SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1099
INTEGRATION OF PHYSICAL SYSTEM MONITORING, CRIME POSTING &
ALERTING DANGEROUS ZONE
A. Priyanka GAndhi1, S. Madhushree2, A. Nandhini3, V.ANITHA MOSES4
1, 2, 3 B.E., Department of CSE, Panimalar Engineering College, Chennai, Tamilnadu, India.
4 M.E., Department of CSE, Panimalar Engineering College, Chennai, Tamilnadu, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - We introduced an android application for people
security on their way. Android user can post dangerous
location based on the event happened in that particularplace.
User can post photo or crime activity happened in that place.
The crime data is updated in the server only whenmore than3
people have posted the same event in that place. Once the
event is posted, automatic alert is displayed to all the general
users who cross that area. Similarly in finding criminals their
finger prints are automatically checked withcriminalrecords.
By using above two processes we can easily find the criminal
who are all involved in crime. And also we will get precaution
about travelling place.
Key Words: Biometric sensors, Automaticalert,Android
application, Precaution.
1. INTRODUCTION
In this paper, we will examine how Aadhaar biometric
database can be used for crime investigation and how it can
be integrated with the existing system in India, the
challenges of integration, and possible solutions. Paper also
highlights some of the technical and legal challenges for its
implementation which is a policy matter. The whole system
is designed in such a way that it can be easily verified by
Government and Non-Government services. The system has
been promoted as a tool for reducing fraud in many private
and public distribution systems and enabling the
government to better deliver public benefits. These systems
generally stores citizen’s basic information as well as their
biometric information and normally its built in such a way
that it can be used for multiple purposes. In many countries,
such systems are used for identifyingtheforgery,taxevasion
and crime investigation. Our objective is to explore, how
such system can be used for law enforcement and crime
investigation.
1.1 USE OF BIOMETRIC DATABASE FOR CRIME
INVESTIGATION
Today a massive computing power and well written pattern
matching algorithms have made it possible to automatically
search and detect the patterns of similarityinmanydifferent
kind of digital database of patterns which may include
fingerprints, faces, and irises. Effectiveness and accuracy of
such system are very promising even for very large
databases.
Fingerprints analysis is one of the most vital and integral
process in crime investigation. Fingerprint databases are
commonly used worldwide by almost all the police
department and law enforcement agencies for the purposes
of forensics, crime investigation and identifying the
criminal’s involvements in various crimes. In India, it’s a
challenging task for investigators to fish out fingerprints of
criminals which often get lost or lay hidden in piles of files in
police stations because no attempt has been made to put
them in one database. For the country like India, having
world second largest population, it’s really a very difficult to
architect a separate biometric or identity database for
different-different purposes individually. As 90% of Indian
population has enrolled in Aadhaar, It becomes a standard
biometric database which can be used for various purposes
including the crime investigation.
1.2 UNIQUE IDENTIFICATION AUTHORITY OF INDIA
The Unique Identification Authority of India (UIDAI) was
created with the objective to issue Unique Identification
numbers (UID), named as "Aadhaar",toall residentsofIndia.
Aadhaar system is built purely as an “IdentityPlatform”.The
main purpose of Aadhaar is to provide a biometric attached
identity that is verifiable online. The whole system is
designed in such a way that it can be easily verified by
Government and Non-Government services. The system has
been promoted as a tool for reducing fraud in much private
and public distribution system andenablingthegovernment
to better deliver public benefits.
2. PERFORMANCE MEASUREMENT OF BIOMETRIC
IDENTIFICATION SYSTEM
The main aspect to evaluate a biometric system is its
accuracy. From the user’s point of view, an error of accuracy
occurs when the system fails to authenticate theidentityofa
registered person or when the system erroneously
authenticates the identity of an intruder
A biometric matching system’s response is typically a
matching score (s) that quantifies the similarity between the
input and the database template representations. The
highest percentage gives the accurate results that shows the
two biometric measurements comefromthesame person. A
threshold regulates the system decision. The system infers
that pairs of biometric samples generating scores higher
than or equal to are mate pairs (that is, they belong to the
same person). Consequently, pairs of biometric samples
generating scores lower than are non-match pairs (that is,
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1100
they belong to different persons). The distribution of scores
generated from pairs of samples from different persons is
called an impostor distribution; the score distribution
generated from pairs of samples from the same person is
called a genuine distribution. (see Chart -1).
Chart -1: Biometric system error rates
There are several factors that can provoke accuracy errors.
Biometrical Error rates are quantitative metrics of the
accuracy of biometrical systems. They help biometric
researchers and industry providers to improve their
solutions and help system users to evaluate and choose the
appropriate solutions for their applications. There are two
types of error metrics: (a) to evaluate capturedevices.(b)To
evaluate biometric algorithms. The Failure to Capture Rate
(FCR) evaluates the capacity of a capture device to properly
read a biometrical record in several environmental and
human conditions. The failure of capture device is known as
"Capture Error". For biometric algorithms evaluation there
are metrics associated to each phase of the recognizing
process
The Failure to Enroll Rate (FER) measures the capacity of
Enroll Component of the algorithm to detect, extract and
compose the template from the biometric recordread bythe
capture device, i.e., the FER is computed only for biometric
record properly read. In the case of matching algorithm we
have two important error rates: The False Matching Error
Rate (FMR) measures the rate of actual impostor
comparisons that are erroneously considered genuine. On
the contrary the False Non matching Error Rate (FNMR)
measures the rate of actual genuine comparisons that are
erroneously considered impostors. In the case of ranking
algorithm the main ranking error rate is the Rank (n) that
measures the rateofgenuine comparisons isincludedamong
the n most similar comparisons from a database
An operational biometric system makes a trade-off between
false match rate (FMR) and false non-match rate (FNMR). In
fact, both FMR and FNMR are functions of the system
threshold t: If the system’s designers decrease to make the
system more tolerant to input variations and noise, FMR
increases [6]. On the other hand, if they raise t to make the
system more secure, then FNMR increases accordingly.
System performance can be depicted at all operating points
(thresholds) in the form of a receiver operating
characteristic (ROC) curve. An ROC curve plots FMR against
(1 – FNMR) or FNMR for various values of threshold. (see
Chart 2).
Chart -2: Receiver operating characteristic curve
3. PERFORMANCE OF AADHAAR BIOMETRIC
SYSTEM
As fingerprints alone will not be sufficient for achieving
higher accuracy in biometric identification, Aadhaar has
used multi-model biometric fusion techniques. UIDAI has
achieved accuracy as high as 99% de-duplication due to the
fusion of fingerprint and iris scores.AProofofConcept(PoC)
study was carried out by UIDAI to assess the feasibility of
using iris for on-line biometric authentication in the Indian
context (Table 1). The findings of this study are presented in
the report. This report covers the design framework, field
implementation, data collection and analysis. It interprets
empirical results to assess effectiveness of iris technology,
authentication processes and devices.
Table -1: FEASIBILITY OF IRIS BASED ON-LINE
AUTHENTICATION
If we study the UIDAI’s own technical report, the system has
approximately a chance of 0.5 per cent occurrence of false
identification. In Indian context this fractional values could
possibly make Lakhs of people as Suspect. We can narrow
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1101
down this number but still chances are there that innocent
may suffer, if the investigative agency solely depends on the
system identification process.
Fig -1: Architecture of Aadhaar Based Criminal Tracing
System
3. ADVANTAGES
Aadhaar has highest number of citizen enrollment till today.
It’s one of the largest systems in the world storing such a
huge number of Biometric information. The system is very
reliable and scalable. Building similartypeofsystemonly for
forensic and criminal investigation purpose may not be
feasible and viable solution. Since Aadhaar is already well
established system, its uses for the other purposes can be
explored.
Aadhaar was never intended for Forensic purpose and thus
it was not designed in that way. The citizens who enrolled
for Aadhaar never gave his consent of using his information
for such investigations.
4. CONCLUSION
Thus, the proposed new applicationwill try toaccessAadhar
details via finger print sensors. This is to reduce the manual
FIR system by making it automated. The databases of the
existing criminal’s record are used to find the criminals with
the help of matching biometric sensors. In public point of
view, we used time-based and location-based details to
indicate the public, about the criminal activities in that area.
This helps the public to know about the travellingplaceeven
though he/she is new to the particular place. The alert
messages are also added by the public and it is updated to
the database only if the same incident recorded for 3 times.
This feature makes the crime evidently and also police
comes to know about the particular crime and takes the
steps accordingly. This application is trytohelpthe publicas
well as police in such a way to improve the crime detection
and analysis.
REFERENCES
[1] A. Sankaran, M. Vatsa and R. Singh, "Latent
Fingerprint Matching: A Survey," in IEEE Access, vol. 2,
no. , pp.9821004, 2014.
[2] Anil K Jain, Arun Ross, "Bridging the gap: From
biometrics to forensics", Philosophical Transactions of
The Royal Society B Biological Sciences 370(1674),
August 2015.
[3] Anil K. Jain, Salil Prabhakar, and Sharath Pankanti.
2001. Twin Test: On Discriminability of Fingerprints. In
Proceedings of the Third International Conference on
Audio- and Video-Based Biometric Person
Authentication (AVBPA '01), Josef Bigün and Fabrizio
Smeraldi (Eds.). Springer-Verlag, London, UK, UK, 211-
216.
[4] Bouchrika, I., Goffredo, M., Carter, J. and Nixon, M.
(2011), On Using Gait in Forensic Biometrics. Journal of
Forensic Sciences, 56: 882–889.
[5] D. Brown and K. Bradshaw, "A multi-biometric
feature-fusion framework for improved uni-modal and
multi-modal human identification," 2016 IEEE
Symposium on Technologies for Homeland Security
(HST), Waltham, MA, 2016, pp. 1-6.
[6] D. Meuwly and R. Veldhuis, "Forensic biometrics:
From two communitiestoonediscipline," 2012BIOSIG –
Proceedings of the International Conference of
Biometrics Special Interest Group (BIOSIG), Darmstadt,
2012, pp. 1-12.

More Related Content

What's hot

AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAM Publications
 
Healthcare Data Breaches: Biometric Technology to the Rescue
Healthcare Data Breaches: Biometric Technology to the RescueHealthcare Data Breaches: Biometric Technology to the Rescue
Healthcare Data Breaches: Biometric Technology to the RescueIRJET Journal
 
IRJET - Centralized Data for Transport Automation System using Android St...
IRJET -  	  Centralized Data for Transport Automation System using Android St...IRJET -  	  Centralized Data for Transport Automation System using Android St...
IRJET - Centralized Data for Transport Automation System using Android St...IRJET Journal
 
IRJET- Aadhaar Based Voting System using Android Application
IRJET- Aadhaar Based Voting System using Android ApplicationIRJET- Aadhaar Based Voting System using Android Application
IRJET- Aadhaar Based Voting System using Android ApplicationIRJET Journal
 
IRJET - Plant Leaf Disease Detection and Automated Medicine using IoT
IRJET -  	  Plant Leaf Disease Detection and Automated Medicine using IoTIRJET -  	  Plant Leaf Disease Detection and Automated Medicine using IoT
IRJET - Plant Leaf Disease Detection and Automated Medicine using IoTIRJET Journal
 
IRJET- Automatic Attendance System using Arduino and GSM Module
IRJET- Automatic Attendance System using Arduino and GSM ModuleIRJET- Automatic Attendance System using Arduino and GSM Module
IRJET- Automatic Attendance System using Arduino and GSM ModuleIRJET Journal
 
IRJET - Remote Health Monitoring System using IoT
IRJET - Remote Health Monitoring System using IoTIRJET - Remote Health Monitoring System using IoT
IRJET - Remote Health Monitoring System using IoTIRJET Journal
 
IRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris RecognitionIRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris RecognitionIRJET Journal
 
Android Malware Detection in Official and Third Party Application Stores
Android Malware Detection in Official and Third Party Application StoresAndroid Malware Detection in Official and Third Party Application Stores
Android Malware Detection in Official and Third Party Application StoresEswar Publications
 
IRJET- Usage-Based Automotive Insurance System
IRJET- Usage-Based Automotive Insurance SystemIRJET- Usage-Based Automotive Insurance System
IRJET- Usage-Based Automotive Insurance SystemIRJET Journal
 
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET -  	  IoT Based Smart Ambulance with Information Extraction and Traffic...IRJET -  	  IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...IRJET Journal
 
IRJET - Biometric based Medical Record System
IRJET -  	  Biometric based Medical Record SystemIRJET -  	  Biometric based Medical Record System
IRJET - Biometric based Medical Record SystemIRJET Journal
 
IRJET - Android based Application – Missing Person
IRJET -  	  Android based Application – Missing PersonIRJET -  	  Android based Application – Missing Person
IRJET - Android based Application – Missing PersonIRJET Journal
 
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Detection and Analysis of Crime Patterns using Apriori AlgorithmIRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Detection and Analysis of Crime Patterns using Apriori AlgorithmIRJET Journal
 
IRJET- Biometric Vehicle Starter and Security
IRJET-  	  Biometric Vehicle Starter and SecurityIRJET-  	  Biometric Vehicle Starter and Security
IRJET- Biometric Vehicle Starter and SecurityIRJET Journal
 

What's hot (20)

AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
 
Healthcare Data Breaches: Biometric Technology to the Rescue
Healthcare Data Breaches: Biometric Technology to the RescueHealthcare Data Breaches: Biometric Technology to the Rescue
Healthcare Data Breaches: Biometric Technology to the Rescue
 
IRJET - Centralized Data for Transport Automation System using Android St...
IRJET -  	  Centralized Data for Transport Automation System using Android St...IRJET -  	  Centralized Data for Transport Automation System using Android St...
IRJET - Centralized Data for Transport Automation System using Android St...
 
AUTOMATION IN ANESTHESIA ADMINISTRATION USING FIELD PROGRAMMABLE GATE ARRAY
AUTOMATION IN ANESTHESIA ADMINISTRATION  USING FIELD PROGRAMMABLE GATE ARRAYAUTOMATION IN ANESTHESIA ADMINISTRATION  USING FIELD PROGRAMMABLE GATE ARRAY
AUTOMATION IN ANESTHESIA ADMINISTRATION USING FIELD PROGRAMMABLE GATE ARRAY
 
IRJET- Aadhaar Based Voting System using Android Application
IRJET- Aadhaar Based Voting System using Android ApplicationIRJET- Aadhaar Based Voting System using Android Application
IRJET- Aadhaar Based Voting System using Android Application
 
IRJET - Plant Leaf Disease Detection and Automated Medicine using IoT
IRJET -  	  Plant Leaf Disease Detection and Automated Medicine using IoTIRJET -  	  Plant Leaf Disease Detection and Automated Medicine using IoT
IRJET - Plant Leaf Disease Detection and Automated Medicine using IoT
 
IRJET- Automatic Attendance System using Arduino and GSM Module
IRJET- Automatic Attendance System using Arduino and GSM ModuleIRJET- Automatic Attendance System using Arduino and GSM Module
IRJET- Automatic Attendance System using Arduino and GSM Module
 
IRJET - Remote Health Monitoring System using IoT
IRJET - Remote Health Monitoring System using IoTIRJET - Remote Health Monitoring System using IoT
IRJET - Remote Health Monitoring System using IoT
 
SAFETY NOTIFICATION AND BUS MONITORING SYSTEM
SAFETY NOTIFICATION AND BUS MONITORING SYSTEMSAFETY NOTIFICATION AND BUS MONITORING SYSTEM
SAFETY NOTIFICATION AND BUS MONITORING SYSTEM
 
Risk management in Healthcare on Cloud
Risk management in Healthcare on CloudRisk management in Healthcare on Cloud
Risk management in Healthcare on Cloud
 
IRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris RecognitionIRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris Recognition
 
Android Malware Detection in Official and Third Party Application Stores
Android Malware Detection in Official and Third Party Application StoresAndroid Malware Detection in Official and Third Party Application Stores
Android Malware Detection in Official and Third Party Application Stores
 
AUTHENTICATED MEDICAL DOCUMENTS RELEASING WITH PRIVACY PROTECTION AND RELEAS...
AUTHENTICATED MEDICAL DOCUMENTS RELEASING  WITH PRIVACY PROTECTION AND RELEAS...AUTHENTICATED MEDICAL DOCUMENTS RELEASING  WITH PRIVACY PROTECTION AND RELEAS...
AUTHENTICATED MEDICAL DOCUMENTS RELEASING WITH PRIVACY PROTECTION AND RELEAS...
 
IRJET- Usage-Based Automotive Insurance System
IRJET- Usage-Based Automotive Insurance SystemIRJET- Usage-Based Automotive Insurance System
IRJET- Usage-Based Automotive Insurance System
 
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET -  	  IoT Based Smart Ambulance with Information Extraction and Traffic...IRJET -  	  IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
 
IRJET - Biometric based Medical Record System
IRJET -  	  Biometric based Medical Record SystemIRJET -  	  Biometric based Medical Record System
IRJET - Biometric based Medical Record System
 
IRJET - Android based Application – Missing Person
IRJET -  	  Android based Application – Missing PersonIRJET -  	  Android based Application – Missing Person
IRJET - Android based Application – Missing Person
 
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Detection and Analysis of Crime Patterns using Apriori AlgorithmIRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
 
IRJET- Biometric Vehicle Starter and Security
IRJET-  	  Biometric Vehicle Starter and SecurityIRJET-  	  Biometric Vehicle Starter and Security
IRJET- Biometric Vehicle Starter and Security
 
Ijsrdv7 i10842
Ijsrdv7 i10842Ijsrdv7 i10842
Ijsrdv7 i10842
 

Similar to IRJET- Integration of Physical System Monitoring, Crime Posting Alerting Dangerous Zone

IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security ApproachIRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security ApproachIRJET Journal
 
Fraud App Detection using Machine Learning
Fraud App Detection using Machine LearningFraud App Detection using Machine Learning
Fraud App Detection using Machine LearningIRJET Journal
 
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET Journal
 
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET -  	  Fraud Detection in Credit Card using Machine Learning TechniquesIRJET -  	  Fraud Detection in Credit Card using Machine Learning Techniques
IRJET - Fraud Detection in Credit Card using Machine Learning TechniquesIRJET Journal
 
IRJET- GDPS - General Disease Prediction System
IRJET- GDPS - General Disease Prediction SystemIRJET- GDPS - General Disease Prediction System
IRJET- GDPS - General Disease Prediction SystemIRJET Journal
 
IRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute ResolutionIRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute ResolutionIRJET Journal
 
Permission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine LearningPermission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine LearningIRJET Journal
 
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET-  	  Identify the Human or Bots Twitter Data using Machine Learning Alg...IRJET-  	  Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...IRJET Journal
 
IRJET-Intelligent Farms
IRJET-Intelligent FarmsIRJET-Intelligent Farms
IRJET-Intelligent FarmsIRJET Journal
 
IRJET- Authentic News Summarization
IRJET-  	  Authentic News SummarizationIRJET-  	  Authentic News Summarization
IRJET- Authentic News SummarizationIRJET Journal
 
IRJET- Attack Detection Strategies in Wireless Sensor Network
IRJET- Attack Detection Strategies in Wireless Sensor NetworkIRJET- Attack Detection Strategies in Wireless Sensor Network
IRJET- Attack Detection Strategies in Wireless Sensor NetworkIRJET Journal
 
Click Fraud Detection Of Advertisements using Machine Learning
Click Fraud Detection Of Advertisements using Machine LearningClick Fraud Detection Of Advertisements using Machine Learning
Click Fraud Detection Of Advertisements using Machine LearningIRJET Journal
 
Fraud and Malware Detection in Google Play by using Search Rank
Fraud and Malware Detection in Google Play by using Search RankFraud and Malware Detection in Google Play by using Search Rank
Fraud and Malware Detection in Google Play by using Search Rankijtsrd
 
Plant Disease Doctor App
Plant Disease Doctor AppPlant Disease Doctor App
Plant Disease Doctor AppIRJET Journal
 
IRJET- Biometric Voting Machine
IRJET- Biometric Voting MachineIRJET- Biometric Voting Machine
IRJET- Biometric Voting MachineIRJET Journal
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RateIRJET Journal
 
IRJET- Crime Prediction System
IRJET-  	  Crime Prediction SystemIRJET-  	  Crime Prediction System
IRJET- Crime Prediction SystemIRJET Journal
 
Ansgar rcep algorithmic_bias_july2018
Ansgar rcep algorithmic_bias_july2018Ansgar rcep algorithmic_bias_july2018
Ansgar rcep algorithmic_bias_july2018Ansgar Koene
 
Fingerprint Based Voting
Fingerprint Based VotingFingerprint Based Voting
Fingerprint Based VotingIRJET Journal
 

Similar to IRJET- Integration of Physical System Monitoring, Crime Posting Alerting Dangerous Zone (20)

IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security ApproachIRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
 
Fraud App Detection using Machine Learning
Fraud App Detection using Machine LearningFraud App Detection using Machine Learning
Fraud App Detection using Machine Learning
 
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data Mining
 
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET -  	  Fraud Detection in Credit Card using Machine Learning TechniquesIRJET -  	  Fraud Detection in Credit Card using Machine Learning Techniques
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
 
IRJET- GDPS - General Disease Prediction System
IRJET- GDPS - General Disease Prediction SystemIRJET- GDPS - General Disease Prediction System
IRJET- GDPS - General Disease Prediction System
 
IRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute ResolutionIRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute Resolution
 
Permission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine LearningPermission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine Learning
 
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCAREBIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
 
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET-  	  Identify the Human or Bots Twitter Data using Machine Learning Alg...IRJET-  	  Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
 
IRJET-Intelligent Farms
IRJET-Intelligent FarmsIRJET-Intelligent Farms
IRJET-Intelligent Farms
 
IRJET- Authentic News Summarization
IRJET-  	  Authentic News SummarizationIRJET-  	  Authentic News Summarization
IRJET- Authentic News Summarization
 
IRJET- Attack Detection Strategies in Wireless Sensor Network
IRJET- Attack Detection Strategies in Wireless Sensor NetworkIRJET- Attack Detection Strategies in Wireless Sensor Network
IRJET- Attack Detection Strategies in Wireless Sensor Network
 
Click Fraud Detection Of Advertisements using Machine Learning
Click Fraud Detection Of Advertisements using Machine LearningClick Fraud Detection Of Advertisements using Machine Learning
Click Fraud Detection Of Advertisements using Machine Learning
 
Fraud and Malware Detection in Google Play by using Search Rank
Fraud and Malware Detection in Google Play by using Search RankFraud and Malware Detection in Google Play by using Search Rank
Fraud and Malware Detection in Google Play by using Search Rank
 
Plant Disease Doctor App
Plant Disease Doctor AppPlant Disease Doctor App
Plant Disease Doctor App
 
IRJET- Biometric Voting Machine
IRJET- Biometric Voting MachineIRJET- Biometric Voting Machine
IRJET- Biometric Voting Machine
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
 
IRJET- Crime Prediction System
IRJET-  	  Crime Prediction SystemIRJET-  	  Crime Prediction System
IRJET- Crime Prediction System
 
Ansgar rcep algorithmic_bias_july2018
Ansgar rcep algorithmic_bias_july2018Ansgar rcep algorithmic_bias_july2018
Ansgar rcep algorithmic_bias_july2018
 
Fingerprint Based Voting
Fingerprint Based VotingFingerprint Based Voting
Fingerprint Based Voting
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectErbil Polytechnic University
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solidnamansinghjarodiya
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdfHafizMudaserAhmad
 

Recently uploaded (20)

TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction Project
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solid
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
 

IRJET- Integration of Physical System Monitoring, Crime Posting Alerting Dangerous Zone

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1099 INTEGRATION OF PHYSICAL SYSTEM MONITORING, CRIME POSTING & ALERTING DANGEROUS ZONE A. Priyanka GAndhi1, S. Madhushree2, A. Nandhini3, V.ANITHA MOSES4 1, 2, 3 B.E., Department of CSE, Panimalar Engineering College, Chennai, Tamilnadu, India. 4 M.E., Department of CSE, Panimalar Engineering College, Chennai, Tamilnadu, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - We introduced an android application for people security on their way. Android user can post dangerous location based on the event happened in that particularplace. User can post photo or crime activity happened in that place. The crime data is updated in the server only whenmore than3 people have posted the same event in that place. Once the event is posted, automatic alert is displayed to all the general users who cross that area. Similarly in finding criminals their finger prints are automatically checked withcriminalrecords. By using above two processes we can easily find the criminal who are all involved in crime. And also we will get precaution about travelling place. Key Words: Biometric sensors, Automaticalert,Android application, Precaution. 1. INTRODUCTION In this paper, we will examine how Aadhaar biometric database can be used for crime investigation and how it can be integrated with the existing system in India, the challenges of integration, and possible solutions. Paper also highlights some of the technical and legal challenges for its implementation which is a policy matter. The whole system is designed in such a way that it can be easily verified by Government and Non-Government services. The system has been promoted as a tool for reducing fraud in many private and public distribution systems and enabling the government to better deliver public benefits. These systems generally stores citizen’s basic information as well as their biometric information and normally its built in such a way that it can be used for multiple purposes. In many countries, such systems are used for identifyingtheforgery,taxevasion and crime investigation. Our objective is to explore, how such system can be used for law enforcement and crime investigation. 1.1 USE OF BIOMETRIC DATABASE FOR CRIME INVESTIGATION Today a massive computing power and well written pattern matching algorithms have made it possible to automatically search and detect the patterns of similarityinmanydifferent kind of digital database of patterns which may include fingerprints, faces, and irises. Effectiveness and accuracy of such system are very promising even for very large databases. Fingerprints analysis is one of the most vital and integral process in crime investigation. Fingerprint databases are commonly used worldwide by almost all the police department and law enforcement agencies for the purposes of forensics, crime investigation and identifying the criminal’s involvements in various crimes. In India, it’s a challenging task for investigators to fish out fingerprints of criminals which often get lost or lay hidden in piles of files in police stations because no attempt has been made to put them in one database. For the country like India, having world second largest population, it’s really a very difficult to architect a separate biometric or identity database for different-different purposes individually. As 90% of Indian population has enrolled in Aadhaar, It becomes a standard biometric database which can be used for various purposes including the crime investigation. 1.2 UNIQUE IDENTIFICATION AUTHORITY OF INDIA The Unique Identification Authority of India (UIDAI) was created with the objective to issue Unique Identification numbers (UID), named as "Aadhaar",toall residentsofIndia. Aadhaar system is built purely as an “IdentityPlatform”.The main purpose of Aadhaar is to provide a biometric attached identity that is verifiable online. The whole system is designed in such a way that it can be easily verified by Government and Non-Government services. The system has been promoted as a tool for reducing fraud in much private and public distribution system andenablingthegovernment to better deliver public benefits. 2. PERFORMANCE MEASUREMENT OF BIOMETRIC IDENTIFICATION SYSTEM The main aspect to evaluate a biometric system is its accuracy. From the user’s point of view, an error of accuracy occurs when the system fails to authenticate theidentityofa registered person or when the system erroneously authenticates the identity of an intruder A biometric matching system’s response is typically a matching score (s) that quantifies the similarity between the input and the database template representations. The highest percentage gives the accurate results that shows the two biometric measurements comefromthesame person. A threshold regulates the system decision. The system infers that pairs of biometric samples generating scores higher than or equal to are mate pairs (that is, they belong to the same person). Consequently, pairs of biometric samples generating scores lower than are non-match pairs (that is,
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1100 they belong to different persons). The distribution of scores generated from pairs of samples from different persons is called an impostor distribution; the score distribution generated from pairs of samples from the same person is called a genuine distribution. (see Chart -1). Chart -1: Biometric system error rates There are several factors that can provoke accuracy errors. Biometrical Error rates are quantitative metrics of the accuracy of biometrical systems. They help biometric researchers and industry providers to improve their solutions and help system users to evaluate and choose the appropriate solutions for their applications. There are two types of error metrics: (a) to evaluate capturedevices.(b)To evaluate biometric algorithms. The Failure to Capture Rate (FCR) evaluates the capacity of a capture device to properly read a biometrical record in several environmental and human conditions. The failure of capture device is known as "Capture Error". For biometric algorithms evaluation there are metrics associated to each phase of the recognizing process The Failure to Enroll Rate (FER) measures the capacity of Enroll Component of the algorithm to detect, extract and compose the template from the biometric recordread bythe capture device, i.e., the FER is computed only for biometric record properly read. In the case of matching algorithm we have two important error rates: The False Matching Error Rate (FMR) measures the rate of actual impostor comparisons that are erroneously considered genuine. On the contrary the False Non matching Error Rate (FNMR) measures the rate of actual genuine comparisons that are erroneously considered impostors. In the case of ranking algorithm the main ranking error rate is the Rank (n) that measures the rateofgenuine comparisons isincludedamong the n most similar comparisons from a database An operational biometric system makes a trade-off between false match rate (FMR) and false non-match rate (FNMR). In fact, both FMR and FNMR are functions of the system threshold t: If the system’s designers decrease to make the system more tolerant to input variations and noise, FMR increases [6]. On the other hand, if they raise t to make the system more secure, then FNMR increases accordingly. System performance can be depicted at all operating points (thresholds) in the form of a receiver operating characteristic (ROC) curve. An ROC curve plots FMR against (1 – FNMR) or FNMR for various values of threshold. (see Chart 2). Chart -2: Receiver operating characteristic curve 3. PERFORMANCE OF AADHAAR BIOMETRIC SYSTEM As fingerprints alone will not be sufficient for achieving higher accuracy in biometric identification, Aadhaar has used multi-model biometric fusion techniques. UIDAI has achieved accuracy as high as 99% de-duplication due to the fusion of fingerprint and iris scores.AProofofConcept(PoC) study was carried out by UIDAI to assess the feasibility of using iris for on-line biometric authentication in the Indian context (Table 1). The findings of this study are presented in the report. This report covers the design framework, field implementation, data collection and analysis. It interprets empirical results to assess effectiveness of iris technology, authentication processes and devices. Table -1: FEASIBILITY OF IRIS BASED ON-LINE AUTHENTICATION If we study the UIDAI’s own technical report, the system has approximately a chance of 0.5 per cent occurrence of false identification. In Indian context this fractional values could possibly make Lakhs of people as Suspect. We can narrow
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1101 down this number but still chances are there that innocent may suffer, if the investigative agency solely depends on the system identification process. Fig -1: Architecture of Aadhaar Based Criminal Tracing System 3. ADVANTAGES Aadhaar has highest number of citizen enrollment till today. It’s one of the largest systems in the world storing such a huge number of Biometric information. The system is very reliable and scalable. Building similartypeofsystemonly for forensic and criminal investigation purpose may not be feasible and viable solution. Since Aadhaar is already well established system, its uses for the other purposes can be explored. Aadhaar was never intended for Forensic purpose and thus it was not designed in that way. The citizens who enrolled for Aadhaar never gave his consent of using his information for such investigations. 4. CONCLUSION Thus, the proposed new applicationwill try toaccessAadhar details via finger print sensors. This is to reduce the manual FIR system by making it automated. The databases of the existing criminal’s record are used to find the criminals with the help of matching biometric sensors. In public point of view, we used time-based and location-based details to indicate the public, about the criminal activities in that area. This helps the public to know about the travellingplaceeven though he/she is new to the particular place. The alert messages are also added by the public and it is updated to the database only if the same incident recorded for 3 times. This feature makes the crime evidently and also police comes to know about the particular crime and takes the steps accordingly. This application is trytohelpthe publicas well as police in such a way to improve the crime detection and analysis. REFERENCES [1] A. Sankaran, M. Vatsa and R. Singh, "Latent Fingerprint Matching: A Survey," in IEEE Access, vol. 2, no. , pp.9821004, 2014. [2] Anil K Jain, Arun Ross, "Bridging the gap: From biometrics to forensics", Philosophical Transactions of The Royal Society B Biological Sciences 370(1674), August 2015. [3] Anil K. Jain, Salil Prabhakar, and Sharath Pankanti. 2001. Twin Test: On Discriminability of Fingerprints. In Proceedings of the Third International Conference on Audio- and Video-Based Biometric Person Authentication (AVBPA '01), Josef Bigün and Fabrizio Smeraldi (Eds.). Springer-Verlag, London, UK, UK, 211- 216. [4] Bouchrika, I., Goffredo, M., Carter, J. and Nixon, M. (2011), On Using Gait in Forensic Biometrics. Journal of Forensic Sciences, 56: 882–889. [5] D. Brown and K. Bradshaw, "A multi-biometric feature-fusion framework for improved uni-modal and multi-modal human identification," 2016 IEEE Symposium on Technologies for Homeland Security (HST), Waltham, MA, 2016, pp. 1-6. [6] D. Meuwly and R. Veldhuis, "Forensic biometrics: From two communitiestoonediscipline," 2012BIOSIG – Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG), Darmstadt, 2012, pp. 1-12.