DOMESTIC INTRUDER SYSTEM

Journal Title: Indian Journal of Computer Science and Engineering - Year 2011, Vol 2, Issue 4

Abstract

Throughout history, humans have sought to protect their life, property and possessions. In early societies, guards, watchdogs, traps and even noisemakers provided security. Fire was used to baffle wild animals and keep them at bay. As centuries passed and human accomplishments became more noteworthy, some rather engaging and sophisticated devices were developed to insure man's security. But until the discovery and harnessing of electricity, no device or protection scheme could be expected to provide any real degree of assurance or consistent peace of mind. Now when everything is available to us why not design something that provide us complete security .The very basic of this started with the simple alarm system and today it include capturing image , notifying suspicious activities etc.Commercially available Security systems are too expensive to be used by common population. We are trying to present a security system that provides all the facilities needed for security like activation of an alarm, capturing an image of intruder, along with sms and email notification at a very low cost.

Authors and Affiliations

B. Persis Urbana Ivy , G. Gaurav Modi

Keywords

Related Articles

TEST SUITE GENERATION PROCESS FOR AGENT TESTING

Software agents are a promising technology for today's complex, distributed systems. Methodologies and techniques that address testing and reliability of multi agent systems are increasingly demanded, in particular to su...

DOMESTIC INTRUDER SYSTEM

Throughout history, humans have sought to protect their life, property and possessions. In early societies, guards, watchdogs, traps and even noisemakers provided security. Fire was used to baffle wild animals and keep t...

IMPROVING THE SOFTWARE ARCHITECTURE THROUGH FUZZY CLUSTERING TECHNIQUE.

Software Architecture Recovery is one of the finest parts of reverse engineering. Several different techniques have been adopted in vast literature to recover Software Architecture. One of the techniques is clustering, w...

COMPARISON OF PURITY AND ENTROPY OF K-MEANS CLUSTERING AND FUZZY C MEANS CLUSTERING

Clustering is one the main area in data mining literature. There are various algorithms for clustering. The evaluation of the performance is done by validation measures. The external validation measures are used to measu...

SRI RAMSHALAKA: A VEDIC METHOD OF TEXT ENCRYPTION AND DECRYPTION

This paper investigates usability of SriRamshalakha, a vedic tool used in Indian Astrology, in the encryption and decryption of plain English text. Sri Ram Shalaka appears in Sri RamChartmanas, one of the very popular sa...

Download PDF file
  • EP ID EP92201
  • DOI -
  • Views 164
  • Downloads 0

How To Cite

B. Persis Urbana Ivy, G. Gaurav Modi (2011). DOMESTIC INTRUDER SYSTEM. Indian Journal of Computer Science and Engineering, 2(4), 506-515. https://europub.co.uk./articles/-A-92201