aadhaar Based Voting System using Android Application
IRJET Journal
IRJET - Plant Leaf Disease Detection and Automated Medicine using IoT
IRJET - Plant Leaf Disease Detection and Automated Medicine using IoT
IRJET Journal
IRJET- Automatic Attendance System using Arduino and GSM Module
IRJET- Automatic Attendance System using Arduino and GSM Module
IRJET Journal
IRJET - Remote Health Monitoring System using IoT
IRJET - Remote Health Monitoring System using IoT
IRJET Journal
SAFETY NOTIFICATION AND BUS MONITORING SYSTEM
SAFETY NOTIFICATION AND BUS MONITORING SYSTEM
IJTRET-International Journal of Trendy Research in Engineering and Technology
Risk management in Healthcare on Cloud
Risk management in Healthcare on Cloud
Sandeep Sharma IIMK Smart City,IoT,Bigdata,Cloud,BI,DW
IRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET Journal
Android Malware Detection in Official and Third Party Application Stores
Android Malware Detection in Official and Third Party Application Stores
Eswar Publications
AUTHENTICATED MEDICAL DOCUMENTS RELEASING WITH PRIVACY PROTECTION AND RELEAS...
AUTHENTICATED MEDICAL DOCUMENTS RELEASING WITH PRIVACY PROTECTION AND RELEAS...
IJTRET-International Journal of Trendy Research in Engineering and Technology
IRJET- Usage-Based Automotive Insurance System
IRJET- Usage-Based Automotive Insurance System
IRJET Journal
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET Journal
IRJET - Biometric based Medical Record System
IRJET - Biometric based Medical Record System
IRJET Journal
IRJET - Android based Application – Missing Person
IRJET - Android based Application – Missing Person
IRJET Journal
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET Journal
IRJET- Biometric Vehicle Starter and Security
IRJET- Biometric Vehicle Starter and Security
IRJET Journal
Ijsrdv7 i10842
Ijsrdv7 i10842
aissmsblogs
What's hot
(20)
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
Healthcare Data Breaches: Biometric Technology to the Rescue
Healthcare Data Breaches: Biometric Technology to the Rescue
IRJET - Centralized Data for Transport Automation System using Android St...
IRJET - Centralized Data for Transport Automation System using Android St...
AUTOMATION IN ANESTHESIA ADMINISTRATION USING FIELD PROGRAMMABLE GATE ARRAY
AUTOMATION IN ANESTHESIA ADMINISTRATION USING FIELD PROGRAMMABLE GATE ARRAY
IRJET- Aadhaar Based Voting System using Android Application
IRJET- Aadhaar Based Voting System using Android Application
IRJET - Plant Leaf Disease Detection and Automated Medicine using IoT
IRJET - Plant Leaf Disease Detection and Automated Medicine using IoT
IRJET- Automatic Attendance System using Arduino and GSM Module
IRJET- Automatic Attendance System using Arduino and GSM Module
IRJET - Remote Health Monitoring System using IoT
IRJET - Remote Health Monitoring System using IoT
SAFETY NOTIFICATION AND BUS MONITORING SYSTEM
SAFETY NOTIFICATION AND BUS MONITORING SYSTEM
Risk management in Healthcare on Cloud
Risk management in Healthcare on Cloud
IRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris Recognition
Android Malware Detection in Official and Third Party Application Stores
Android Malware Detection in Official and Third Party Application Stores
AUTHENTICATED MEDICAL DOCUMENTS RELEASING WITH PRIVACY PROTECTION AND RELEAS...
AUTHENTICATED MEDICAL DOCUMENTS RELEASING WITH PRIVACY PROTECTION AND RELEAS...
IRJET- Usage-Based Automotive Insurance System
IRJET- Usage-Based Automotive Insurance System
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET - Biometric based Medical Record System
IRJET - Biometric based Medical Record System
IRJET - Android based Application – Missing Person
IRJET - Android based Application – Missing Person
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Biometric Vehicle Starter and Security
IRJET- Biometric Vehicle Starter and Security
Ijsrdv7 i10842
Ijsrdv7 i10842
Similar to IRJET- Integration of Physical System Monitoring, Crime Posting Alerting Dangerous Zone
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET Journal
Fraud App Detection using Machine Learning
Fraud App Detection using Machine Learning
IRJET Journal
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET Journal
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET Journal
IRJET- GDPS - General Disease Prediction System
IRJET- GDPS - General Disease Prediction System
IRJET Journal
IRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET Journal
Permission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine Learning
IRJET Journal
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
International Journal of Technical Research & Application
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET Journal
IRJET-Intelligent Farms
IRJET-Intelligent Farms
IRJET Journal
IRJET- Authentic News Summarization
IRJET- Authentic News Summarization
IRJET Journal
IRJET- Attack Detection Strategies in Wireless Sensor Network
IRJET- Attack Detection Strategies in Wireless Sensor Network
IRJET Journal
Click Fraud Detection Of Advertisements using Machine Learning
Click Fraud Detection Of Advertisements using Machine Learning
IRJET Journal
Fraud and Malware Detection in Google Play by using Search Rank
Fraud and Malware Detection in Google Play by using Search Rank
ijtsrd
Plant Disease Doctor App
Plant Disease Doctor App
IRJET Journal
IRJET- Biometric Voting Machine
IRJET- Biometric Voting Machine
IRJET Journal
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
IRJET Journal
IRJET- Crime Prediction System
IRJET- Crime Prediction System
IRJET Journal
Ansgar rcep algorithmic_bias_july2018
Ansgar rcep algorithmic_bias_july2018
Ansgar Koene
Fingerprint Based Voting
Fingerprint Based Voting
IRJET Journal
Similar to IRJET- Integration of Physical System Monitoring, Crime Posting Alerting Dangerous Zone
(20)
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
Fraud App Detection using Machine Learning
Fraud App Detection using Machine Learning
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET- GDPS - General Disease Prediction System
IRJET- GDPS - General Disease Prediction System
IRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute Resolution
Permission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine Learning
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET-Intelligent Farms
IRJET-Intelligent Farms
IRJET- Authentic News Summarization
IRJET- Authentic News Summarization
IRJET- Attack Detection Strategies in Wireless Sensor Network
IRJET- Attack Detection Strategies in Wireless Sensor Network
Click Fraud Detection Of Advertisements using Machine Learning
Click Fraud Detection Of Advertisements using Machine Learning
Fraud and Malware Detection in Google Play by using Search Rank
Fraud and Malware Detection in Google Play by using Search Rank
Plant Disease Doctor App
Plant Disease Doctor App
IRJET- Biometric Voting Machine
IRJET- Biometric Voting Machine
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
IRJET- Crime Prediction System
IRJET- Crime Prediction System
Ansgar rcep algorithmic_bias_july2018
Ansgar rcep algorithmic_bias_july2018
Fingerprint Based Voting
Fingerprint Based Voting
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
sdickerson1
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
121011101441
Research Methodology for Engineering pdf
Research Methodology for Engineering pdf
CaalaaAbdulkerim
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
Mebane Rash
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Erbil Polytechnic University
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction Project
Erbil Polytechnic University
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
irfanmechengr
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
siddharthjain2303
Earthing details of Electrical Substation
Earthing details of Electrical Substation
stephanwindworld
Main Memory Management in Operating System
Main Memory Management in Operating System
Rashmi Bhat
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
saravananr517913
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
jennyeacort
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Dr. Gudipudi Nageswara Rao
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
Madan Karki
Engineering Drawing section of solid
Engineering Drawing section of solid
namansinghjarodiya
welding defects observed during the welding
welding defects observed during the welding
MuhammadUzairLiaqat
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
Erbil Polytechnic University
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
HafizMudaserAhmad
Recently uploaded
(20)
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
Research Methodology for Engineering pdf
Research Methodology for Engineering pdf
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction Project
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
Earthing details of Electrical Substation
Earthing details of Electrical Substation
Main Memory Management in Operating System
Main Memory Management in Operating System
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
Engineering Drawing section of solid
Engineering Drawing section of solid
welding defects observed during the welding
welding defects observed during the welding
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
IRJET- Integration of Physical System Monitoring, Crime Posting Alerting Dangerous Zone
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1099 INTEGRATION OF PHYSICAL SYSTEM MONITORING, CRIME POSTING & ALERTING DANGEROUS ZONE A. Priyanka GAndhi1, S. Madhushree2, A. Nandhini3, V.ANITHA MOSES4 1, 2, 3 B.E., Department of CSE, Panimalar Engineering College, Chennai, Tamilnadu, India. 4 M.E., Department of CSE, Panimalar Engineering College, Chennai, Tamilnadu, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - We introduced an android application for people security on their way. Android user can post dangerous location based on the event happened in that particularplace. User can post photo or crime activity happened in that place. The crime data is updated in the server only whenmore than3 people have posted the same event in that place. Once the event is posted, automatic alert is displayed to all the general users who cross that area. Similarly in finding criminals their finger prints are automatically checked withcriminalrecords. By using above two processes we can easily find the criminal who are all involved in crime. And also we will get precaution about travelling place. Key Words: Biometric sensors, Automaticalert,Android application, Precaution. 1. INTRODUCTION In this paper, we will examine how Aadhaar biometric database can be used for crime investigation and how it can be integrated with the existing system in India, the challenges of integration, and possible solutions. Paper also highlights some of the technical and legal challenges for its implementation which is a policy matter. The whole system is designed in such a way that it can be easily verified by Government and Non-Government services. The system has been promoted as a tool for reducing fraud in many private and public distribution systems and enabling the government to better deliver public benefits. These systems generally stores citizen’s basic information as well as their biometric information and normally its built in such a way that it can be used for multiple purposes. In many countries, such systems are used for identifyingtheforgery,taxevasion and crime investigation. Our objective is to explore, how such system can be used for law enforcement and crime investigation. 1.1 USE OF BIOMETRIC DATABASE FOR CRIME INVESTIGATION Today a massive computing power and well written pattern matching algorithms have made it possible to automatically search and detect the patterns of similarityinmanydifferent kind of digital database of patterns which may include fingerprints, faces, and irises. Effectiveness and accuracy of such system are very promising even for very large databases. Fingerprints analysis is one of the most vital and integral process in crime investigation. Fingerprint databases are commonly used worldwide by almost all the police department and law enforcement agencies for the purposes of forensics, crime investigation and identifying the criminal’s involvements in various crimes. In India, it’s a challenging task for investigators to fish out fingerprints of criminals which often get lost or lay hidden in piles of files in police stations because no attempt has been made to put them in one database. For the country like India, having world second largest population, it’s really a very difficult to architect a separate biometric or identity database for different-different purposes individually. As 90% of Indian population has enrolled in Aadhaar, It becomes a standard biometric database which can be used for various purposes including the crime investigation. 1.2 UNIQUE IDENTIFICATION AUTHORITY OF INDIA The Unique Identification Authority of India (UIDAI) was created with the objective to issue Unique Identification numbers (UID), named as "Aadhaar",toall residentsofIndia. Aadhaar system is built purely as an “IdentityPlatform”.The main purpose of Aadhaar is to provide a biometric attached identity that is verifiable online. The whole system is designed in such a way that it can be easily verified by Government and Non-Government services. The system has been promoted as a tool for reducing fraud in much private and public distribution system andenablingthegovernment to better deliver public benefits. 2. PERFORMANCE MEASUREMENT OF BIOMETRIC IDENTIFICATION SYSTEM The main aspect to evaluate a biometric system is its accuracy. From the user’s point of view, an error of accuracy occurs when the system fails to authenticate theidentityofa registered person or when the system erroneously authenticates the identity of an intruder A biometric matching system’s response is typically a matching score (s) that quantifies the similarity between the input and the database template representations. The highest percentage gives the accurate results that shows the two biometric measurements comefromthesame person. A threshold regulates the system decision. The system infers that pairs of biometric samples generating scores higher than or equal to are mate pairs (that is, they belong to the same person). Consequently, pairs of biometric samples generating scores lower than are non-match pairs (that is,
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1100 they belong to different persons). The distribution of scores generated from pairs of samples from different persons is called an impostor distribution; the score distribution generated from pairs of samples from the same person is called a genuine distribution. (see Chart -1). Chart -1: Biometric system error rates There are several factors that can provoke accuracy errors. Biometrical Error rates are quantitative metrics of the accuracy of biometrical systems. They help biometric researchers and industry providers to improve their solutions and help system users to evaluate and choose the appropriate solutions for their applications. There are two types of error metrics: (a) to evaluate capturedevices.(b)To evaluate biometric algorithms. The Failure to Capture Rate (FCR) evaluates the capacity of a capture device to properly read a biometrical record in several environmental and human conditions. The failure of capture device is known as "Capture Error". For biometric algorithms evaluation there are metrics associated to each phase of the recognizing process The Failure to Enroll Rate (FER) measures the capacity of Enroll Component of the algorithm to detect, extract and compose the template from the biometric recordread bythe capture device, i.e., the FER is computed only for biometric record properly read. In the case of matching algorithm we have two important error rates: The False Matching Error Rate (FMR) measures the rate of actual impostor comparisons that are erroneously considered genuine. On the contrary the False Non matching Error Rate (FNMR) measures the rate of actual genuine comparisons that are erroneously considered impostors. In the case of ranking algorithm the main ranking error rate is the Rank (n) that measures the rateofgenuine comparisons isincludedamong the n most similar comparisons from a database An operational biometric system makes a trade-off between false match rate (FMR) and false non-match rate (FNMR). In fact, both FMR and FNMR are functions of the system threshold t: If the system’s designers decrease to make the system more tolerant to input variations and noise, FMR increases [6]. On the other hand, if they raise t to make the system more secure, then FNMR increases accordingly. System performance can be depicted at all operating points (thresholds) in the form of a receiver operating characteristic (ROC) curve. An ROC curve plots FMR against (1 – FNMR) or FNMR for various values of threshold. (see Chart 2). Chart -2: Receiver operating characteristic curve 3. PERFORMANCE OF AADHAAR BIOMETRIC SYSTEM As fingerprints alone will not be sufficient for achieving higher accuracy in biometric identification, Aadhaar has used multi-model biometric fusion techniques. UIDAI has achieved accuracy as high as 99% de-duplication due to the fusion of fingerprint and iris scores.AProofofConcept(PoC) study was carried out by UIDAI to assess the feasibility of using iris for on-line biometric authentication in the Indian context (Table 1). The findings of this study are presented in the report. This report covers the design framework, field implementation, data collection and analysis. It interprets empirical results to assess effectiveness of iris technology, authentication processes and devices. Table -1: FEASIBILITY OF IRIS BASED ON-LINE AUTHENTICATION If we study the UIDAI’s own technical report, the system has approximately a chance of 0.5 per cent occurrence of false identification. In Indian context this fractional values could possibly make Lakhs of people as Suspect. We can narrow
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1101 down this number but still chances are there that innocent may suffer, if the investigative agency solely depends on the system identification process. Fig -1: Architecture of Aadhaar Based Criminal Tracing System 3. ADVANTAGES Aadhaar has highest number of citizen enrollment till today. It’s one of the largest systems in the world storing such a huge number of Biometric information. The system is very reliable and scalable. Building similartypeofsystemonly for forensic and criminal investigation purpose may not be feasible and viable solution. Since Aadhaar is already well established system, its uses for the other purposes can be explored. Aadhaar was never intended for Forensic purpose and thus it was not designed in that way. The citizens who enrolled for Aadhaar never gave his consent of using his information for such investigations. 4. CONCLUSION Thus, the proposed new applicationwill try toaccessAadhar details via finger print sensors. This is to reduce the manual FIR system by making it automated. The databases of the existing criminal’s record are used to find the criminals with the help of matching biometric sensors. In public point of view, we used time-based and location-based details to indicate the public, about the criminal activities in that area. This helps the public to know about the travellingplaceeven though he/she is new to the particular place. The alert messages are also added by the public and it is updated to the database only if the same incident recorded for 3 times. This feature makes the crime evidently and also police comes to know about the particular crime and takes the steps accordingly. This application is trytohelpthe publicas well as police in such a way to improve the crime detection and analysis. REFERENCES [1] A. Sankaran, M. Vatsa and R. Singh, "Latent Fingerprint Matching: A Survey," in IEEE Access, vol. 2, no. , pp.9821004, 2014. [2] Anil K Jain, Arun Ross, "Bridging the gap: From biometrics to forensics", Philosophical Transactions of The Royal Society B Biological Sciences 370(1674), August 2015. [3] Anil K. Jain, Salil Prabhakar, and Sharath Pankanti. 2001. Twin Test: On Discriminability of Fingerprints. In Proceedings of the Third International Conference on Audio- and Video-Based Biometric Person Authentication (AVBPA '01), Josef Bigün and Fabrizio Smeraldi (Eds.). Springer-Verlag, London, UK, UK, 211- 216. [4] Bouchrika, I., Goffredo, M., Carter, J. and Nixon, M. (2011), On Using Gait in Forensic Biometrics. Journal of Forensic Sciences, 56: 882–889. [5] D. Brown and K. Bradshaw, "A multi-biometric feature-fusion framework for improved uni-modal and multi-modal human identification," 2016 IEEE Symposium on Technologies for Homeland Security (HST), Waltham, MA, 2016, pp. 1-6. [6] D. Meuwly and R. Veldhuis, "Forensic biometrics: From two communitiestoonediscipline," 2012BIOSIG – Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG), Darmstadt, 2012, pp. 1-12.
Download now