Submit Search
Upload
IRJET- RFID Based Security Guard System using GSM
•
1 like
•
25 views
IRJET Journal
Follow
https://www.irjet.net/archives/V5/i4/IRJET-V5I484.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 2
Download now
Download to read offline
Recommended
Intellectual Bank Locker Security System
Intellectual Bank Locker Security System
IJERA Editor
Adyar orange systems
Adyar orange systems
iftikharashakir
E-Passport Using RFID Tag and Finger Print Sensor
E-Passport Using RFID Tag and Finger Print Sensor
IJSRED
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET Journal
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET Journal
IRJET- Review on Advance Student Identity Card with GSM-GPS-RFID for Child Se...
IRJET- Review on Advance Student Identity Card with GSM-GPS-RFID for Child Se...
IRJET Journal
Gvm project report g95
Gvm project report g95
G0VIND G0URAV
Wireless e-passport using smart card technology
Wireless e-passport using smart card technology
IRJET Journal
Recommended
Intellectual Bank Locker Security System
Intellectual Bank Locker Security System
IJERA Editor
Adyar orange systems
Adyar orange systems
iftikharashakir
E-Passport Using RFID Tag and Finger Print Sensor
E-Passport Using RFID Tag and Finger Print Sensor
IJSRED
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET Journal
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET Journal
IRJET- Review on Advance Student Identity Card with GSM-GPS-RFID for Child Se...
IRJET- Review on Advance Student Identity Card with GSM-GPS-RFID for Child Se...
IRJET Journal
Gvm project report g95
Gvm project report g95
G0VIND G0URAV
Wireless e-passport using smart card technology
Wireless e-passport using smart card technology
IRJET Journal
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET Journal
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
IRJET Journal
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
inventionjournals
IRJET- IoT based Smart Voting System
IRJET- IoT based Smart Voting System
IRJET Journal
11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system
Alexander Decker
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
Alexander Decker
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET Journal
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET Journal
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensor
ijtsrd
Classroom locking-system (1)
Classroom locking-system (1)
Julyn Mae Pagmanoja
Sdfgh
Sdfgh
mirzapur
Design and implementation a security system for bank using voice recognition
Design and implementation a security system for bank using voice recognition
International Journal of Power Electronics and Drive Systems
IRJET - Dual Verification ATM for Blind People
IRJET - Dual Verification ATM for Blind People
IRJET Journal
Dolphin RFID Pvt. Ltd. Profile
Dolphin RFID Pvt. Ltd. Profile
nileshirathod
Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869
Editor IJARCET
20563-38910-2-PB.pdf
20563-38910-2-PB.pdf
IjictTeam
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET Journal
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...
IRJET Journal
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
IRJET Journal
Novel Tracking System to Enhance Child Prudent Using Face Recognition
Novel Tracking System to Enhance Child Prudent Using Face Recognition
Association of Scientists, Developers and Faculties
IRJET- EMR using RFID Technology
IRJET- EMR using RFID Technology
IRJET Journal
Implementation of IOT based Student Healthcare Monitoring and Automation Boot...
Implementation of IOT based Student Healthcare Monitoring and Automation Boot...
IRJET Journal
More Related Content
What's hot
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET Journal
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
IRJET Journal
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
inventionjournals
IRJET- IoT based Smart Voting System
IRJET- IoT based Smart Voting System
IRJET Journal
11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system
Alexander Decker
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
Alexander Decker
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET Journal
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET Journal
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensor
ijtsrd
Classroom locking-system (1)
Classroom locking-system (1)
Julyn Mae Pagmanoja
Sdfgh
Sdfgh
mirzapur
Design and implementation a security system for bank using voice recognition
Design and implementation a security system for bank using voice recognition
International Journal of Power Electronics and Drive Systems
IRJET - Dual Verification ATM for Blind People
IRJET - Dual Verification ATM for Blind People
IRJET Journal
Dolphin RFID Pvt. Ltd. Profile
Dolphin RFID Pvt. Ltd. Profile
nileshirathod
What's hot
(14)
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
IRJET- IoT based Smart Voting System
IRJET- IoT based Smart Voting System
11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensor
Classroom locking-system (1)
Classroom locking-system (1)
Sdfgh
Sdfgh
Design and implementation a security system for bank using voice recognition
Design and implementation a security system for bank using voice recognition
IRJET - Dual Verification ATM for Blind People
IRJET - Dual Verification ATM for Blind People
Dolphin RFID Pvt. Ltd. Profile
Dolphin RFID Pvt. Ltd. Profile
Similar to IRJET- RFID Based Security Guard System using GSM
Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869
Editor IJARCET
20563-38910-2-PB.pdf
20563-38910-2-PB.pdf
IjictTeam
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET Journal
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...
IRJET Journal
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
IRJET Journal
Novel Tracking System to Enhance Child Prudent Using Face Recognition
Novel Tracking System to Enhance Child Prudent Using Face Recognition
Association of Scientists, Developers and Faculties
IRJET- EMR using RFID Technology
IRJET- EMR using RFID Technology
IRJET Journal
Implementation of IOT based Student Healthcare Monitoring and Automation Boot...
Implementation of IOT based Student Healthcare Monitoring and Automation Boot...
IRJET Journal
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
IRJET Journal
IoT BASED ATTENDANCE MONITORING SYSTEM
IoT BASED ATTENDANCE MONITORING SYSTEM
IRJET Journal
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET Journal
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
IRJET Journal
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
IJCNCJournal
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
Alexander Decker
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
Alexander Decker
Intellectual Bank Locker Security System
Intellectual Bank Locker Security System
IJERA Editor
Secured e-payment system based on automated authentication data and iterated ...
Secured e-payment system based on automated authentication data and iterated ...
TELKOMNIKA JOURNAL
IRJET - Design of Student Security System using RFID Mechanism
IRJET - Design of Student Security System using RFID Mechanism
IRJET Journal
RFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINO
IJMTST Journal
AUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSOR
AUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSOR
IRJET Journal
Similar to IRJET- RFID Based Security Guard System using GSM
(20)
Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869
20563-38910-2-PB.pdf
20563-38910-2-PB.pdf
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Novel Tracking System to Enhance Child Prudent Using Face Recognition
Novel Tracking System to Enhance Child Prudent Using Face Recognition
IRJET- EMR using RFID Technology
IRJET- EMR using RFID Technology
Implementation of IOT based Student Healthcare Monitoring and Automation Boot...
Implementation of IOT based Student Healthcare Monitoring and Automation Boot...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
IoT BASED ATTENDANCE MONITORING SYSTEM
IoT BASED ATTENDANCE MONITORING SYSTEM
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
Intellectual Bank Locker Security System
Intellectual Bank Locker Security System
Secured e-payment system based on automated authentication data and iterated ...
Secured e-payment system based on automated authentication data and iterated ...
IRJET - Design of Student Security System using RFID Mechanism
IRJET - Design of Student Security System using RFID Mechanism
RFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINO
AUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSOR
AUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSOR
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
soniya singh
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
RajaP95
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
ranjana rawat
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
ranjana rawat
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Asutosh Ranjan
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
Recently uploaded
(20)
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
IRJET- RFID Based Security Guard System using GSM
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 404 RFID BASED SECURITY GUARD SYSTEM USING GSM Puja Baigane1, Adneya Wadetiwar2, Riya Pathak3, Suwarna Patil4, Deesha Meshram5, Prof. Bhushan Khangare6 12345 Student, Department of Electronics and Telecommunication Engineering, Jhulelal Institute of Technology, Nagpur, Maharashtra, India 6Assistant Professor, Department of Electronic and Telecommunication Engineering, Jhulelal Institute of Technology, Nagpur, Maharashtra, India ---------------------------------------------------------------------***-------------------------------------------------------------------- Abstract - This paper describes the different features and technologies present in RFID based security guard system using GSM by overviewing multiple research done over time. In today’s world, security is a very important part of technology. Presently, security isprovidedmanuallytovarious institutions, places etc. Because of this, we require human power. The old security system need to be replaced by automated one where system will work for guidance and detection of strangers using RFID tags. A GSM module will be attached on the project or Bluetooth connectivity can be used or Wi-Fi can be used. In this paper we are trying to review different technologies and is able to provide security to the campus, hospital, etc. Key Words: RFID, GSM, Wi-Fi, Bluetooth. 1. INTRODUCTION In Most educational institution’s administrators are concerned about campus security. Theconventional method allowing access to employee inside aneducational campusis by showing photo I-cards to security guard is very time consuming and insecure, hence inefficient. Radio Frequency Identification (RFID) based security system is one of the solutions to address this problem. This system can be used to allow access for student in school, college, and university. It also can be used to take attendanceforworkersinworking places. Its ability to uniquely identify each person based on .security access easier, faster and secure as compared to conventional method. Students or workers only need to place their ID card on the reader and they will be allowed to enter the campus. And if any invalid card is shown then the buzzer is turned on. The need to secure our home, industries and other related properties has been a subject of interest since the days of our fore fathers, Since then, an aggressive development in the area of security has exponentially been driven to today’s trend. A system cannot have high assurance if it has poor security and requirements . For high assurance, systems will logically include security requirement as well as availability, reliability and robustness requirements . The early-men, in their effort to provide security to their house-hold and properties, used crude measures such as stones, grasses and crude weapons to secure themselves. As the intrusion techniques by intruders outgrows the then security measures and more values added to lives and properties, ore sophisticated measures were developed to ensure an intruder proof environment, which today, has become one of the most interesting aspect of individual, National and even international concern. 2. LITERATURE SURVEY 2.1 MicrocontrollerBasedSecuritySystemwithIntruder Position (January2014) Diarah Reuben Samule,Ojongbede,H.A This paper proposes microcontrollerBasedSecurity System with Intruder Position Display is a design that applies automated security systeminhomes,Industries,militaryetc. The project will feature a system that will track thepresence of an intruder in restricted area and also inform the user about the position of the intruder. This Project will be based on microcontrollerandother electronicdesigntoachieve the above stated purposes. The interfacing medium will make use of parallel port. The sensors (Light Dependent Resistor and LEDS) will receive the signal when the intruder is around while the control program will translatethereceived signal from the sensors to useful information about the function of the system. In this project they have implored the use of bothhardware and software to bring about theentireproject.Thehardware components are solely coordinated by the AT89S51 microcontroller chip while the C programming language is used to program the chip. 2.2 Security System in Speech Recognition (August 2014) Sunita Dixit, Dr. MD Yusuf Mulge This paper describes that speaker recognition is one of the effectively used biometric authentication system that actually identify the speaker on the basis of vocal characteristics. The speaker identification depends on different voice features such as the intensity analysis, voice pitch analysis, voice feature extraction etc. This recognition process is also affected from different factors such as the background noise, instrumentation noise etc. In this paper, noise effective approach is suggested to define an effective speaker recognition process. The robustness of the recognition system is improved with the definition of an integrated layered model. Keywords: Speech Enhancement, Spectral Subtraction, LPC, HMM, ANN. Speech is the most sophisticated signal naturally produced by humans. The
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 405 speech signal carries linguistic information for sharing of information and ideas. It allows people to express emotions and verbally share feelings. It is the most fundamental form of communication among humans. The aim of digital speech processing is to take advantage of digital computing techniques to process the speech signal for increased understanding, improved communication, and increased efficiency and productivity associatedwithspeechactivities. The field of speech processing includes speech analysis and representation, speech coding, speech synthesis, speech recognition and understanding, speaker verification, and speech enhancement. 2.3 RFID and GSM Based Campus Security System (April2015) Abhijit K. Shinde, Raghunath R.Harade,Chetan M.Gaikwad. This paper represents the RFID and GSM technology. The main objective of the system is to uniquely identify and to make security for a person. This requires a unique product, which has the capability of distinguishing different person. This is possible by the new emerging technology RFID (Radio Frequency Identification). The main parts of an RFID system are RFID tag (with unique ID number) and RFID reader (for reading the RFID tag). In this system, RFID tag and RFID reader used are operating at 125 KHz. The microcontroller internal memory is used for storing the details. KEYWORDS: RFID Tag, RFID Card Reader, GSM, DDRAM, EPC Tags. Most educational institutions' administrators are concerned about campus security. The conventional method allowing access to employee inside an educational campus is by showing photo I-cards to security guard is very time consumingandinsecure,henceinefficient. Radio FrequencyIdentification(RFID)basedsecuritysystem is one of the solutions to address this problem. This system can be used to allow access for student inschool,college,and university. It also can be used to takeattendanceforworkers in working places. Its ability to uniquelyidentify eachperson based on .security access easier, faster and secure as compared to conventional method.Studentsorworkersonly need to place their ID card on the reader and they will be allowed to enter the campus. And if any invalid card is shown then the buzzer is turned on. 2.4 RFID Based Security AccessControl SystemwithGSM Technology (2016) Peter Adole, Joseph M. Mom and Gabriel A. Igwue This paper describes the various security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available securitypersonnel.Varioustechnologieswereused in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technologypresentedinthiswork helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly through the use of a Radio Frequency Identification System with operating frequency of 125 KHz, Microcontroller programmed to sendcontrol signals,DCmotor,relay,buzzer, Liquid Crystal Display (LCD) and GSM/GPRS Modem. Once the RFID tag which contains the user’s unique information is scan by the RFID reader and confirmed match with the information stored in the microcontroller, the microcontroller is instructed to turn ON the DC motor through L293D driver, display “USER NUMBER and CARD NUMBER” on the LCD and activates the GSM/GPRS modem to send SMS alert “AUTHORIZED, valid RFID card shown, User is allowed to enter, user number”tosecuritypersonnel. Else, the DC Motor remained OFF, LCD displays “READ RFID CARD NOT VALID”, buzzer turns ON for about 5seconds and GSM/GPRS modem activated to send “ UNAUTHORIZED, invalid RFID card is used to access the security system” to the security personnel. The electronic circuit was implemented, the codes for microcontroller were written in assembly language, debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with theaidofa universal programmer. Hardware simulation was carried out using the Proteus Virtual System Modelling (VSM) version 8.0.An importation implication of this paper is that the system is cheaper to maintain and more efficient in comparison with a manually operated type or key lock system. The RFID based access control system can be useful in providingsecurityforhomes, organizations, andautomobileterminalstoincreasethelevel of security. Keywords: Access control, Authorized, RFID, GSM, Microcontroller, Unauthorized. 3. CONCLUSION This paper review wide range of technologies involved in Security systems. As the technology is getting advanced features of security systems are also enhanced. It is highly efficient and accurate because it detects the RFID tags and if security system choose short cut then RFID reader reads an instruction given. Every technology discuss above has its own advantages and disadvantages and by using them we can design a more efficient security guard systems. REFERENCES [1] Diarah Reuben Samule,Ojongbede,H.A.Microcontroller Based Security System with Intruder Position in IOSR Journal of Electrical and Electronics Engineering (IOSR- JEEE). Volume 9, Issue 1 Ver. II, January 2014 [2] Sunita Dixit,Dr MD Yusuf Mulge. Security system in speech recognititon in International Journal ofScientific Development and Research(IJSDR). Vol3 August 2013. [3] Abhijt K. Shinde,Raghunath R.Harde,ChetanM.Gaikwad. RFID and GSM Based Campus Security system in International Journal of Innovation in Engineering and Technology . Vol.6, April 2015. [4] Peter Adole,Joseph M Mom,Gabril A Igwue.RFID Based security access control system in American Journl of Engineering Research.Volume-5,Issue-7,2016.
Download now