SlideShare a Scribd company logo
1 of 2
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 404
RFID BASED SECURITY GUARD SYSTEM USING GSM
Puja Baigane1, Adneya Wadetiwar2, Riya Pathak3, Suwarna Patil4, Deesha Meshram5,
Prof. Bhushan Khangare6
12345 Student, Department of Electronics and Telecommunication Engineering, Jhulelal Institute of Technology,
Nagpur, Maharashtra, India
6Assistant Professor, Department of Electronic and Telecommunication Engineering, Jhulelal Institute of
Technology, Nagpur, Maharashtra, India
---------------------------------------------------------------------***--------------------------------------------------------------------
Abstract - This paper describes the different features and
technologies present in RFID based security guard system
using GSM by overviewing multiple research done over time.
In today’s world, security is a very important part of
technology. Presently, security isprovidedmanuallytovarious
institutions, places etc. Because of this, we require human
power. The old security system need to be replaced by
automated one where system will work for guidance and
detection of strangers using RFID tags. A GSM module will be
attached on the project or Bluetooth connectivity can be used
or Wi-Fi can be used. In this paper we are trying to review
different technologies and is able to provide security to the
campus, hospital, etc.
Key Words: RFID, GSM, Wi-Fi, Bluetooth.
1. INTRODUCTION
In Most educational institution’s administrators are
concerned about campus security. Theconventional method
allowing access to employee inside aneducational campusis
by showing photo I-cards to security guard is very time
consuming and insecure, hence inefficient. Radio Frequency
Identification (RFID) based security system is one of the
solutions to address this problem. This system can be used
to allow access for student in school, college, and university.
It also can be used to take attendanceforworkersinworking
places. Its ability to uniquely identify each person based on
.security access easier, faster and secure as compared to
conventional method. Students or workers only need to
place their ID card on the reader and they will be allowed to
enter the campus. And if any invalid card is shown then the
buzzer is turned on.
The need to secure our home, industries and other related
properties has been a subject of interest since the days of
our fore fathers, Since then, an aggressive development in
the area of security has exponentially been driven to
today’s trend. A system cannot have high assurance if it
has poor security and requirements . For high assurance,
systems will logically include security requirement as well
as availability, reliability and robustness requirements .
The early-men, in their effort to provide security to their
house-hold and properties, used crude measures such as
stones, grasses and crude weapons to secure themselves. As
the intrusion techniques by intruders outgrows the then
security measures and more values added to lives and
properties, ore sophisticated measures were developed to
ensure an intruder proof environment, which today, has
become one of the most interesting aspect of individual,
National and even international concern.
2. LITERATURE SURVEY
2.1 MicrocontrollerBasedSecuritySystemwithIntruder
Position (January2014)
Diarah Reuben Samule,Ojongbede,H.A
This paper proposes microcontrollerBasedSecurity System
with Intruder Position Display is a design that applies
automated security systeminhomes,Industries,militaryetc.
The project will feature a system that will track thepresence
of an intruder in restricted area and also inform the user
about the position of the intruder. This Project will be based
on microcontrollerandother electronicdesigntoachieve the
above stated purposes. The interfacing medium will make
use of parallel port. The sensors (Light Dependent Resistor
and LEDS) will receive the signal when the intruder is
around while the control program will translatethereceived
signal from the sensors to useful information about the
function of the system.
In this project they have implored the use of bothhardware
and software to bring about theentireproject.Thehardware
components are solely coordinated by the AT89S51
microcontroller chip while the C programming language is
used to program the chip.
2.2 Security System in Speech Recognition (August
2014)
Sunita Dixit, Dr. MD Yusuf Mulge
This paper describes that speaker recognition is one of the
effectively used biometric authentication system that
actually identify the speaker on the basis of vocal
characteristics. The speaker identification depends on
different voice features such as the intensity analysis, voice
pitch analysis, voice feature extraction etc. This recognition
process is also affected from different factors such as the
background noise, instrumentation noise etc. In this paper,
noise effective approach is suggested to define an effective
speaker recognition process. The robustness of the
recognition system is improved with the definition of an
integrated layered model. Keywords: Speech Enhancement,
Spectral Subtraction, LPC, HMM, ANN. Speech is the most
sophisticated signal naturally produced by humans. The
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 405
speech signal carries linguistic information for sharing of
information and ideas. It allows people to express emotions
and verbally share feelings. It is the most fundamental form
of communication among humans. The aim of digital speech
processing is to take advantage of digital computing
techniques to process the speech signal for increased
understanding, improved communication, and increased
efficiency and productivity associatedwithspeechactivities.
The field of speech processing includes speech analysis and
representation, speech coding, speech synthesis, speech
recognition and understanding, speaker verification, and
speech enhancement.
2.3 RFID and GSM Based Campus Security System
(April2015)
Abhijit K. Shinde, Raghunath R.Harade,Chetan M.Gaikwad.
This paper represents the RFID and GSM technology. The
main objective of the system is to uniquely identify and to
make security for a person. This requires a unique product,
which has the capability of distinguishing different person.
This is possible by the new emerging technology RFID
(Radio Frequency Identification). The main parts of an RFID
system are RFID tag (with unique ID number) and RFID
reader (for reading the RFID tag). In this system, RFID tag
and RFID reader used are operating at 125 KHz. The
microcontroller internal memory is used for storing the
details. KEYWORDS: RFID Tag, RFID Card Reader, GSM,
DDRAM, EPC Tags. Most educational institutions'
administrators are concerned about campus security. The
conventional method allowing access to employee inside an
educational campus is by showing photo I-cards to security
guard is very time consumingandinsecure,henceinefficient.
Radio FrequencyIdentification(RFID)basedsecuritysystem
is one of the solutions to address this problem. This system
can be used to allow access for student inschool,college,and
university. It also can be used to takeattendanceforworkers
in working places. Its ability to uniquelyidentify eachperson
based on .security access easier, faster and secure as
compared to conventional method.Studentsorworkersonly
need to place their ID card on the reader and they will be
allowed to enter the campus. And if any invalid card is
shown then the buzzer is turned on.
2.4 RFID Based Security AccessControl SystemwithGSM
Technology (2016)
Peter Adole, Joseph M. Mom and Gabriel A. Igwue
This paper describes the various security challenges being
encountered in many places today require electronic means
of controlling access to secured premises in addition to the
available securitypersonnel.Varioustechnologieswereused
in different forms to solve these challenges. The Radio
Frequency Identification (RFID) Based Access Control
Security system with GSM technologypresentedinthiswork
helps to prevent unauthorized access to controlled
environments (secured premises). This is achieved mainly
through the use of a Radio Frequency Identification System
with operating frequency of 125 KHz, Microcontroller
programmed to sendcontrol signals,DCmotor,relay,buzzer,
Liquid Crystal Display (LCD) and GSM/GPRS Modem. Once
the RFID tag which contains the user’s unique information is
scan by the RFID reader and confirmed match with the
information stored in the microcontroller, the
microcontroller is instructed to turn ON the DC motor
through L293D driver, display “USER NUMBER and CARD
NUMBER” on the LCD and activates the GSM/GPRS modem
to send SMS alert “AUTHORIZED, valid RFID card shown,
User is allowed to enter, user number”tosecuritypersonnel.
Else, the DC Motor remained OFF, LCD displays “READ RFID
CARD NOT VALID”, buzzer turns ON for about 5seconds and
GSM/GPRS modem activated to send “ UNAUTHORIZED,
invalid RFID card is used to access the security system” to
the security personnel. The electronic circuit was
implemented, the codes for microcontroller were written in
assembly language, debugged and compiled using the KEIL
Micro vision 4 integrated development environment. The
resultant Hex files were programmed into the memories of
the microcontrollers with theaidofa universal programmer.
Hardware simulation was carried out using the Proteus
Virtual System Modelling (VSM) version 8.0.An importation
implication of this paper is that the system is cheaper to
maintain and more efficient in comparison with a manually
operated type or key lock system. The RFID based access
control system can be useful in providingsecurityforhomes,
organizations, andautomobileterminalstoincreasethelevel
of security. Keywords: Access control, Authorized, RFID,
GSM, Microcontroller, Unauthorized.
3. CONCLUSION
This paper review wide range of technologies involved in
Security systems. As the technology is getting advanced
features of security systems are also enhanced. It is highly
efficient and accurate because it detects the RFID tags and if
security system choose short cut then RFID reader reads an
instruction given. Every technology discuss above has its
own advantages and disadvantages and by using them we
can design a more efficient security guard systems.
REFERENCES
[1] Diarah Reuben Samule,Ojongbede,H.A.Microcontroller
Based Security System with Intruder Position in IOSR
Journal of Electrical and Electronics Engineering (IOSR-
JEEE). Volume 9, Issue 1 Ver. II, January 2014
[2] Sunita Dixit,Dr MD Yusuf Mulge. Security system in
speech recognititon in International Journal ofScientific
Development and Research(IJSDR). Vol3 August 2013.
[3] Abhijt K. Shinde,Raghunath R.Harde,ChetanM.Gaikwad.
RFID and GSM Based Campus Security system in
International Journal of Innovation in Engineering and
Technology . Vol.6, April 2015.
[4] Peter Adole,Joseph M Mom,Gabril A Igwue.RFID Based
security access control system in American Journl of
Engineering Research.Volume-5,Issue-7,2016.

More Related Content

What's hot

IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET Journal
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMIRJET Journal
 
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
Monitoring and Centering a Remote Discrete Using Rfid through Sim Moduleinventionjournals
 
IRJET- IoT based Smart Voting System
IRJET- IoT based Smart Voting SystemIRJET- IoT based Smart Voting System
IRJET- IoT based Smart Voting SystemIRJET Journal
 
11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting systemAlexander Decker
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET Journal
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET Journal
 
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint SensorWireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensorijtsrd
 
IRJET - Dual Verification ATM for Blind People
IRJET -  	  Dual Verification ATM for Blind PeopleIRJET -  	  Dual Verification ATM for Blind People
IRJET - Dual Verification ATM for Blind PeopleIRJET Journal
 
Dolphin RFID Pvt. Ltd. Profile
Dolphin RFID Pvt. Ltd. ProfileDolphin RFID Pvt. Ltd. Profile
Dolphin RFID Pvt. Ltd. Profilenileshirathod
 

What's hot (14)

IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
 
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
 
IRJET- IoT based Smart Voting System
IRJET- IoT based Smart Voting SystemIRJET- IoT based Smart Voting System
IRJET- IoT based Smart Voting System
 
11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
 
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint SensorWireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensor
 
Classroom locking-system (1)
Classroom locking-system (1)Classroom locking-system (1)
Classroom locking-system (1)
 
Sdfgh
SdfghSdfgh
Sdfgh
 
Design and implementation a security system for bank using voice recognition
Design and implementation a security system for bank using voice recognitionDesign and implementation a security system for bank using voice recognition
Design and implementation a security system for bank using voice recognition
 
IRJET - Dual Verification ATM for Blind People
IRJET -  	  Dual Verification ATM for Blind PeopleIRJET -  	  Dual Verification ATM for Blind People
IRJET - Dual Verification ATM for Blind People
 
Dolphin RFID Pvt. Ltd. Profile
Dolphin RFID Pvt. Ltd. ProfileDolphin RFID Pvt. Ltd. Profile
Dolphin RFID Pvt. Ltd. Profile
 

Similar to IRJET- RFID Based Security Guard System using GSM

Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Editor IJARCET
 
20563-38910-2-PB.pdf
20563-38910-2-PB.pdf20563-38910-2-PB.pdf
20563-38910-2-PB.pdfIjictTeam
 
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...IRJET Journal
 
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...
IRJET-  	  Automated Face Detection and Recognition for Detecting Impersonati...IRJET-  	  Automated Face Detection and Recognition for Detecting Impersonati...
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...IRJET Journal
 
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...IRJET Journal
 
IRJET- EMR using RFID Technology
IRJET- EMR using RFID TechnologyIRJET- EMR using RFID Technology
IRJET- EMR using RFID TechnologyIRJET Journal
 
Implementation of IOT based Student Healthcare Monitoring and Automation Boot...
Implementation of IOT based Student Healthcare Monitoring and Automation Boot...Implementation of IOT based Student Healthcare Monitoring and Automation Boot...
Implementation of IOT based Student Healthcare Monitoring and Automation Boot...IRJET Journal
 
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...IRJET Journal
 
IoT BASED ATTENDANCE MONITORING SYSTEM
IoT BASED ATTENDANCE MONITORING SYSTEMIoT BASED ATTENDANCE MONITORING SYSTEM
IoT BASED ATTENDANCE MONITORING SYSTEMIRJET Journal
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET Journal
 
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital IndiaIRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital IndiaIRJET Journal
 
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...IJCNCJournal
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIJERA Editor
 
Secured e-payment system based on automated authentication data and iterated ...
Secured e-payment system based on automated authentication data and iterated ...Secured e-payment system based on automated authentication data and iterated ...
Secured e-payment system based on automated authentication data and iterated ...TELKOMNIKA JOURNAL
 
IRJET - Design of Student Security System using RFID Mechanism
IRJET -  	  Design of Student Security System using RFID MechanismIRJET -  	  Design of Student Security System using RFID Mechanism
IRJET - Design of Student Security System using RFID MechanismIRJET Journal
 
RFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINORFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINOIJMTST Journal
 
AUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSOR
AUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSORAUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSOR
AUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSORIRJET Journal
 

Similar to IRJET- RFID Based Security Guard System using GSM (20)

Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869
 
20563-38910-2-PB.pdf
20563-38910-2-PB.pdf20563-38910-2-PB.pdf
20563-38910-2-PB.pdf
 
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
 
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...
IRJET-  	  Automated Face Detection and Recognition for Detecting Impersonati...IRJET-  	  Automated Face Detection and Recognition for Detecting Impersonati...
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...
 
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
 
Novel Tracking System to Enhance Child Prudent Using Face Recognition
Novel Tracking System to Enhance Child Prudent Using Face RecognitionNovel Tracking System to Enhance Child Prudent Using Face Recognition
Novel Tracking System to Enhance Child Prudent Using Face Recognition
 
IRJET- EMR using RFID Technology
IRJET- EMR using RFID TechnologyIRJET- EMR using RFID Technology
IRJET- EMR using RFID Technology
 
Implementation of IOT based Student Healthcare Monitoring and Automation Boot...
Implementation of IOT based Student Healthcare Monitoring and Automation Boot...Implementation of IOT based Student Healthcare Monitoring and Automation Boot...
Implementation of IOT based Student Healthcare Monitoring and Automation Boot...
 
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
 
IoT BASED ATTENDANCE MONITORING SYSTEM
IoT BASED ATTENDANCE MONITORING SYSTEMIoT BASED ATTENDANCE MONITORING SYSTEM
IoT BASED ATTENDANCE MONITORING SYSTEM
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
 
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital IndiaIRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
 
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
Secured e-payment system based on automated authentication data and iterated ...
Secured e-payment system based on automated authentication data and iterated ...Secured e-payment system based on automated authentication data and iterated ...
Secured e-payment system based on automated authentication data and iterated ...
 
IRJET - Design of Student Security System using RFID Mechanism
IRJET -  	  Design of Student Security System using RFID MechanismIRJET -  	  Design of Student Security System using RFID Mechanism
IRJET - Design of Student Security System using RFID Mechanism
 
RFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINORFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINO
 
AUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSOR
AUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSORAUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSOR
AUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSOR
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 

Recently uploaded (20)

Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 

IRJET- RFID Based Security Guard System using GSM

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 404 RFID BASED SECURITY GUARD SYSTEM USING GSM Puja Baigane1, Adneya Wadetiwar2, Riya Pathak3, Suwarna Patil4, Deesha Meshram5, Prof. Bhushan Khangare6 12345 Student, Department of Electronics and Telecommunication Engineering, Jhulelal Institute of Technology, Nagpur, Maharashtra, India 6Assistant Professor, Department of Electronic and Telecommunication Engineering, Jhulelal Institute of Technology, Nagpur, Maharashtra, India ---------------------------------------------------------------------***-------------------------------------------------------------------- Abstract - This paper describes the different features and technologies present in RFID based security guard system using GSM by overviewing multiple research done over time. In today’s world, security is a very important part of technology. Presently, security isprovidedmanuallytovarious institutions, places etc. Because of this, we require human power. The old security system need to be replaced by automated one where system will work for guidance and detection of strangers using RFID tags. A GSM module will be attached on the project or Bluetooth connectivity can be used or Wi-Fi can be used. In this paper we are trying to review different technologies and is able to provide security to the campus, hospital, etc. Key Words: RFID, GSM, Wi-Fi, Bluetooth. 1. INTRODUCTION In Most educational institution’s administrators are concerned about campus security. Theconventional method allowing access to employee inside aneducational campusis by showing photo I-cards to security guard is very time consuming and insecure, hence inefficient. Radio Frequency Identification (RFID) based security system is one of the solutions to address this problem. This system can be used to allow access for student in school, college, and university. It also can be used to take attendanceforworkersinworking places. Its ability to uniquely identify each person based on .security access easier, faster and secure as compared to conventional method. Students or workers only need to place their ID card on the reader and they will be allowed to enter the campus. And if any invalid card is shown then the buzzer is turned on. The need to secure our home, industries and other related properties has been a subject of interest since the days of our fore fathers, Since then, an aggressive development in the area of security has exponentially been driven to today’s trend. A system cannot have high assurance if it has poor security and requirements . For high assurance, systems will logically include security requirement as well as availability, reliability and robustness requirements . The early-men, in their effort to provide security to their house-hold and properties, used crude measures such as stones, grasses and crude weapons to secure themselves. As the intrusion techniques by intruders outgrows the then security measures and more values added to lives and properties, ore sophisticated measures were developed to ensure an intruder proof environment, which today, has become one of the most interesting aspect of individual, National and even international concern. 2. LITERATURE SURVEY 2.1 MicrocontrollerBasedSecuritySystemwithIntruder Position (January2014) Diarah Reuben Samule,Ojongbede,H.A This paper proposes microcontrollerBasedSecurity System with Intruder Position Display is a design that applies automated security systeminhomes,Industries,militaryetc. The project will feature a system that will track thepresence of an intruder in restricted area and also inform the user about the position of the intruder. This Project will be based on microcontrollerandother electronicdesigntoachieve the above stated purposes. The interfacing medium will make use of parallel port. The sensors (Light Dependent Resistor and LEDS) will receive the signal when the intruder is around while the control program will translatethereceived signal from the sensors to useful information about the function of the system. In this project they have implored the use of bothhardware and software to bring about theentireproject.Thehardware components are solely coordinated by the AT89S51 microcontroller chip while the C programming language is used to program the chip. 2.2 Security System in Speech Recognition (August 2014) Sunita Dixit, Dr. MD Yusuf Mulge This paper describes that speaker recognition is one of the effectively used biometric authentication system that actually identify the speaker on the basis of vocal characteristics. The speaker identification depends on different voice features such as the intensity analysis, voice pitch analysis, voice feature extraction etc. This recognition process is also affected from different factors such as the background noise, instrumentation noise etc. In this paper, noise effective approach is suggested to define an effective speaker recognition process. The robustness of the recognition system is improved with the definition of an integrated layered model. Keywords: Speech Enhancement, Spectral Subtraction, LPC, HMM, ANN. Speech is the most sophisticated signal naturally produced by humans. The
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 405 speech signal carries linguistic information for sharing of information and ideas. It allows people to express emotions and verbally share feelings. It is the most fundamental form of communication among humans. The aim of digital speech processing is to take advantage of digital computing techniques to process the speech signal for increased understanding, improved communication, and increased efficiency and productivity associatedwithspeechactivities. The field of speech processing includes speech analysis and representation, speech coding, speech synthesis, speech recognition and understanding, speaker verification, and speech enhancement. 2.3 RFID and GSM Based Campus Security System (April2015) Abhijit K. Shinde, Raghunath R.Harade,Chetan M.Gaikwad. This paper represents the RFID and GSM technology. The main objective of the system is to uniquely identify and to make security for a person. This requires a unique product, which has the capability of distinguishing different person. This is possible by the new emerging technology RFID (Radio Frequency Identification). The main parts of an RFID system are RFID tag (with unique ID number) and RFID reader (for reading the RFID tag). In this system, RFID tag and RFID reader used are operating at 125 KHz. The microcontroller internal memory is used for storing the details. KEYWORDS: RFID Tag, RFID Card Reader, GSM, DDRAM, EPC Tags. Most educational institutions' administrators are concerned about campus security. The conventional method allowing access to employee inside an educational campus is by showing photo I-cards to security guard is very time consumingandinsecure,henceinefficient. Radio FrequencyIdentification(RFID)basedsecuritysystem is one of the solutions to address this problem. This system can be used to allow access for student inschool,college,and university. It also can be used to takeattendanceforworkers in working places. Its ability to uniquelyidentify eachperson based on .security access easier, faster and secure as compared to conventional method.Studentsorworkersonly need to place their ID card on the reader and they will be allowed to enter the campus. And if any invalid card is shown then the buzzer is turned on. 2.4 RFID Based Security AccessControl SystemwithGSM Technology (2016) Peter Adole, Joseph M. Mom and Gabriel A. Igwue This paper describes the various security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available securitypersonnel.Varioustechnologieswereused in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technologypresentedinthiswork helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly through the use of a Radio Frequency Identification System with operating frequency of 125 KHz, Microcontroller programmed to sendcontrol signals,DCmotor,relay,buzzer, Liquid Crystal Display (LCD) and GSM/GPRS Modem. Once the RFID tag which contains the user’s unique information is scan by the RFID reader and confirmed match with the information stored in the microcontroller, the microcontroller is instructed to turn ON the DC motor through L293D driver, display “USER NUMBER and CARD NUMBER” on the LCD and activates the GSM/GPRS modem to send SMS alert “AUTHORIZED, valid RFID card shown, User is allowed to enter, user number”tosecuritypersonnel. Else, the DC Motor remained OFF, LCD displays “READ RFID CARD NOT VALID”, buzzer turns ON for about 5seconds and GSM/GPRS modem activated to send “ UNAUTHORIZED, invalid RFID card is used to access the security system” to the security personnel. The electronic circuit was implemented, the codes for microcontroller were written in assembly language, debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with theaidofa universal programmer. Hardware simulation was carried out using the Proteus Virtual System Modelling (VSM) version 8.0.An importation implication of this paper is that the system is cheaper to maintain and more efficient in comparison with a manually operated type or key lock system. The RFID based access control system can be useful in providingsecurityforhomes, organizations, andautomobileterminalstoincreasethelevel of security. Keywords: Access control, Authorized, RFID, GSM, Microcontroller, Unauthorized. 3. CONCLUSION This paper review wide range of technologies involved in Security systems. As the technology is getting advanced features of security systems are also enhanced. It is highly efficient and accurate because it detects the RFID tags and if security system choose short cut then RFID reader reads an instruction given. Every technology discuss above has its own advantages and disadvantages and by using them we can design a more efficient security guard systems. REFERENCES [1] Diarah Reuben Samule,Ojongbede,H.A.Microcontroller Based Security System with Intruder Position in IOSR Journal of Electrical and Electronics Engineering (IOSR- JEEE). Volume 9, Issue 1 Ver. II, January 2014 [2] Sunita Dixit,Dr MD Yusuf Mulge. Security system in speech recognititon in International Journal ofScientific Development and Research(IJSDR). Vol3 August 2013. [3] Abhijt K. Shinde,Raghunath R.Harde,ChetanM.Gaikwad. RFID and GSM Based Campus Security system in International Journal of Innovation in Engineering and Technology . Vol.6, April 2015. [4] Peter Adole,Joseph M Mom,Gabril A Igwue.RFID Based security access control system in American Journl of Engineering Research.Volume-5,Issue-7,2016.