SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 09 | Sep 2018 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7042
SMART AND UBIQUITOUS DEFENSE MONITORING SYSTEM
BASED ON IOT
K.MUTHULAKSHMI1, M.PABITHA2, P.S. PREETHI3, A.DIVYA BHARATHI4, D.RAMYA5
1Associate Professor, Department of Information Technology, Panimalar Engineering College, Tamil Nadu, India.
2B.Tech, Department of Information Technology, Panimalar Engineering College, Tamil Nadu, India.
3B.Tech, Department of Information Technology, Panimalar Engineering College, Tamil Nadu, India.
4B.Tech, Department of Information Technology, Panimalar Engineering College, Tamil Nadu, India.
5B.Tech, Department of Information Technology, Panimalar Engineering College, Tamil Nadu, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract -The project presents a versatile security system
that is designed merely to serve the purpose of providing
security to individuals so that they never feel helpless while
facing social challenges. The idea behind this project is to
develop a smart device that it’s completely comfortable to
use as compared with the already existing security solution.
An advanced system can be built that can detect the location
and health condition of a person that will enable us to take
action accordingly based on a device like Global Positioning
System(GPS), Temperature sensor ,Heart beat sensor, Passive
Infrared Sensor, and Arduino UNO which is embedded into a
garment. This system is able to intimate cops and family
members when the affected person is in an unconscious state
with the help of sensors.
Key Words: Versatile Security System, Global
Positioning System, Arduino UNO,Passive Infrared
Sensor .
1. INTRODUCTION
Today women weren't allowed to maneuver
freely even within the streets without concern concerning
their security. Parents were worried about their security
because today’s society is not at all safe for girls. Day by
day the women harassment increases. We can’t
amendment the society completely however we will
increase the safety of women by exploitation trendy
technology. Nowadays though there are many apps
evolved for women safety via smartphone it is activated
only by touch or one click or shake. It is not possible to
have mobiles on our hand in all circumstances. This
concept is used to provide security to women when they
are exposed to external challenges and harassments in the
society. It works automatically based on the heartbeat rate
which is increased due to the fear, anger, anxiety, and
other kinds of reactions which will trigger the sensor.
1.1 Need for the project
Though the good phones have inflated quickly, it
is not possible to have the phone all the time in our hand
to make a call or click on it, so here we tend to introduce a
brand new technique via good watches. When a girl or kid
sporting this ‘watch me’ is exposed to sexual or vulnerable
attack, the detector gift in it detects the guts beat rate of
someone which will be high at the moment it will
automatically make a call to our registered contact and
also through GPS/GSM it will detect the nearby police
station and make a ring there thus it'll be useful for police
to arrive shortly at the spot by pursuit the GPS, such a
system can result in safer and higher environment.
1.2 Objective of the project
We design and implement a reliable system to
protect women from being harassed by providing last mile
connectivity even in situations where the mobile phones
are out of cellular coverage. In this, we have developed a
prototype for women safety by using GSM/CDMA mobile
communication and global positioning system (GPS). The
system will identify the location through GPS when the
heartbeat rate faster than normal and the body
temperature increases then sends a message comprising
the location URL to the registered contacts and message
on the first registered contact to help the women in
dangerous situations. The unique feature of this system is
that it continuously sends the message every two minutes
until the application is stopped. When a woman or child
wearing this is exposed to sexual or vulnerable attack, the
sensor present in it detects the heartbeat rate of a person
which will be high at the moment activated, then through
GPS/GSM it will detect the nearby police station and sends
an alert message. So it will be helpful for the police to
arrive soon at the location and help individuals.
1.3Scope of the project
The project is divided into two functions one is
Prevention of Incident and another one is Communication
of that incident through wireless. The SMS information can
be sent to various people like Cops, Doctor, and Family
Members. Sorted information will be sent to the concern
people. To defense from the attack, the vibration sensor is
embedded and they can track the individual who is danger
through the website and try to safeguard the person from
attack.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 09 | Sep 2018 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7043
2. LITERATURE SURVEY
A literature survey shows the varied analyses and
analysis created associated with the project and also the
results already printed, taking into consideration the
varied parameters of the project and also the extent of the
project. It is the most important part of the report as it
gives a direction in the area of research. The goal of the
literature survey is to fully specify the technical details
associated with the most project in an exceedingly
compact and unambiguous manner.
2.1 Smart security solution for women based on
internet of things (IOT)
This paper suggests a brand new perspective to
use technology for ladies safety.848 Indian girls are
pestered, Raped, Killed a day. That’s a way beyond HUGE
number. The need for a tool that mechanically senses and
rescues the victim is that the venture of our plan during
this paper. We propose to possess a tool that is that the
integration of multiple devices, the hardware includes of a
wearable “Smart band” that incessantly communicates
with a good phone that has access to the internet. The
application is programmed and loaded with all the desired
information which incorporates Human behavior and
reactions to totally different things like anger, concern,
and anxiety. This generates a proof that is transmitted to a
good phone. The computer code or application has access
to GPS and electronic messaging services that are pre-
programmed in such some way that whenever it receives
emergency signal, it will send facilitate request along with
the location coordinates to the nearest Police station,
relatives and the people in the near radius who have
application. This action permits facilitate outright from the
Police still as Public within the close to radius UN agency
will reach the victim with nice accuracy.
2.2ARaspberry PI based smart ring for women
safety
In this paper, it is implemented in the form of a
smart ring and comprises of Raspberry Pi Zero, Raspberry
Pi camera, buzzer and button to activate the services. This
device is extremely portable and can be activated by the
victim on being assaulted just by the click of a button that
will fetch her current location and also capture the image
of the attacker via Raspberry Pi camera. The location and
the link of the image captured will be sent to predefined
emergency contact numbers or police via smart phone of
the victim thus preventing the use of additional hardware
devices/modules and making the device compact.
2.3 A Radio Identification based continuous
spectrum sensing protocol for safety of women in
cognitive radio networks
In this paper, we have developed a prototype for
women safety by using radio identification based cognitive
radio, GSM/CDMA mobile communication and global
positioning system (GPS). The system will identify the
location through GPS when a woman activates her mobile
phone either by a click or press of a button for few seconds
before she outrages any incident and sends a message
comprising the location URL to the registered contacts and
also a recorded call message on the first registered contact
to help the women in dangerous situations. The unique
feature of this system is that it continuously sends the
message every two minutes until the application is
stopped. Continuous location tracking information via SMS
helps to find the location of the victim quickly and rescue
them safely. Extensive simulation work is done using NS2
simulator to validate the performance of the system.
2.4 Touch me not-a women safety device
In this paper, we have developed an idea to design
a device which may be connected to the vesture. It will be
a button which can be bind able to the vesture. This button
is connected to the system that has 2 modules, one which
may be used once somebody makes some style of
unethical movement and also the different one which can
be used when you sense danger. The first module is used
simply to record that's creating a brief video to capture the
attacker, whereas the second is used throughout times of
danger to send your location to family or friends yet
because it alerts the closest station house, specified
facilitate will reach as before long as doable. The tools that
we will be using include microcontrollers, GSM and GPS
modules for the hardware section, python for the software
section.
3. SYSTEM DESIGN
Systems design is that the method of process the
design, modules and knowledge for a system to satisfy
fixed necessities. Systems design may be seen because of
the application of systems theory to develop. The modules
are Temperature Sensor, Heart Beat sensor, Global
Positioning System, Passive Infrared Sensor.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 09 | Sep 2018 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7044
Fig -1: System Architecture
3.1 ARDUINO UNO
The Arduino Uno may be a microcontroller board
supported the ATmega328 (datasheet). It has fourteen
digital input/output pins (of that six may be used as PWM
outputs), six analog inputs, a sixteen rate ceramic
resonator, a USB association, an influence jack, an ICSP
header, and a reset button. It contains everything needed
to support the microcontroller; simply connect it to a
computer with a USB cable or power it with an AC-to-DC
adapter or battery to get started.
3.2 PIR (PASSIVE INFRARED SENSOR)
In a PIR-based motion detector (usually called a
PID, for Passive Infrared Detector), the PIR sensor is
typically mounted on a printed circuit board containing
the necessary electronics required to interpret the signals
from the pyroelectric sensor chip. A Passive Infrared
sensor (PIR sensor) is an device that measures infrared
(IR) lightweight divergent from objects in its field of
reading.PIR sensors area unit usually utilized in the
development of PIR-based motion detectors.
3.3 TEMPERATURE SENSOR
In a Temperature Sensor LM35 may be an
exactitude IC temperature sensing element with its output
proportional to the temperature (in Celsius). The sensing
element electronic equipment is sealed and thus it's not
subjected to a chemical reaction and alternative processes.
It conjointly posses low self -heating and doesn't cause
quite zero.1oC temperature rise installation. The
operational temperature vary is from -55°C to 150°C.
3.4 HEART BEAT SENSOR
Pulse Oximeter sensor is designed to give the
digital output of heat beat when a finger is placed on it.
When the guts beat detector is functioning, the beat LED
flashes in unison with each heartbeat. This digital output is
often connected to a microcontroller on to live the Beats
Per Minute (BPM) rate. It works on the principle of
sunshine modulation by blood flow through finger at
every pulse.
3.5 GPS
Global Positioning System (GPS) is a satellite-
based navigation system made up of at least 24
satellites.GPS works in any weather, anyplace within the
world, 24 hours a day, with no subscription fees or setup
charges .The U.S.Department of Defense (USDOD)
originally place the satellites into orbit for military use
however, they were created on the market for civilian use
within the Eighties. The Global Positioning System (GPS) is
a satellite-based navigation system made up of at least 24
satellites.GPS works in any weather, anyplace within the
world, 24 hours a day, with no subscription fees or setup
charges. The U.S.Department of Defense (USDOD)
originally place the satellites into orbit for military use
however, they were created on the market for civilian use
within the Eighties.
3.6 IOT SIM800A
SIM800 may be a complete Quad-band GSM/GPRS
answer in a very SMT kind which may be embedded
within the client applications.SIM800 support
Quadband850/900/1800/1900MHz; it will transmit
Voice, SMS, and information with low-power-
consumption. With the small size of 24*24*3mm, it will
work into a slim and compact demand of client style.
Featuring Bluetooth and Embedded AT, it permits total
price savings and quick time-to-market for client
applications. Any microcontroller access to your Wi-Fi
network. The ESP8266 is capable of either hosting
Associate in a Nursing application or offloading all Wi-Fi
networking functions from another application processor.
3.7 ARDUINO ESP8266 WIFI
The Arduino Uno Wi-Fi is an Arduino Uno with an
integrated Wi-Fi module. The board is based on
theATmega328Pwithan ESP8266WiFiModule integrated.
The ESP8266 Wi-Fi module is a complete Wi-Fi network
where you can easily connect as a serving Wi-Fi adapter,
ARDUINO UNO
CONTROLLER
HEART BEAT
SENSOR
TEMPERATURE
SENSOR
PIR SENSOR
GPS
SHOCK CIRCUIT
LCD
IOT SIM800A
CLOUD
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 09 | Sep 2018 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7045
wireless internet access interface to any microcontroller
based design on its simple connectivity through Serial
Communication or UART interface. The ESP8266 Wi-Fi
Module is a self-contained SOC with integrated TCP/IP
protocol stack that can give any microcontroller access to
your Wi-Fi network. The ESP8266 is capable of either
hosting an application or offloading all Wi-Fi networking
functions from another application processor.
4. SYSTEM IMPLEMENTATION
System Implementation uses the structure
created during architectural design and the results of the
system analysis to construct system elements that meet
the stakeholder requirements and system requirements
developed in early life cycle phases. The system is
implemented using Embedded C, Proteus and so on.
4.1 EMBEDDEDC
Embedded C Programming Language is, widely
used in the development of Embedded System is an
extension of the C Programming Language. The Embedded
C Programming Language uses the same syntax and
semantics of C language like the main function, declaration
of the data types, defining variables, loops, functions,
statements, etc. The extension in Embedded C from
standard C Programming Language includes I/O Hardware
Addressing, fixed- point arithmetic operations, accessing
address spaces, etc. Advantagesof an embedded C program
are it takes less time to develop an application program. It
reduces the complexity of the program. It is easy to verify
and understand and it is portable in nature from one
controller to another.
4.2 PROTEUS
Proteus (PROcessor for TExt Easy to USe) is a fully
functional, procedural programming language created in
1998 by Simone Zanella. Proteus incorporates many
functions derived from several other languages: C, BASIC,
Assembly, Clipper/dBase; it is especially versatile in
dealing with strings, having hundreds of dedicated
functions; this makes it one of the richest languages for
text manipulation.
Proteus owes its name to a Greek god of the sea
(Proteus), who took care of Neptune's crowd and gave
responses; he was renowned for being able to transform
himself, assuming different shapes. Transforming data
from one form to another is the main usage of this
language.
5. CONCLUSION
In this paper, we focus on a security system that is
designed merely to serve the purpose of providing
security to women so that they never feel helpless while
facing such social challenges. The system is built that can
detect the location and health condition of the person that
will enable us to take action accordingly based on
electronic gadgets like GPS receiver, body temperature
sensor, IOT modem, PIR sensor , heartbeat sensor, and the
vibration sensor. The heartbeat of an individual in such
things is generally higher that helps build choices together
with different sensors like motion sensors to discover the
abnormal motion of the women while she is victimized.
The idea to develop a wise device girl |for ladies| for girls}
is that it’s utterly comfy and straightforward to use as
compared with already existing women security solutions.
6. FUTURE ENHANCEMENT
In our future work, we will embed the shock
attack which will help the victim to escape from the
attacker and safeguard herself .The camera can be added
to the device so that the attacker images can be captured
and send it to cops so that we can prevent these attacks in
future
REFERENCES
[1] Vamil B. Sangoi, “Smart security solutions,”
International Journal of Current Engineering and
Technology, Vol.4, No.5, Oct-2014.
[2] Simon L. Cotton and William G. Scanlon, “Millimeter -
wave Soldier –to soldier communications for covert
battlefield operation,” IEEE communication Magazine,
October 2009.
[3] ShayanNalbandian,”A survey on Internet of Things:
Application and Challenges”, International Congress
on Technology, Communication and Knowledge
(ICTCK), 11-12 Nov 2015, Masshad,Iran
[4] Raguvaran.K,J.Thiyagarajan,”Raspberry Pi based
Global Industrial Process Monitoring through Wireless
Communication”, International Conference on
Robotics,Automation,Control and Embedded
Systems(RACE),18-20 Feb 2015,Chennai,India.
[5] D.G.Monisha, M.Monisha, G.Pavithra, R. Subhashini,
“Women Safety Device and Application-FEMME”,
Indian Journal of Science and Technology, Vol 9(10),
DOI:10.17485/ijst/2016/v9i10/88898,March 2016.
[6] GowriPredeba.B, Shyamala.N, Tamilselvi.E,
Ramalakshmi.S, Selsiaulvina.C, “Women Security
System Using GSM and GPS”, International Journal of
Advanced Research Trends in Engineering and
Technology (IJARTET) Vol. 3, Special Issue 19, April
2016
[7] BharathPatil, RadhikaPatil, Dr. Andre Pittet, “Energy
saving techniques for gps based tracking
applications”, Integrated Communications, Navigation
and Surveillance Conference (ICNS), 2011, pp. J8-17.

Mais conteúdo relacionado

Mais procurados

Tracking And Security System for Women’s using GPS & GSM
Tracking And Security System for Women’s using GPS & GSMTracking And Security System for Women’s using GPS & GSM
Tracking And Security System for Women’s using GPS & GSMIRJET Journal
 
Women security application
Women security applicationWomen security application
Women security applicationAkshay Surve
 
Application for Women Safety
Application for Women SafetyApplication for Women Safety
Application for Women Safetyiosrjce
 
Sniffer Technology Complete Report
Sniffer Technology Complete ReportSniffer Technology Complete Report
Sniffer Technology Complete ReportChethanHR10
 
Womensecurityapp12
Womensecurityapp12Womensecurityapp12
Womensecurityapp12Aman Raj
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewIJSRD
 
Personal Security Tracking based on Android and Web Application
Personal Security Tracking based on Android and Web ApplicationPersonal Security Tracking based on Android and Web Application
Personal Security Tracking based on Android and Web ApplicationTELKOMNIKA JOURNAL
 
Swarma – A Women Safety Device
Swarma – A Women Safety DeviceSwarma – A Women Safety Device
Swarma – A Women Safety DeviceIRJET Journal
 
76201975
7620197576201975
76201975IJRAT
 
IRJET- Women Safety using IoT
IRJET- Women Safety using IoTIRJET- Women Safety using IoT
IRJET- Women Safety using IoTIRJET Journal
 
PROMINENT NAVIGATION FOR VISUALLY IMPAIRED PEOPLE
PROMINENT NAVIGATION FOR VISUALLY IMPAIRED PEOPLEPROMINENT NAVIGATION FOR VISUALLY IMPAIRED PEOPLE
PROMINENT NAVIGATION FOR VISUALLY IMPAIRED PEOPLEIAEME Publication
 
Advancement in Android Authentication System Using Direct Significance Service
Advancement in Android Authentication System Using Direct Significance ServiceAdvancement in Android Authentication System Using Direct Significance Service
Advancement in Android Authentication System Using Direct Significance ServiceIRJET Journal
 
Secured Spy for Highly Secured Areas
Secured Spy for Highly Secured AreasSecured Spy for Highly Secured Areas
Secured Spy for Highly Secured AreasIRJET Journal
 
IRJET- IOT based Intrusion Detection and Tracking System
IRJET- IOT based Intrusion Detection and Tracking SystemIRJET- IOT based Intrusion Detection and Tracking System
IRJET- IOT based Intrusion Detection and Tracking SystemIRJET Journal
 
IRJET- A Survey on Child Safety & Tracking Management System
IRJET- A Survey on Child Safety & Tracking Management SystemIRJET- A Survey on Child Safety & Tracking Management System
IRJET- A Survey on Child Safety & Tracking Management SystemIRJET Journal
 
Activity Tracker Wrist Band for Children Monitoring using IOT
Activity Tracker Wrist Band for Children Monitoring using IOTActivity Tracker Wrist Band for Children Monitoring using IOT
Activity Tracker Wrist Band for Children Monitoring using IOTrahulmonikasharma
 
IRJET - SMS based Data Retreival System
IRJET - SMS based Data Retreival SystemIRJET - SMS based Data Retreival System
IRJET - SMS based Data Retreival SystemIRJET Journal
 

Mais procurados (20)

Ej4301823826
Ej4301823826Ej4301823826
Ej4301823826
 
Tracking And Security System for Women’s using GPS & GSM
Tracking And Security System for Women’s using GPS & GSMTracking And Security System for Women’s using GPS & GSM
Tracking And Security System for Women’s using GPS & GSM
 
Safety app for woman
Safety app for womanSafety app for woman
Safety app for woman
 
Women security application
Women security applicationWomen security application
Women security application
 
Application for Women Safety
Application for Women SafetyApplication for Women Safety
Application for Women Safety
 
Sniffer Technology Complete Report
Sniffer Technology Complete ReportSniffer Technology Complete Report
Sniffer Technology Complete Report
 
Womensecurityapp12
Womensecurityapp12Womensecurityapp12
Womensecurityapp12
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
 
Personal Security Tracking based on Android and Web Application
Personal Security Tracking based on Android and Web ApplicationPersonal Security Tracking based on Android and Web Application
Personal Security Tracking based on Android and Web Application
 
Swarma – A Women Safety Device
Swarma – A Women Safety DeviceSwarma – A Women Safety Device
Swarma – A Women Safety Device
 
76201975
7620197576201975
76201975
 
IRJET- Women Safety using IoT
IRJET- Women Safety using IoTIRJET- Women Safety using IoT
IRJET- Women Safety using IoT
 
PROMINENT NAVIGATION FOR VISUALLY IMPAIRED PEOPLE
PROMINENT NAVIGATION FOR VISUALLY IMPAIRED PEOPLEPROMINENT NAVIGATION FOR VISUALLY IMPAIRED PEOPLE
PROMINENT NAVIGATION FOR VISUALLY IMPAIRED PEOPLE
 
Advancement in Android Authentication System Using Direct Significance Service
Advancement in Android Authentication System Using Direct Significance ServiceAdvancement in Android Authentication System Using Direct Significance Service
Advancement in Android Authentication System Using Direct Significance Service
 
Secured Spy for Highly Secured Areas
Secured Spy for Highly Secured AreasSecured Spy for Highly Secured Areas
Secured Spy for Highly Secured Areas
 
GO SAFE: Rapid Intelligent System for Women and Child Safety
GO SAFE: Rapid Intelligent System for Women and Child SafetyGO SAFE: Rapid Intelligent System for Women and Child Safety
GO SAFE: Rapid Intelligent System for Women and Child Safety
 
IRJET- IOT based Intrusion Detection and Tracking System
IRJET- IOT based Intrusion Detection and Tracking SystemIRJET- IOT based Intrusion Detection and Tracking System
IRJET- IOT based Intrusion Detection and Tracking System
 
IRJET- A Survey on Child Safety & Tracking Management System
IRJET- A Survey on Child Safety & Tracking Management SystemIRJET- A Survey on Child Safety & Tracking Management System
IRJET- A Survey on Child Safety & Tracking Management System
 
Activity Tracker Wrist Band for Children Monitoring using IOT
Activity Tracker Wrist Band for Children Monitoring using IOTActivity Tracker Wrist Band for Children Monitoring using IOT
Activity Tracker Wrist Band for Children Monitoring using IOT
 
IRJET - SMS based Data Retreival System
IRJET - SMS based Data Retreival SystemIRJET - SMS based Data Retreival System
IRJET - SMS based Data Retreival System
 

Semelhante a IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT

IRJET - Women Safety Device with GPS Tracking and Alerts
IRJET -  	  Women Safety Device with GPS Tracking and AlertsIRJET -  	  Women Safety Device with GPS Tracking and Alerts
IRJET - Women Safety Device with GPS Tracking and AlertsIRJET Journal
 
ELECTRONIC JACKET FOR WOMEN SAFETY
ELECTRONIC JACKET FOR WOMEN SAFETYELECTRONIC JACKET FOR WOMEN SAFETY
ELECTRONIC JACKET FOR WOMEN SAFETYIRJET Journal
 
IRJET- Smart Shield for Women Safety
IRJET-  	  Smart Shield for Women SafetyIRJET-  	  Smart Shield for Women Safety
IRJET- Smart Shield for Women SafetyIRJET Journal
 
IRJET- Secured Perimeter using Voice Recognition and Location Tracking Sy...
IRJET-  	  Secured Perimeter using Voice Recognition and Location Tracking Sy...IRJET-  	  Secured Perimeter using Voice Recognition and Location Tracking Sy...
IRJET- Secured Perimeter using Voice Recognition and Location Tracking Sy...IRJET Journal
 
IRJET- TOUCH ME NOT-A Women Safety Device
IRJET- TOUCH ME NOT-A Women Safety DeviceIRJET- TOUCH ME NOT-A Women Safety Device
IRJET- TOUCH ME NOT-A Women Safety DeviceIRJET Journal
 
Automated women safety device
Automated women safety deviceAutomated women safety device
Automated women safety deviceIRJET Journal
 
A Smart Alarm System for Women’s Security
A Smart Alarm System for Women’s SecurityA Smart Alarm System for Women’s Security
A Smart Alarm System for Women’s SecurityDr. Amarjeet Singh
 
SMART SECURITY DEVICE FOR WOMEN USING IOT
SMART SECURITY DEVICE FOR WOMEN USING IOTSMART SECURITY DEVICE FOR WOMEN USING IOT
SMART SECURITY DEVICE FOR WOMEN USING IOTIRJET Journal
 
Women Safety Application Android Project
Women Safety Application Android ProjectWomen Safety Application Android Project
Women Safety Application Android ProjectIRJET Journal
 
87202003
8720200387202003
87202003IJRAT
 
IRJET- Child Safety Wearable Device using Wireless Technology
IRJET- Child Safety Wearable Device using Wireless TechnologyIRJET- Child Safety Wearable Device using Wireless Technology
IRJET- Child Safety Wearable Device using Wireless TechnologyIRJET Journal
 
IRJET - Women’s Safety System using IoT
IRJET -  	  Women’s Safety System using IoTIRJET -  	  Women’s Safety System using IoT
IRJET - Women’s Safety System using IoTIRJET Journal
 
IRJET- Women Security System using IoT
IRJET-  	  Women Security System using IoTIRJET-  	  Women Security System using IoT
IRJET- Women Security System using IoTIRJET Journal
 
Design and Development of Advanced Device for Women Safety
Design and Development of Advanced Device for Women SafetyDesign and Development of Advanced Device for Women Safety
Design and Development of Advanced Device for Women SafetyIRJET Journal
 
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULEHOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULEIRJET Journal
 
Batch-6.pptx
Batch-6.pptxBatch-6.pptx
Batch-6.pptxpavanJoy
 
Smart part 1 (1)
Smart part 1 (1)Smart part 1 (1)
Smart part 1 (1)Hari haran
 
Smart ID for Blind People’s
Smart ID for Blind People’sSmart ID for Blind People’s
Smart ID for Blind People’sIRJET Journal
 
Smart Door Monitoring and Locking system
Smart Door Monitoring and Locking systemSmart Door Monitoring and Locking system
Smart Door Monitoring and Locking systemIRJET Journal
 
RAT Trap: Home Surveillance System Using IoT & AI
RAT Trap: Home Surveillance System Using IoT & AIRAT Trap: Home Surveillance System Using IoT & AI
RAT Trap: Home Surveillance System Using IoT & AIIRJET Journal
 

Semelhante a IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT (20)

IRJET - Women Safety Device with GPS Tracking and Alerts
IRJET -  	  Women Safety Device with GPS Tracking and AlertsIRJET -  	  Women Safety Device with GPS Tracking and Alerts
IRJET - Women Safety Device with GPS Tracking and Alerts
 
ELECTRONIC JACKET FOR WOMEN SAFETY
ELECTRONIC JACKET FOR WOMEN SAFETYELECTRONIC JACKET FOR WOMEN SAFETY
ELECTRONIC JACKET FOR WOMEN SAFETY
 
IRJET- Smart Shield for Women Safety
IRJET-  	  Smart Shield for Women SafetyIRJET-  	  Smart Shield for Women Safety
IRJET- Smart Shield for Women Safety
 
IRJET- Secured Perimeter using Voice Recognition and Location Tracking Sy...
IRJET-  	  Secured Perimeter using Voice Recognition and Location Tracking Sy...IRJET-  	  Secured Perimeter using Voice Recognition and Location Tracking Sy...
IRJET- Secured Perimeter using Voice Recognition and Location Tracking Sy...
 
IRJET- TOUCH ME NOT-A Women Safety Device
IRJET- TOUCH ME NOT-A Women Safety DeviceIRJET- TOUCH ME NOT-A Women Safety Device
IRJET- TOUCH ME NOT-A Women Safety Device
 
Automated women safety device
Automated women safety deviceAutomated women safety device
Automated women safety device
 
A Smart Alarm System for Women’s Security
A Smart Alarm System for Women’s SecurityA Smart Alarm System for Women’s Security
A Smart Alarm System for Women’s Security
 
SMART SECURITY DEVICE FOR WOMEN USING IOT
SMART SECURITY DEVICE FOR WOMEN USING IOTSMART SECURITY DEVICE FOR WOMEN USING IOT
SMART SECURITY DEVICE FOR WOMEN USING IOT
 
Women Safety Application Android Project
Women Safety Application Android ProjectWomen Safety Application Android Project
Women Safety Application Android Project
 
87202003
8720200387202003
87202003
 
IRJET- Child Safety Wearable Device using Wireless Technology
IRJET- Child Safety Wearable Device using Wireless TechnologyIRJET- Child Safety Wearable Device using Wireless Technology
IRJET- Child Safety Wearable Device using Wireless Technology
 
IRJET - Women’s Safety System using IoT
IRJET -  	  Women’s Safety System using IoTIRJET -  	  Women’s Safety System using IoT
IRJET - Women’s Safety System using IoT
 
IRJET- Women Security System using IoT
IRJET-  	  Women Security System using IoTIRJET-  	  Women Security System using IoT
IRJET- Women Security System using IoT
 
Design and Development of Advanced Device for Women Safety
Design and Development of Advanced Device for Women SafetyDesign and Development of Advanced Device for Women Safety
Design and Development of Advanced Device for Women Safety
 
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULEHOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
 
Batch-6.pptx
Batch-6.pptxBatch-6.pptx
Batch-6.pptx
 
Smart part 1 (1)
Smart part 1 (1)Smart part 1 (1)
Smart part 1 (1)
 
Smart ID for Blind People’s
Smart ID for Blind People’sSmart ID for Blind People’s
Smart ID for Blind People’s
 
Smart Door Monitoring and Locking system
Smart Door Monitoring and Locking systemSmart Door Monitoring and Locking system
Smart Door Monitoring and Locking system
 
RAT Trap: Home Surveillance System Using IoT & AI
RAT Trap: Home Surveillance System Using IoT & AIRAT Trap: Home Surveillance System Using IoT & AI
RAT Trap: Home Surveillance System Using IoT & AI
 

Mais de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Mais de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Último

UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Último (20)

DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 

IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 09 | Sep 2018 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7042 SMART AND UBIQUITOUS DEFENSE MONITORING SYSTEM BASED ON IOT K.MUTHULAKSHMI1, M.PABITHA2, P.S. PREETHI3, A.DIVYA BHARATHI4, D.RAMYA5 1Associate Professor, Department of Information Technology, Panimalar Engineering College, Tamil Nadu, India. 2B.Tech, Department of Information Technology, Panimalar Engineering College, Tamil Nadu, India. 3B.Tech, Department of Information Technology, Panimalar Engineering College, Tamil Nadu, India. 4B.Tech, Department of Information Technology, Panimalar Engineering College, Tamil Nadu, India. 5B.Tech, Department of Information Technology, Panimalar Engineering College, Tamil Nadu, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract -The project presents a versatile security system that is designed merely to serve the purpose of providing security to individuals so that they never feel helpless while facing social challenges. The idea behind this project is to develop a smart device that it’s completely comfortable to use as compared with the already existing security solution. An advanced system can be built that can detect the location and health condition of a person that will enable us to take action accordingly based on a device like Global Positioning System(GPS), Temperature sensor ,Heart beat sensor, Passive Infrared Sensor, and Arduino UNO which is embedded into a garment. This system is able to intimate cops and family members when the affected person is in an unconscious state with the help of sensors. Key Words: Versatile Security System, Global Positioning System, Arduino UNO,Passive Infrared Sensor . 1. INTRODUCTION Today women weren't allowed to maneuver freely even within the streets without concern concerning their security. Parents were worried about their security because today’s society is not at all safe for girls. Day by day the women harassment increases. We can’t amendment the society completely however we will increase the safety of women by exploitation trendy technology. Nowadays though there are many apps evolved for women safety via smartphone it is activated only by touch or one click or shake. It is not possible to have mobiles on our hand in all circumstances. This concept is used to provide security to women when they are exposed to external challenges and harassments in the society. It works automatically based on the heartbeat rate which is increased due to the fear, anger, anxiety, and other kinds of reactions which will trigger the sensor. 1.1 Need for the project Though the good phones have inflated quickly, it is not possible to have the phone all the time in our hand to make a call or click on it, so here we tend to introduce a brand new technique via good watches. When a girl or kid sporting this ‘watch me’ is exposed to sexual or vulnerable attack, the detector gift in it detects the guts beat rate of someone which will be high at the moment it will automatically make a call to our registered contact and also through GPS/GSM it will detect the nearby police station and make a ring there thus it'll be useful for police to arrive shortly at the spot by pursuit the GPS, such a system can result in safer and higher environment. 1.2 Objective of the project We design and implement a reliable system to protect women from being harassed by providing last mile connectivity even in situations where the mobile phones are out of cellular coverage. In this, we have developed a prototype for women safety by using GSM/CDMA mobile communication and global positioning system (GPS). The system will identify the location through GPS when the heartbeat rate faster than normal and the body temperature increases then sends a message comprising the location URL to the registered contacts and message on the first registered contact to help the women in dangerous situations. The unique feature of this system is that it continuously sends the message every two minutes until the application is stopped. When a woman or child wearing this is exposed to sexual or vulnerable attack, the sensor present in it detects the heartbeat rate of a person which will be high at the moment activated, then through GPS/GSM it will detect the nearby police station and sends an alert message. So it will be helpful for the police to arrive soon at the location and help individuals. 1.3Scope of the project The project is divided into two functions one is Prevention of Incident and another one is Communication of that incident through wireless. The SMS information can be sent to various people like Cops, Doctor, and Family Members. Sorted information will be sent to the concern people. To defense from the attack, the vibration sensor is embedded and they can track the individual who is danger through the website and try to safeguard the person from attack.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 09 | Sep 2018 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7043 2. LITERATURE SURVEY A literature survey shows the varied analyses and analysis created associated with the project and also the results already printed, taking into consideration the varied parameters of the project and also the extent of the project. It is the most important part of the report as it gives a direction in the area of research. The goal of the literature survey is to fully specify the technical details associated with the most project in an exceedingly compact and unambiguous manner. 2.1 Smart security solution for women based on internet of things (IOT) This paper suggests a brand new perspective to use technology for ladies safety.848 Indian girls are pestered, Raped, Killed a day. That’s a way beyond HUGE number. The need for a tool that mechanically senses and rescues the victim is that the venture of our plan during this paper. We propose to possess a tool that is that the integration of multiple devices, the hardware includes of a wearable “Smart band” that incessantly communicates with a good phone that has access to the internet. The application is programmed and loaded with all the desired information which incorporates Human behavior and reactions to totally different things like anger, concern, and anxiety. This generates a proof that is transmitted to a good phone. The computer code or application has access to GPS and electronic messaging services that are pre- programmed in such some way that whenever it receives emergency signal, it will send facilitate request along with the location coordinates to the nearest Police station, relatives and the people in the near radius who have application. This action permits facilitate outright from the Police still as Public within the close to radius UN agency will reach the victim with nice accuracy. 2.2ARaspberry PI based smart ring for women safety In this paper, it is implemented in the form of a smart ring and comprises of Raspberry Pi Zero, Raspberry Pi camera, buzzer and button to activate the services. This device is extremely portable and can be activated by the victim on being assaulted just by the click of a button that will fetch her current location and also capture the image of the attacker via Raspberry Pi camera. The location and the link of the image captured will be sent to predefined emergency contact numbers or police via smart phone of the victim thus preventing the use of additional hardware devices/modules and making the device compact. 2.3 A Radio Identification based continuous spectrum sensing protocol for safety of women in cognitive radio networks In this paper, we have developed a prototype for women safety by using radio identification based cognitive radio, GSM/CDMA mobile communication and global positioning system (GPS). The system will identify the location through GPS when a woman activates her mobile phone either by a click or press of a button for few seconds before she outrages any incident and sends a message comprising the location URL to the registered contacts and also a recorded call message on the first registered contact to help the women in dangerous situations. The unique feature of this system is that it continuously sends the message every two minutes until the application is stopped. Continuous location tracking information via SMS helps to find the location of the victim quickly and rescue them safely. Extensive simulation work is done using NS2 simulator to validate the performance of the system. 2.4 Touch me not-a women safety device In this paper, we have developed an idea to design a device which may be connected to the vesture. It will be a button which can be bind able to the vesture. This button is connected to the system that has 2 modules, one which may be used once somebody makes some style of unethical movement and also the different one which can be used when you sense danger. The first module is used simply to record that's creating a brief video to capture the attacker, whereas the second is used throughout times of danger to send your location to family or friends yet because it alerts the closest station house, specified facilitate will reach as before long as doable. The tools that we will be using include microcontrollers, GSM and GPS modules for the hardware section, python for the software section. 3. SYSTEM DESIGN Systems design is that the method of process the design, modules and knowledge for a system to satisfy fixed necessities. Systems design may be seen because of the application of systems theory to develop. The modules are Temperature Sensor, Heart Beat sensor, Global Positioning System, Passive Infrared Sensor.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 09 | Sep 2018 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7044 Fig -1: System Architecture 3.1 ARDUINO UNO The Arduino Uno may be a microcontroller board supported the ATmega328 (datasheet). It has fourteen digital input/output pins (of that six may be used as PWM outputs), six analog inputs, a sixteen rate ceramic resonator, a USB association, an influence jack, an ICSP header, and a reset button. It contains everything needed to support the microcontroller; simply connect it to a computer with a USB cable or power it with an AC-to-DC adapter or battery to get started. 3.2 PIR (PASSIVE INFRARED SENSOR) In a PIR-based motion detector (usually called a PID, for Passive Infrared Detector), the PIR sensor is typically mounted on a printed circuit board containing the necessary electronics required to interpret the signals from the pyroelectric sensor chip. A Passive Infrared sensor (PIR sensor) is an device that measures infrared (IR) lightweight divergent from objects in its field of reading.PIR sensors area unit usually utilized in the development of PIR-based motion detectors. 3.3 TEMPERATURE SENSOR In a Temperature Sensor LM35 may be an exactitude IC temperature sensing element with its output proportional to the temperature (in Celsius). The sensing element electronic equipment is sealed and thus it's not subjected to a chemical reaction and alternative processes. It conjointly posses low self -heating and doesn't cause quite zero.1oC temperature rise installation. The operational temperature vary is from -55°C to 150°C. 3.4 HEART BEAT SENSOR Pulse Oximeter sensor is designed to give the digital output of heat beat when a finger is placed on it. When the guts beat detector is functioning, the beat LED flashes in unison with each heartbeat. This digital output is often connected to a microcontroller on to live the Beats Per Minute (BPM) rate. It works on the principle of sunshine modulation by blood flow through finger at every pulse. 3.5 GPS Global Positioning System (GPS) is a satellite- based navigation system made up of at least 24 satellites.GPS works in any weather, anyplace within the world, 24 hours a day, with no subscription fees or setup charges .The U.S.Department of Defense (USDOD) originally place the satellites into orbit for military use however, they were created on the market for civilian use within the Eighties. The Global Positioning System (GPS) is a satellite-based navigation system made up of at least 24 satellites.GPS works in any weather, anyplace within the world, 24 hours a day, with no subscription fees or setup charges. The U.S.Department of Defense (USDOD) originally place the satellites into orbit for military use however, they were created on the market for civilian use within the Eighties. 3.6 IOT SIM800A SIM800 may be a complete Quad-band GSM/GPRS answer in a very SMT kind which may be embedded within the client applications.SIM800 support Quadband850/900/1800/1900MHz; it will transmit Voice, SMS, and information with low-power- consumption. With the small size of 24*24*3mm, it will work into a slim and compact demand of client style. Featuring Bluetooth and Embedded AT, it permits total price savings and quick time-to-market for client applications. Any microcontroller access to your Wi-Fi network. The ESP8266 is capable of either hosting Associate in a Nursing application or offloading all Wi-Fi networking functions from another application processor. 3.7 ARDUINO ESP8266 WIFI The Arduino Uno Wi-Fi is an Arduino Uno with an integrated Wi-Fi module. The board is based on theATmega328Pwithan ESP8266WiFiModule integrated. The ESP8266 Wi-Fi module is a complete Wi-Fi network where you can easily connect as a serving Wi-Fi adapter, ARDUINO UNO CONTROLLER HEART BEAT SENSOR TEMPERATURE SENSOR PIR SENSOR GPS SHOCK CIRCUIT LCD IOT SIM800A CLOUD
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 09 | Sep 2018 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7045 wireless internet access interface to any microcontroller based design on its simple connectivity through Serial Communication or UART interface. The ESP8266 Wi-Fi Module is a self-contained SOC with integrated TCP/IP protocol stack that can give any microcontroller access to your Wi-Fi network. The ESP8266 is capable of either hosting an application or offloading all Wi-Fi networking functions from another application processor. 4. SYSTEM IMPLEMENTATION System Implementation uses the structure created during architectural design and the results of the system analysis to construct system elements that meet the stakeholder requirements and system requirements developed in early life cycle phases. The system is implemented using Embedded C, Proteus and so on. 4.1 EMBEDDEDC Embedded C Programming Language is, widely used in the development of Embedded System is an extension of the C Programming Language. The Embedded C Programming Language uses the same syntax and semantics of C language like the main function, declaration of the data types, defining variables, loops, functions, statements, etc. The extension in Embedded C from standard C Programming Language includes I/O Hardware Addressing, fixed- point arithmetic operations, accessing address spaces, etc. Advantagesof an embedded C program are it takes less time to develop an application program. It reduces the complexity of the program. It is easy to verify and understand and it is portable in nature from one controller to another. 4.2 PROTEUS Proteus (PROcessor for TExt Easy to USe) is a fully functional, procedural programming language created in 1998 by Simone Zanella. Proteus incorporates many functions derived from several other languages: C, BASIC, Assembly, Clipper/dBase; it is especially versatile in dealing with strings, having hundreds of dedicated functions; this makes it one of the richest languages for text manipulation. Proteus owes its name to a Greek god of the sea (Proteus), who took care of Neptune's crowd and gave responses; he was renowned for being able to transform himself, assuming different shapes. Transforming data from one form to another is the main usage of this language. 5. CONCLUSION In this paper, we focus on a security system that is designed merely to serve the purpose of providing security to women so that they never feel helpless while facing such social challenges. The system is built that can detect the location and health condition of the person that will enable us to take action accordingly based on electronic gadgets like GPS receiver, body temperature sensor, IOT modem, PIR sensor , heartbeat sensor, and the vibration sensor. The heartbeat of an individual in such things is generally higher that helps build choices together with different sensors like motion sensors to discover the abnormal motion of the women while she is victimized. The idea to develop a wise device girl |for ladies| for girls} is that it’s utterly comfy and straightforward to use as compared with already existing women security solutions. 6. FUTURE ENHANCEMENT In our future work, we will embed the shock attack which will help the victim to escape from the attacker and safeguard herself .The camera can be added to the device so that the attacker images can be captured and send it to cops so that we can prevent these attacks in future REFERENCES [1] Vamil B. Sangoi, “Smart security solutions,” International Journal of Current Engineering and Technology, Vol.4, No.5, Oct-2014. [2] Simon L. Cotton and William G. Scanlon, “Millimeter - wave Soldier –to soldier communications for covert battlefield operation,” IEEE communication Magazine, October 2009. [3] ShayanNalbandian,”A survey on Internet of Things: Application and Challenges”, International Congress on Technology, Communication and Knowledge (ICTCK), 11-12 Nov 2015, Masshad,Iran [4] Raguvaran.K,J.Thiyagarajan,”Raspberry Pi based Global Industrial Process Monitoring through Wireless Communication”, International Conference on Robotics,Automation,Control and Embedded Systems(RACE),18-20 Feb 2015,Chennai,India. [5] D.G.Monisha, M.Monisha, G.Pavithra, R. Subhashini, “Women Safety Device and Application-FEMME”, Indian Journal of Science and Technology, Vol 9(10), DOI:10.17485/ijst/2016/v9i10/88898,March 2016. [6] GowriPredeba.B, Shyamala.N, Tamilselvi.E, Ramalakshmi.S, Selsiaulvina.C, “Women Security System Using GSM and GPS”, International Journal of Advanced Research Trends in Engineering and Technology (IJARTET) Vol. 3, Special Issue 19, April 2016 [7] BharathPatil, RadhikaPatil, Dr. Andre Pittet, “Energy saving techniques for gps based tracking applications”, Integrated Communications, Navigation and Surveillance Conference (ICNS), 2011, pp. J8-17.