Preview

real time vechile tracking system

Powerful Essays
Open Document
Open Document
2104 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
real time vechile tracking system
SECURITY BASED AUTOMATIC DIGITAL DOOR OPENING&CLOSING SYSTEM USING FACE RECOGNITION
1.SriDhivyaKrishnan.K, 2.M.Gowsalya,3.N.Divya,4.T.Devika.
1(PG Scholar in Embedded System Technologies, Knowledge Institute Of Technology,Salem,India)
2(PG Scholar in Embedded System Technologies, Knowledge Institute Of Technology,Salem,India)

ABSTRACT Currently,theft has been done in lot of places in our society while considering safety issues this idea is proposed.The objective of this paper is to design the IMAGE based door opening and closing system and also increase the security in banks, collegesand homes based on biometric system. The biometric person authentication technique based on the pattern of the human iris is well suitable for application to any access control system requiring a high level of security. Today, biometric recognition is a common and reliable way to authenticate the identification of a person based on physiological or behavioral characteristics. So in thispaper if iris is matched the door it will be opened otherwise it will not be open. IR sensor used to detect the human in or out.By using this concept,we can avoid the theft in bank&home.It also used in various places in our society to avoid theft.The result of our idea is done in MATLAB & the simulation&Hardware Result are shown in this paper. This idea is very useful in banks, offices, shops etc..
KEYWORDS:MATLAB,PC,IRSensor,Digital Door Lock,WebCamera,GSM.

I. INTRODUCTION
Presently Industries are increasingly shifting towards automation. Two principle components of today’s industrial automations are programmable controllers and robots. In order to aid the tedious work and to serve the mankind, today there is a general tendency to develop anintelligentoperation.Microcontroller is the heart of the device which handles all the sub devices connected across it. It has flash type reprogrammable memory. It has some peripheral devices to play this project perform. Face recognition (FR) has



References: [1] Yang Ni, EmineKrichen, WalidHizem, Sonia Garcia-Salicetti, and Bernadette Dorizzicomparison of subspace analysis forface recognition,” in Proc. IEEE Int. Conf. Acoustics, Speech, SignalProcessing, vol. 3, Apr. 2003, pp. 121–124. [2] Xiao, Y., Yu, S., Wu, K., Ni, Q., Janecek., C., Nordstad, J, “ Radio frequency identification: technologies, applications, and research issues”, Wiley Journal of Wireless Communications and Mobile Computing, 2007,Vol 7. [3] K.S. Rawat, G.H. Massiha,"Secure Data Transmission Over Wireless Networks: Issues and Challenges”, University of Louisiana at Lafayette, USA, 2003 IEEE, pp-65 – 68

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4577 Words
    • 19 Pages

    When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database. The biometric feature must have the following characteristics:-(a) Universality, which means that every person should have the characteristic,(b) Uniqueness, two persons should not have the same term or measurement of Characteristic.(c) Permanence, the characteristic should be invariant with time.(d) Measurability, the characteristic can be quantified that is the origin of the Cameras used in biometric systems are generally either CCD (charge couple device) or CMOS(combined metal oxide semiconductor) image sensors. CCD is comparatively more costly than…

    • 4577 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    Kendall, J., Dr. (2008, June). Cryptographic Techniques for Network Security. University of Portsmouth. Retrieved from https://learn.umuc.edu/d2l/le/content/57178/viewContent/2562147/View.…

    • 1135 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Qrb/501 Week 2

    • 2962 Words
    • 12 Pages

    Djuric, P. & Athalye, A., (2008). Radio Frequency Identification. Long Island Business News. Retrieved from (Need the link to the website)…

    • 2962 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Biometrics technology aims at utilizing major and distinctive characteristics such as behavioral or biological, for the sake of positively indentifying people. With the help of a combination of hardware and specific identifying sets of rules, a basic human attribute, automated biometric recognition mimics to distinguish and categorize other people as individual and unique. But the challenges surrounding biometrics are great as well.…

    • 1008 Words
    • 5 Pages
    Good Essays
  • Good Essays

    There is a massive disagreement in the present day concerning the biometric identification technology which is used to boost the security through travel. The research inside these technologies has been used to extend ways in how the individuals identify faces for detection and develop the similar strategy in a replicated mechanical system that will scan faces and conclude their likeness with those in a database.…

    • 990 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Age invariant face recognition is a challenging problem, and one of the challenges in face recognition is to achieve temporal invariance. The face recognition system has a training stage as well as a testing stage and the system checks the test image from database. If the test image matches with the image extracted from database then the result obtained is accurate. Aging face recognition has many useful real-world applications such as finding missing children, identifying criminals based on photographs and multiple enrolment detection problems.…

    • 84 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Fingerprint Identification

    • 4430 Words
    • 18 Pages

    In order to protect users of computer systems and to secure network-based transactions, demand is increasing for improved user authentication procedures to establish the identity of an actual user and to bar access to a terminal to anyone who is unauthorized. Personal identification using biometrics, i.e., a person’s physical or behavioral characteristics has come to attract increased attention as a possible solution to this issue and one that might offer reliable systems at a reasonable cost. While traditionally this technology has been available only with such expensive, high-end systems as those used in law enforcement and other government applications, today many personal–level applications have also become possible thanks to the advancements in pattern recognition technology.…

    • 4430 Words
    • 18 Pages
    Powerful Essays
  • Better Essays

    Biometrics is where facial recognition can categorized. According to the Criminal Investigation text book, biometrics is: "the statistical study of biological data and means to positively identify an individual by measuring the person 's unique physical or behavioral characteristics"…

    • 2694 Words
    • 11 Pages
    Better Essays
  • Powerful Essays

    Radack, S. (n.d.), SECURITY FOR WIRELESS NETWORKS AND DEVICES, WIRELESS TECHNOLOGY AND SECURITY, retrieved from http://itl.nist.gov/lab/bulletns/bltnmar03.htm…

    • 1936 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Abstract - The rapid adoption and highly distributed nature of wireless networks has made it vulnerable to attacks and calls for innovative strategies of defense for network security. The lack of cables and transfer of information over airwaves makes data exchange more susceptible to interception. Furthermore, it is difficult to implement effective methods of security without sacrificing the quality and speed of network operations. For the previous reasons, wireless security has become a common topic of interest in research projects and will be the basis of discussion for this paper.…

    • 7348 Words
    • 30 Pages
    Better Essays
  • Best Essays

    Hunt, V, A. Puglia and M. Puglia. RFID: A guide to Radio Frequency Identification. Hoboken: Wiley-Interscience, 2007.…

    • 4494 Words
    • 11 Pages
    Best Essays
  • Powerful Essays

    Audio-based identification process is based on emerged identification technology, acoustic-similarity method (Wang, 2006). Although the technology theory is in use almost 10 years, it was proved as an effective method only recently. The growing amount of music content enriched the index the acoustic-similarity method is based on, which allows it to be effective.…

    • 2386 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    % expression and in the lighting. When a new input image is read and added…

    • 1958 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Msc Thesis

    • 26086 Words
    • 105 Pages

    I would like to thank my supervisor, doc. Dr. Ing. Jiˇ´ Matas, for the guidance rı and advice he has provided throughout the research. I would also like to thank Jan ˇ Sochman for helping me especially in the technical issues.…

    • 26086 Words
    • 105 Pages
    Better Essays
  • Satisfactory Essays

    I have learned that there’s an algorithm and calculation on face recognition which are the Identification rate, false alarm rate, verification rate and the false acceptance rate.…

    • 363 Words
    • 2 Pages
    Satisfactory Essays