High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Security System based on P.I.R Sensor

Author(s):

Bhushan Gajare , Modern Education Society?s College of Engineering, Pune, India; Rajat Agarwal, Modern Education Society?s College of Engineering, Pune, India; Omkar Kute, Modern Education Society?s College of Engineering, Pune, India; Pravin Wattamwar, Modern Education Society?s College of Engineering, Pune, India; Prof. Shobha S. Raskar, Modern Education Society?s College of Engineering, Pune, India

Keywords:

PIR, IOT, LBPH

Abstract

Security can be considered as a measure that is taken with a particular ultimate objective to ensure security of a place, an individual or gathering of people or these days additionally information put away on the computer system and guarantees that individuals with specific consent have the benefit to get the secured element. Significance of security is at most while contemplating wellbeing of a person's home and dear ones or security of data delicate information of specific association. Computerization has now assumed an essential part in the field of security frameworks because of advances in the advances identified with Internet of Things (IOT). Web of Things empowers the different segments of security system to collaborate and speak with each other taken with a particular true objective to exchange the data. Observation Cameras presented in the diverse territories just gets the chronicle, anyway human mediation is basic remembering the true objective to perceive any issue happening in the edge. In this paper, Internet of Things alongside facial acknowledgment is utilized to identify the characteristics of individuals by making utilization of the camera and Passive Infrared sensor (PIR) and camera. The PIR sensor and the camera is interfaced to a computer system. The sensor gets told by the development of the individual which at that point triggers the camera. The camera catches the pictures and recognizes the face by making utilization of Facial Recognition calculation of the computer system. This data is then sent to the concerned individual, by means of mail on their advanced cells or computer system, by exploiting the offices gave by IOT.

Other Details

Paper ID: IJSRDV6I40169
Published in: Volume : 6, Issue : 4
Publication Date: 01/07/2018
Page(s): 144-147

Article Preview

Download Article