A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Divya, V.
- Embedded Based 3G Security System for Prison
Authors
1 School of Computing, SASTRA University, Thanjavur, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 6, No 5 (2013), Pagination: 4492-4495Abstract
Safety measures and uninterrupted surveillance are essential in areas like bank safety locker room, defense systems, VIP's homes and Luxury hotels. Prison is also the place where there is a need for high security and severe surveillance system. There are several techniques used in these particular environments which include the traditional VHS (Video Home System) and DVR (Digital Video Recorder) system.VHS surveillance system usually has the video quality problem of displaying because the analog signal is directly sent to monitor without processing, which results in poor monitoring system. Instead the DVR demonstrates a better competence in the prison. The main objective of this work is to introduce the application of CCMS (Central Control and Monitoring System) with 3G technologies for prison management by using the low cost and low power sensors through the web or wireless network which reduces the manual work involved. It also reduces the money invested and power usage in providing electrical fencing in the prison. The use of motion detection sensors and additional digital I/O devices helps to prevent escapes of prisoners.Keywords
Pic Controller, CCMS, Prison Security, DVR System, Vibration Sensor, Ultrasonic Sensor, Smoke SensorReferences
- Arulogun O T, Omidiora E O et al. (2008). Development of security system using facial recognition, Pacific Journal of Science and Technology, vol 9(2), 377-386.
- Hamed B (2011). Real-time application surveillance security system based on LabVIEW, International Journal of Computer Theory and Engineering, vol 3(3), 398-407.
- Michael B, Andreas D et al. (2006). Distributed embedded smart cameras for surveillance applications, IEEE Computer Society, vol 39(2), 68-75 .
- Computerized Central Control Monitoring System for Queen Elizabeth Hospital, Available From: http://www.emsd.gov.hk/emsd/e_download/wnew/conf_papers/central_control.pdf.
- Held C, Krumm J et al. (2012). Intelligent video surveillance, Computer Journal, IEEE Computer Society, vol 45(3), 83-84.
- Guidelines on Application of Central Control and Monitoring Systems (2002). Available from: http://www.emsd.gov.hk/emsd/e_download/pee/Guidelines_CCMS.pdf.
- Coffin J S, Prokoski F J et al. (1992). Virtual custody systems for improved house arrest and prison security, Proceedings. Institute of Electrical and Electronics Engineers, International Carnahan Conference on Security Technology, 1992 Crime Countermeasures, 81-85.
- Manual for mikroC Pro. Online, Available from: http://www.mikroe.com/downloads/get/30/mikroc_pic_pro_manual_v101.pdf.
- Hassan M S, Arshad N W et al. (2012). Data Acquisition Process for Intelligent traffic light using vision sensor. Fourth International Conference on Computational Intelligence, Modelling and Simulation (CIMSiM), 54-59.
- Oke A O, Olaniyi O M et al. (2009). Development of a microcontroller-controlled security door system, The Pacific Journal of Science and Technology, vol 10(2), 398-403.
- Allard T, Wortley R et al. (2006). The Purposes of CCTV in Prison, Security Journal, vol 19, 58-70.
- Wahyudi W A, and Syazilawati M (2007). Intelligent voice-based door access control system using adaptive-network-based fuzzy inference systems for building security, Journal of Computer Science, vol 3(5), 274-280.
- Zupan L L, and Menke B A (1991). The new generation jail: an overview, American Jails: Public Policy Issues, Chiacgo, 180-194.
- Amphibious Surveillance Robot with Smart Sensor Nodes
Authors
1 School of Computing, SASTRA University, Thanjavur, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 6, No 5 (2013), Pagination: 4496-4499Abstract
Robots have been widely used to perform variety of tasks which reduces the manual work specifically in remote areas where human accessibility is unimaginable. The main applications where the robots have exhibited their excellence include surveillance, tracking targets for military purposes and also for disaster management like searching and rescuing victims. This paper deals about an evolutionary Non-humanoid robot for surveillance with intruder protection capability. The unique feature of this surveillance robot is that it can travel both on land and water and is equipped with robotic arm to handle the work safely. It is armed with a low power high performance NXP processor which is able to manage power more efficiently. Besides being able to work in Semi-autonomous mode, the CCD (Charge Coupled Devices) along with camera aids the operator to control it in manual modeKeywords
Amphibious, CCD, NXP processor, Robots, Self-defending, SurveillanceReferences
- Mohebbi A, Safaee S et al. (2010). Design, simulation and manufacturing of a tracked surveillance unmanned ground vehicle, Proceedings of the IEEE International Conference on Robotics and Biomimetics, 1268-1275.
- Boult T E, Gaob X et al. (2004). Omni-directional visual surveillance, Image and Vision Computing, vol 22, 515-534.
- Hu C, Ma X et al. (2010). Reliable people tracking approach for mobile robot in indoor environments, Robotics and Computer-Integrated Manufacturing, vol 26, 174-179.
- Cougar 20H Sees through walls. Available from: http://www.darkgovernment.com/news/cougar-20h-sees-through-walls.
- Fire Ant, Available from: http://robotics.sandia.gov/fireant.html.
- Introduction to robots. Available from: http://www.galileo.org/robotics/intro.html.
- Zhang J, Song G et al. (2011). An indoor security system with a jumping robot as the surveillance terminal, IEEE Transactions on Consumer Electronics, vol 57( 4), 1774-1781.
- Doitsidis L, Weiss S et al. (2012). Optimal surveillance coverage for teams of micro aerial vehicles in GPS-denied environments using onboard vision, Autonomous Robot Journal, vol 33(1-2), 173-188.
- BenTzvi P, Ito S (2009). A mobile robot with autonomous climbing and descending of stairs, Robotica Journal, vol 27(2), 171-188.
- Buschmann T, Lohmeier S (2009). Humanoid robot Lola: Design and walking control, Journal of Physiology, vol 103(3-5), 141-148.
- Tang Y, and Zhang H (2008). An interactive mobile amphibious probing and surveillance system, Proceedings of the IEEE International Conference on Information and Automation (ICIA), 441-445.
- Kim Y, Kwak J et al. ( 2012). An autonomous terrain adaptation and user-friendly tele-operation of wheel-track hybrid mobile robot, International Journal of Precision Engineering and Manufacturing, vol 13(10), 1781-1788.
- Mohamed Z, and Capi G (2012). Development of a new mobile humanoid robot for assisting elderly people, International Symposium on Robotics and Intelligent Sensors (IRIS), Procedia Engineering, vol 41, 345-351.
- Patient Heart Beat Monitoring System Using PIC Microcontroller
Authors
1 Department of ECE, Sri Eshwar College of Engineering, Kinathukadavu, IN
2 Department of ECE, Sri Eshwar College of Engineering, Kinathukadavu, IN
3 Department of ECE, Sri Eshwar College of Engineering, IN
Source
Biometrics and Bioinformatics, Vol 7, No 2 (2015), Pagination: 36-40Abstract
This paper describes the development of a heart rate monitor system based on a microcontroller. It offers the advantage of portability over tape-based recording systems. The paper explains how a single- chip microcontroller can be used to analyze heart beat rate signals in real-time. In addition, it allows doctors to get the heart beat rate file of the patient by e-mail every twenty four hours. It can also be used to control patients or athletic person over a long period. The system reads, stores and analyses the heart beat rate signals repetitively in real-time. The hardware and software design are oriented towards a single-chip microcontroller-based system, hence minimizing the size. The important feature of this paper is the use of zero crossing algorithms to compute heart rate. It then processes on real-time the information to determine some heart diseases.
Keywords
Microsystems, Microcontroller, Real-Time, Heart Rate Monitoring, Zero Crossing Algorithm.- The Cost of Privacy: Destruction of Data-Mining in Anonymized Data Publishing
Authors
1 GKM College of Engineering and Technology, Chennai, IN