Preview

Block Diagram

Satisfactory Essays
Open Document
Open Document
304 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Block Diagram
ABSTRCT

Every day when you wake up and explore the world, you tend to notice that the world around you is changing drastically. Technology is growing faster than the growth of population in world. But not all Technology is utilized for the betterment of the life of people. One of the greatest effects of technology is its utilization in the field of robbery. People have become so greedy that they find new and unique way of robbery.

But not all brains work in worked way. We have utilized our brain for the welfare of mankind by working on device called I-PROTECTOR. It is an embedded device consisting of motion sensors using laser and LDR sensor, camera system, automatic door locking system, automatic SMS and E-MAIL sending.

The protection boundary will surround the room which needs to be protected. First boundaries consist of LASER beam which sense the authentic entry in the system. The second part consists of camera, automatic E-MAIL sending and SMS sending process and automatic door locking system. Email sending process is the main feature of I-protector. When stranger enters in protected area, the laser beam is cut. The processing circuitry used sends the signal to processing unit or CPU. The CPU sends the email automatically with photo camera picture and sends SMS to the number of the owner simultaneously and they are monitoring the entire system for security purpose

This system or device is user friendly. The more knowledge of the procedures is enough for the use of this device so it is much better than other protection system available. Also we design module for the door unlocking system which is more use full for batter protection of the system and our goal is that to design project that use for commercial purpose as well as practical utilization of our knowledge

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Advancing technology produce new forms of crime by creating or giving criminals that technology to commit the crime they have committed. For instance a hacker typically has to have a computer or internet to commit a cybercrime.…

    • 273 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Every day, US department, retail, and grocery stores lose an estimated 91 million dollars to shoplifting. But how is this happening? Are our technologies too simple, too easy to outsmart? Or are the people in today’s society underestimating their ingenuity? Despite the psychological effect of stopping some people from becoming shoplifters, anti-theft devices don't actually stop or deter the professional or determined. Not only do anti-theft devices waste people's time, they do not catch or identify shoplifters any better than a camera could.…

    • 536 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    An access control system is fundamental in reducing security issues as well as controlling the personnel allowed to access a given place. Its main objective is to ensure limited persons are granted the rights of access. This access can be granted by checking on criteria such as workplace, home or any other specified locations. The access control system may consist of diverse components that collaborate to ensure the main objective is achieved. An effective control system would ensure privileges for the different users vary according to their access rights or levels; the system under research can monitor and record all activities of access, lock and unlock the doors, cancel privileges when a pass card is lost as well as detect usage of canceled cards (Benantar, 2006).…

    • 1220 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Theft has been a major issue since the beginning of interactions among different groups of people. Starting from simple items like food, clothes, and other necessary products, the act of stealing evolved on a vicious scale. In no time, people began to linger for more valuable merchandise, leading to the capture of the ultimate prize, humans. With the support of many other works, this paper will show how robbery and theft has evolved into the monstrosity it is today, and will prove how larceny and abductions today are far more malicious than past acts of them.…

    • 2325 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Term paper

    • 1329 Words
    • 6 Pages

    A physical model and steps of building the security system will be discussed as well as its set up and mode of operation. System testing showed a quick and efficient operation of the system, where in case of smoke or fire detection, light and siren are triggered and fire department is called, and in case of break-in police is called as well as siren is triggered.…

    • 1329 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Society has changed through the increase in globalisation. Globalisation has created more opportunities for crime to be committed. The dramatic advances in technology has made many different crimes available, this includes fraud. Technology has led postmodernity changing, it has caused changes in the economy as corporate crime is now easier to commit.…

    • 806 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Technology has made our world increasingly open and vulnerable (Goodman, 2012). As companies develop amazing technology for good purposes, criminals can use that same technology to hurt people. It is a bad assumption to believe that crime-stopping technology cannot be used against the system. Lawbreakers can develop and use technology for the sole purpose of committing crimes and new technologies produce the risks of unanticipated, undesirable risks and consequences (Cole, Smith, & DeJong, 2014). There are so many different types of new technology that criminals use and that the system uses. Criminals use cyber-crime to break into people’s accounts, and counterfeiting to steal from companies, just to name a couple. Police use computers a lot for their work. New programs, like the Geographic Information System, are useful for mapping problem locations to deal with specific crime. All kinds of information can be collected in law enforcement databases: fingerprints, tattoos, DNA samples, and gun/ballistic records. I think the biggest threat to society from their adaptation is the fact that personal information is so open to the public now. Criminals have grown with the technology and know how to get credit card numbers, addresses, and so much that is very dangerous for them to have and abuse.…

    • 257 Words
    • 1 Page
    Good Essays
  • Good Essays

    Technology does not have a simple positive or negative effect on individuals in society. "Peace, Technology, and the Role of Ordinary People", is one person 's eccentric view of the negative connotations associated with technology. Military technology provides us with the global power to protect citizens in the event of war. The money invested in technology is equivalent to what is used to pay workers ' salaries. Economic changes in society are as important to world leaders as they are to the ordinary man. In "Peace, Technology, and the Role of Ordinary People", technology is neither positive nor negative in its uses, but rather dependent upon its users.…

    • 967 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Criminal Justice Trends

    • 1468 Words
    • 6 Pages

    In the past (early 2000) the criminal justice system found problems with a demanding change that was going nowhere fast, I’m refereeing to the fast pace world and the computer savvy criminals that were growing. The police and other law enforcement agencies tried to keep up and gain the upper hand. While they managed to do this, little did they know that in 2011 they would have to become more savvy with technology and learn how to stop credit card theft from using a gas station pump and getting gas, or from someone stealing your back information, just from walking by them or swiping your card at the bank. “Predictions and visions of the future are marked by challenges, expectations, advanced preparedness, and technological developments. During this the first decade of the twenty-first century, criminal justice professionals are encountering enormous challenges and organizational changes. Whether or not the technologically advanced changes in criminal justice investigations and crime control will continue to significantly reduce violent crime rates remains to be seen. Technological and social developments as well as policy changes offer much promise for the future. “Muraskin, R., and Roberts, A.K. (2005). Visions for Change: crime and Justice in the Twenty-First Century. 4th ed. Upper Saddle River, N: Prentice Hall…

    • 1468 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Though the advancement of technology brought allot of advantages and positive changes on the lives of every individual in this world it also had some negative impacts. As advanced technologies begin to take hold over the lives of the ordinary people problems also began to occur. Slowly without them being aware the People started to become very much dependent on technology. As a result even the simplest activities and the easiest tasks of day-to-day life begun to be done with the aid of modern technology.…

    • 1050 Words
    • 5 Pages
    Good Essays
  • Good Essays

    In today’s news, as well as ads, we are informed of the importance of security when it comes to one’s home. Criminals and burglars, target locations with no or very little security. Large valuable items are easily obtained through this. Even one’s life is in potential danger without home security.…

    • 506 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Crime Thoeries

    • 704 Words
    • 3 Pages

    There are many different theories when it comes to digital crime. Some of the theories are the choice theory, the deterrence theory, the psychological theory, the strain theory and the routine activities theory. In this paper I will discuss the one theory to be the cause of digital crime, why the theory chosen could be recognized as the most relevant in terms of being the cause of digital crime and two examples of non-digital crime that could be considered caused by this theory.…

    • 704 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Transnational Crime

    • 1894 Words
    • 8 Pages

    In the early twentieth century, citizens feared gangsters such as Al Capone and Baby face Nelson. In modern day society, the everyday technology most cannot live without is feared. Computers, cell phones, and tablets can all be used to participate in transnational crime. Transnational crime is defined as “self-perpetuating associations of individuals who operate transnational for the purpose of obtaining power, influence, monetary and/or commercial gains, wholly or in part by illegal means, while protecting their activities through a pattern of corruption and/ or violence, or while protecting their illegal activities through a transnational structure and the exploitation of transnational commerce or communication mechanisms.” (National Security Council, n.d.) Transnational crime comes in many types, such as cybercrime, drug trafficking, money laundering, maritime piracy, theft of art and cultural objects, trade in human body parts, and human trafficking.…

    • 1894 Words
    • 8 Pages
    Powerful Essays