DOMESTIC INTRUDER SYSTEM
Journal Title: Indian Journal of Computer Science and Engineering - Year 2011, Vol 2, Issue 4
Abstract
Throughout history, humans have sought to protect their life, property and possessions. In early societies, guards, watchdogs, traps and even noisemakers provided security. Fire was used to baffle wild animals and keep them at bay. As centuries passed and human accomplishments became more noteworthy, some rather engaging and sophisticated devices were developed to insure man's security. But until the discovery and harnessing of electricity, no device or protection scheme could be expected to provide any real degree of assurance or consistent peace of mind. Now when everything is available to us why not design something that provide us complete security .The very basic of this started with the simple alarm system and today it include capturing image , notifying suspicious activities etc.Commercially available Security systems are too expensive to be used by common population. We are trying to present a security system that provides all the facilities needed for security like activation of an alarm, capturing an image of intruder, along with sms and email notification at a very low cost.
Authors and Affiliations
B. Persis Urbana Ivy , G. Gaurav Modi
TEST SUITE GENERATION PROCESS FOR AGENT TESTING
Software agents are a promising technology for today's complex, distributed systems. Methodologies and techniques that address testing and reliability of multi agent systems are increasingly demanded, in particular to su...
DOMESTIC INTRUDER SYSTEM
Throughout history, humans have sought to protect their life, property and possessions. In early societies, guards, watchdogs, traps and even noisemakers provided security. Fire was used to baffle wild animals and keep t...
IMPROVING THE SOFTWARE ARCHITECTURE THROUGH FUZZY CLUSTERING TECHNIQUE.
Software Architecture Recovery is one of the finest parts of reverse engineering. Several different techniques have been adopted in vast literature to recover Software Architecture. One of the techniques is clustering, w...
COMPARISON OF PURITY AND ENTROPY OF K-MEANS CLUSTERING AND FUZZY C MEANS CLUSTERING
Clustering is one the main area in data mining literature. There are various algorithms for clustering. The evaluation of the performance is done by validation measures. The external validation measures are used to measu...
SRI RAMSHALAKA: A VEDIC METHOD OF TEXT ENCRYPTION AND DECRYPTION
This paper investigates usability of SriRamshalakha, a vedic tool used in Indian Astrology, in the encryption and decryption of plain English text. Sri Ram Shalaka appears in Sri RamChartmanas, one of the very popular sa...