SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 859
SMART MACHINE SYSTEM FOR VIRTUALLY IMPAIRED PEOPLE
J. Deepika1, A. Babika2, S. Saraswathi3
1,2Student, Dept. of Computer Science Engineering, Panimalar Engineering College, Chennai, TN.
3Assistant Professor, Dept. of Computer Science Engineering, Panimalar Engineering College, Chennai, TN, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – The authentication process will be done to
unlock the magnetic door using face detection algorithm. The
two algorithm used are LBP, HAAR cascade algorithm. If the
face is unmatched then the image of the unauthorized person
will be sent to a mail. After entering, all the home appliances
will be controlled by his/her voice command. Also he/she can
manage the magnetic door (lock /unlock) using the button. If
there is any abnormalities like increase in temperature and
pressure the buzzer will make an alert sound.
Key Words: Face detection, Alert mail, Voice recognition,
Buzzer, Sensor.
1. INTRODUCTION
This system covers the need for blind people, they are facing
more problems and difficultiesin their daily routineandthis
system will give the solution relatively based on security
management system.
1.1 Face Authentication
In this system if there is any motion in front of the sensor it
will turn on the camera. The camera will immediately start
capturing the image. In smart machine system we have
already saved the recognized image of theauthorizedperson
in system data base. The capturing image will be compared
with the image that is present in the database.
If the image got matched then the door will be opened
automatically or else the captured imageoftheunauthorized
person will be sent to the guardian’s mail id. Additionallythe
authorized person can operate magnetic lock that is the
person can lock and unlock the door while he/she is inside
the home by using the button.
1.2 Device Control
After the successful completion of face authentication
process the person will enter into the home. Nowhe/shecan
operate home appliances by the voice command. Once the
voice command is recognized by the system, thenthesystem
will stimulates the relay and perform the operation(on/off)
voice command.
1.3 Sound Alert
If there any abnormalities like increase in temperature and
pressure, the buzzer will make an alert sound. The range of
the temperature and the pressure will be fixed as per our
convenience.
2. PROPOSED SYSTEM
In this proposed method face recognition based home
security and also monitoring system using ARM11
Processor. ThisProject implement to all thehomemembers
face image are stored in database, so easily identify the
authorized user or not in the system. And also sensors are
used to monitor the home status. If any unknown person is
detected, the unknown person image is send to the mail.
3. ARCHITECTURE DIAGRAM
This system implemented in the smart home security using
ARM11 processor . PIR sensor is used to any motion is
detected camera and microphone is enabled to the
microprocessor. At the same time camera is detecting the
face and recognize the face is authorized or not if the face is
not authenticated suddenly capture the picture and send to
the mail. If anyone is authorized door is unlocked. At the
same time sensors will monitor temperatureandpressure,if
the temperature or pressure increases the alarm will
producesalert sound. Microphone isusedtocontrolthevoice
command. The relay will manage the appliances (on/off).
4. HARDWARE REQUIREMENTS
4.1 Raspberry pi
Raspberry pi is a credit card sized computer and is to create
a low cost device thatwouldimproveprogrammingskillsand
hardware understanding at the pre-university level. Credit
card sized computer that plug in to TV and standard pc
keyboard. It cost between $5 and $35. It is available
anywhere inthe world, and can function asa properdesktop
computer or be used to build smart devices.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 860
4.2 Web Camera
Webcam is a video camera that can capture images
continuously. The image capturing processcan be viewed in
the monitor. The captured image can be stored in thesystem
and used for future use like sending image, comparingimage
and so on.
4.3 Microphone
It is used to get the voice command. It is a transducer. It will
convert the sound waves into electrical signal which is used
in many applications liketelephone, soundrecording,speech
recognition ect.,
4.4 PIR Sensor
PIR stands for passiveinfrared sensor. Itis electronic sensor.
It is used to detect human beings within the range. It ranges
from5m to12m. It candetectthehuman being around itand
produce the output. PIRwill be triggered by themotions. It’s
output can be used in many applications like door opening,
smart homes, VCDs, DVD players, ect.,
4.4 MCP3008
EMCP3008 is an ADC, which is analog to digital converter. It
has 10 bit 8-channel analog to digital converter (ADC). It is
easy to connect and cost efficient. It will not need any
additional components. It uses SPI bus protocol which is
supported by pi’s GPIO header.
5. SOFTWARE REQUIREMENTS
5.1 LBP Algorithm
LBP stands for Local Binary Pattern. The LBP input image is
converted into gray scale image, we are going to apply the
threshold value to the gray scale image and then it will be
converted in to binary image. This is the process of LBP
algorithm. The LBP operator can be seen as approach like
statistical and structural models to identify the texture
analysis and it is used in various applications. The most
important of LBP operator is perhaps in real world
application, Example illumination variations. Another
important property is computational simplicity, which
possible to analyze images in challenging real time settings.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 861
5.2 HAAR cascade Algorithm
HAAR cascade algorithm is a face detectionmethod,todetect
the face intheimage. This algorithmconsistsoffourmethods.
They are knowledge-based method, feature-invariant
method, template matching method and appearance based
method.
1. Knowledge-based method: It is also a rule-based method
that encodes our knowledge of human faces using different
rules.
2. Feature- invariant method:This algorithmtofindinvariant
feature of a face despite its angle or position.
3. Template matching method: This algorithm compares the
input image with stored pattern of face or features.
4. Appearance based method: A template matching method
whose pattern databases learning from a set of the images.
6. CONCLUSION
Though this system is significantly useful for blind people, it
has its own limitations. The command should be very clear
else the system will get confused and the operation will be
failed or command may be mismatched. On scanning face
some time mismatch can takesplace. HenceirisScanningcan
be done for more efficient output. In future the enhanced
voice recognition and more efficient iris scan willbeusedfor
the greater performance of the systems.
REFERENCES
[1] Rajmane Sunita Ramesh and Dr.A.Karwankar, “Voice
enabled device control using ARM processor,”
International Journal of Engineering Trends and
Technology (IJETT),vol.4, Dec. 2015, ISSN. 2277-9655.
[2] Ms.Jaya, M.Jadhav, Ms.Deipali, V.Gore, “Introducing
Celebrities in an Images Using HAAR Cascade
Algorithm,” vol.3, August 2013, ISSN.2277 128X.
[3] Port S A Jain, Stevan Maineka, Pranali Nimgade,
“Application of IOT-WSN in home automation system,”
vol.3, Jan. 2016, ISSN.2348-6953.
[4] Sheena S, Sheena Mathew, “A Study of Multimodal
Biometric System,” IJRET, vol.3, Dec. 2014.
[5] Marek Novak, Frantisek Jakab, and Luis Lain, “Anomaly
Detection in User Daily Patterns in Smart-Home
Environment,” JSHI, vol.3, June 2013.
[6] Kiran S Hosur, Chandrika C N, “A Cloud based Security
management scheme for Home Area Network(HAN) in
the Smart Grid,” IJCSCN, vol.6(2), April-May 2016,
ISSN.2249-5789.

Weitere ähnliche Inhalte

Was ist angesagt?

IRJET- Offline Location Detection and Accident Indication using Mobile Sensors
IRJET- Offline Location Detection and Accident Indication using Mobile SensorsIRJET- Offline Location Detection and Accident Indication using Mobile Sensors
IRJET- Offline Location Detection and Accident Indication using Mobile SensorsIRJET Journal
 
Design of Self-Learning System for Diagnosing Health Parameters using ANFIS
Design of Self-Learning System for Diagnosing Health Parameters using ANFISDesign of Self-Learning System for Diagnosing Health Parameters using ANFIS
Design of Self-Learning System for Diagnosing Health Parameters using ANFISIRJET Journal
 
IRJET- Home Automation System for Disable People using Bluetooth Technology a...
IRJET- Home Automation System for Disable People using Bluetooth Technology a...IRJET- Home Automation System for Disable People using Bluetooth Technology a...
IRJET- Home Automation System for Disable People using Bluetooth Technology a...IRJET Journal
 
IRJET- EVM Monitoring and Security over IoT
IRJET- EVM Monitoring and Security over IoTIRJET- EVM Monitoring and Security over IoT
IRJET- EVM Monitoring and Security over IoTIRJET Journal
 
Biometric Identification using Opencv Based on Arduino
Biometric Identification using Opencv Based on ArduinoBiometric Identification using Opencv Based on Arduino
Biometric Identification using Opencv Based on ArduinoIRJET Journal
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET Journal
 
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural AnalyticsIRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural AnalyticsIRJET Journal
 
IRJET - Smart Yoga Instructor
IRJET - Smart Yoga InstructorIRJET - Smart Yoga Instructor
IRJET - Smart Yoga InstructorIRJET Journal
 
IRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password AuthenticationIRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password AuthenticationIRJET Journal
 
Home Security System and Door Access Control Based on Face Recognition
Home Security System and Door Access Control Based on Face RecognitionHome Security System and Door Access Control Based on Face Recognition
Home Security System and Door Access Control Based on Face RecognitionIRJET Journal
 
IRJET- Automatic Door Monitoring System
IRJET-  	  Automatic Door Monitoring SystemIRJET-  	  Automatic Door Monitoring System
IRJET- Automatic Door Monitoring SystemIRJET Journal
 
IRJET- Survey on EEG Based Brainwave Controlled Home Automation
IRJET-  	  Survey on EEG Based Brainwave Controlled Home AutomationIRJET-  	  Survey on EEG Based Brainwave Controlled Home Automation
IRJET- Survey on EEG Based Brainwave Controlled Home AutomationIRJET Journal
 
IRJET - Gesture Controlled Home Automation using CNN
IRJET -  	  Gesture Controlled Home Automation using CNNIRJET -  	  Gesture Controlled Home Automation using CNN
IRJET - Gesture Controlled Home Automation using CNNIRJET Journal
 
IRJET- Automatic Recognition using Heartbeat Authentication
IRJET- Automatic Recognition using Heartbeat AuthenticationIRJET- Automatic Recognition using Heartbeat Authentication
IRJET- Automatic Recognition using Heartbeat AuthenticationIRJET Journal
 
IRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET Journal
 
Office communication system using rf abstract
Office communication system using rf abstractOffice communication system using rf abstract
Office communication system using rf abstractDikshya Rath
 
Final report on gui based device control using matlab
Final  report  on  gui based device control using matlabFinal  report  on  gui based device control using matlab
Final report on gui based device control using matlabPalak Sinha
 
Security by user through application to lock/unlock machine by face detection
Security by user through application to lock/unlock machine by face detectionSecurity by user through application to lock/unlock machine by face detection
Security by user through application to lock/unlock machine by face detectionIRJET Journal
 

Was ist angesagt? (20)

Irjet v7 i4693
Irjet v7 i4693Irjet v7 i4693
Irjet v7 i4693
 
IRJET- Offline Location Detection and Accident Indication using Mobile Sensors
IRJET- Offline Location Detection and Accident Indication using Mobile SensorsIRJET- Offline Location Detection and Accident Indication using Mobile Sensors
IRJET- Offline Location Detection and Accident Indication using Mobile Sensors
 
Design of Self-Learning System for Diagnosing Health Parameters using ANFIS
Design of Self-Learning System for Diagnosing Health Parameters using ANFISDesign of Self-Learning System for Diagnosing Health Parameters using ANFIS
Design of Self-Learning System for Diagnosing Health Parameters using ANFIS
 
IRJET- Home Automation System for Disable People using Bluetooth Technology a...
IRJET- Home Automation System for Disable People using Bluetooth Technology a...IRJET- Home Automation System for Disable People using Bluetooth Technology a...
IRJET- Home Automation System for Disable People using Bluetooth Technology a...
 
IRJET- EVM Monitoring and Security over IoT
IRJET- EVM Monitoring and Security over IoTIRJET- EVM Monitoring and Security over IoT
IRJET- EVM Monitoring and Security over IoT
 
Biometric Identification using Opencv Based on Arduino
Biometric Identification using Opencv Based on ArduinoBiometric Identification using Opencv Based on Arduino
Biometric Identification using Opencv Based on Arduino
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless Biometric
 
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural AnalyticsIRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural Analytics
 
IRJET - Smart Yoga Instructor
IRJET - Smart Yoga InstructorIRJET - Smart Yoga Instructor
IRJET - Smart Yoga Instructor
 
Sri
SriSri
Sri
 
IRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password AuthenticationIRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password Authentication
 
Home Security System and Door Access Control Based on Face Recognition
Home Security System and Door Access Control Based on Face RecognitionHome Security System and Door Access Control Based on Face Recognition
Home Security System and Door Access Control Based on Face Recognition
 
IRJET- Automatic Door Monitoring System
IRJET-  	  Automatic Door Monitoring SystemIRJET-  	  Automatic Door Monitoring System
IRJET- Automatic Door Monitoring System
 
IRJET- Survey on EEG Based Brainwave Controlled Home Automation
IRJET-  	  Survey on EEG Based Brainwave Controlled Home AutomationIRJET-  	  Survey on EEG Based Brainwave Controlled Home Automation
IRJET- Survey on EEG Based Brainwave Controlled Home Automation
 
IRJET - Gesture Controlled Home Automation using CNN
IRJET -  	  Gesture Controlled Home Automation using CNNIRJET -  	  Gesture Controlled Home Automation using CNN
IRJET - Gesture Controlled Home Automation using CNN
 
IRJET- Automatic Recognition using Heartbeat Authentication
IRJET- Automatic Recognition using Heartbeat AuthenticationIRJET- Automatic Recognition using Heartbeat Authentication
IRJET- Automatic Recognition using Heartbeat Authentication
 
IRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFID
 
Office communication system using rf abstract
Office communication system using rf abstractOffice communication system using rf abstract
Office communication system using rf abstract
 
Final report on gui based device control using matlab
Final  report  on  gui based device control using matlabFinal  report  on  gui based device control using matlab
Final report on gui based device control using matlab
 
Security by user through application to lock/unlock machine by face detection
Security by user through application to lock/unlock machine by face detectionSecurity by user through application to lock/unlock machine by face detection
Security by user through application to lock/unlock machine by face detection
 

Ähnlich wie IRJET- Smart Machine System for Virtually Impaired People

Smart Home for Senior Citizens
Smart Home for Senior CitizensSmart Home for Senior Citizens
Smart Home for Senior CitizensIRJET Journal
 
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemIRJET Journal
 
IRJET - Smart Doorbell System
 IRJET - Smart Doorbell System IRJET - Smart Doorbell System
IRJET - Smart Doorbell SystemIRJET Journal
 
Home Automation System using Raspberry Pi
Home Automation System using Raspberry PiHome Automation System using Raspberry Pi
Home Automation System using Raspberry PiIRJET Journal
 
Classroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-PiClassroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-PiIRJET Journal
 
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET Journal
 
Comparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi TechnologyComparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi TechnologyIRJET Journal
 
Secured Spy for Highly Secured Areas
Secured Spy for Highly Secured AreasSecured Spy for Highly Secured Areas
Secured Spy for Highly Secured AreasIRJET Journal
 
IRJET- Voice Based Home Automation System using Raspberry Pi
IRJET-  	  Voice Based Home Automation System using Raspberry PiIRJET-  	  Voice Based Home Automation System using Raspberry Pi
IRJET- Voice Based Home Automation System using Raspberry PiIRJET Journal
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IRJET Journal
 
IRJET- Improvising Reliability of Autonomous Car using Risk Detection
IRJET-  	  Improvising Reliability of Autonomous Car using Risk DetectionIRJET-  	  Improvising Reliability of Autonomous Car using Risk Detection
IRJET- Improvising Reliability of Autonomous Car using Risk DetectionIRJET Journal
 
IRJET- Survey on Face-Recognition and Emotion Detection
IRJET- Survey on Face-Recognition and Emotion DetectionIRJET- Survey on Face-Recognition and Emotion Detection
IRJET- Survey on Face-Recognition and Emotion DetectionIRJET Journal
 
Implementation of vision based intelligent home security system using ARM7
Implementation of vision based intelligent home security system using ARM7Implementation of vision based intelligent home security system using ARM7
Implementation of vision based intelligent home security system using ARM7IRJET Journal
 
IRJET- Smart Switch Board Compatible with Google Assistance along with Fa...
IRJET-  	  Smart Switch Board Compatible with Google Assistance along with Fa...IRJET-  	  Smart Switch Board Compatible with Google Assistance along with Fa...
IRJET- Smart Switch Board Compatible with Google Assistance along with Fa...IRJET Journal
 
IRJET - Face Detection and Recognition System
IRJET -  	  Face Detection and Recognition SystemIRJET -  	  Face Detection and Recognition System
IRJET - Face Detection and Recognition SystemIRJET Journal
 
SMART MEDIA PLAYER USING AI
SMART MEDIA PLAYER USING AISMART MEDIA PLAYER USING AI
SMART MEDIA PLAYER USING AIIRJET Journal
 
IRJET- IoT and ML based Smart TV for Child Eyes Safety
IRJET-  	  IoT and ML based Smart TV for Child Eyes SafetyIRJET-  	  IoT and ML based Smart TV for Child Eyes Safety
IRJET- IoT and ML based Smart TV for Child Eyes SafetyIRJET Journal
 
IRJET-An Automatic Fire Detection and Warning System under Home Video Surveil...
IRJET-An Automatic Fire Detection and Warning System under Home Video Surveil...IRJET-An Automatic Fire Detection and Warning System under Home Video Surveil...
IRJET-An Automatic Fire Detection and Warning System under Home Video Surveil...IRJET Journal
 
IRJET - IoT based Anti Theft Detection and Alerting System using Raspberry Pi
IRJET - IoT based Anti Theft Detection and Alerting System using Raspberry PiIRJET - IoT based Anti Theft Detection and Alerting System using Raspberry Pi
IRJET - IoT based Anti Theft Detection and Alerting System using Raspberry PiIRJET Journal
 
IRJET- Energy Conservation and Digital Security Notice Board for Smart Class ...
IRJET- Energy Conservation and Digital Security Notice Board for Smart Class ...IRJET- Energy Conservation and Digital Security Notice Board for Smart Class ...
IRJET- Energy Conservation and Digital Security Notice Board for Smart Class ...IRJET Journal
 

Ähnlich wie IRJET- Smart Machine System for Virtually Impaired People (20)

Smart Home for Senior Citizens
Smart Home for Senior CitizensSmart Home for Senior Citizens
Smart Home for Senior Citizens
 
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
 
IRJET - Smart Doorbell System
 IRJET - Smart Doorbell System IRJET - Smart Doorbell System
IRJET - Smart Doorbell System
 
Home Automation System using Raspberry Pi
Home Automation System using Raspberry PiHome Automation System using Raspberry Pi
Home Automation System using Raspberry Pi
 
Classroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-PiClassroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-Pi
 
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
 
Comparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi TechnologyComparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi Technology
 
Secured Spy for Highly Secured Areas
Secured Spy for Highly Secured AreasSecured Spy for Highly Secured Areas
Secured Spy for Highly Secured Areas
 
IRJET- Voice Based Home Automation System using Raspberry Pi
IRJET-  	  Voice Based Home Automation System using Raspberry PiIRJET-  	  Voice Based Home Automation System using Raspberry Pi
IRJET- Voice Based Home Automation System using Raspberry Pi
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
 
IRJET- Improvising Reliability of Autonomous Car using Risk Detection
IRJET-  	  Improvising Reliability of Autonomous Car using Risk DetectionIRJET-  	  Improvising Reliability of Autonomous Car using Risk Detection
IRJET- Improvising Reliability of Autonomous Car using Risk Detection
 
IRJET- Survey on Face-Recognition and Emotion Detection
IRJET- Survey on Face-Recognition and Emotion DetectionIRJET- Survey on Face-Recognition and Emotion Detection
IRJET- Survey on Face-Recognition and Emotion Detection
 
Implementation of vision based intelligent home security system using ARM7
Implementation of vision based intelligent home security system using ARM7Implementation of vision based intelligent home security system using ARM7
Implementation of vision based intelligent home security system using ARM7
 
IRJET- Smart Switch Board Compatible with Google Assistance along with Fa...
IRJET-  	  Smart Switch Board Compatible with Google Assistance along with Fa...IRJET-  	  Smart Switch Board Compatible with Google Assistance along with Fa...
IRJET- Smart Switch Board Compatible with Google Assistance along with Fa...
 
IRJET - Face Detection and Recognition System
IRJET -  	  Face Detection and Recognition SystemIRJET -  	  Face Detection and Recognition System
IRJET - Face Detection and Recognition System
 
SMART MEDIA PLAYER USING AI
SMART MEDIA PLAYER USING AISMART MEDIA PLAYER USING AI
SMART MEDIA PLAYER USING AI
 
IRJET- IoT and ML based Smart TV for Child Eyes Safety
IRJET-  	  IoT and ML based Smart TV for Child Eyes SafetyIRJET-  	  IoT and ML based Smart TV for Child Eyes Safety
IRJET- IoT and ML based Smart TV for Child Eyes Safety
 
IRJET-An Automatic Fire Detection and Warning System under Home Video Surveil...
IRJET-An Automatic Fire Detection and Warning System under Home Video Surveil...IRJET-An Automatic Fire Detection and Warning System under Home Video Surveil...
IRJET-An Automatic Fire Detection and Warning System under Home Video Surveil...
 
IRJET - IoT based Anti Theft Detection and Alerting System using Raspberry Pi
IRJET - IoT based Anti Theft Detection and Alerting System using Raspberry PiIRJET - IoT based Anti Theft Detection and Alerting System using Raspberry Pi
IRJET - IoT based Anti Theft Detection and Alerting System using Raspberry Pi
 
IRJET- Energy Conservation and Digital Security Notice Board for Smart Class ...
IRJET- Energy Conservation and Digital Security Notice Board for Smart Class ...IRJET- Energy Conservation and Digital Security Notice Board for Smart Class ...
IRJET- Energy Conservation and Digital Security Notice Board for Smart Class ...
 

Mehr von IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Kürzlich hochgeladen

Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Kürzlich hochgeladen (20)

Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 

IRJET- Smart Machine System for Virtually Impaired People

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 859 SMART MACHINE SYSTEM FOR VIRTUALLY IMPAIRED PEOPLE J. Deepika1, A. Babika2, S. Saraswathi3 1,2Student, Dept. of Computer Science Engineering, Panimalar Engineering College, Chennai, TN. 3Assistant Professor, Dept. of Computer Science Engineering, Panimalar Engineering College, Chennai, TN, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – The authentication process will be done to unlock the magnetic door using face detection algorithm. The two algorithm used are LBP, HAAR cascade algorithm. If the face is unmatched then the image of the unauthorized person will be sent to a mail. After entering, all the home appliances will be controlled by his/her voice command. Also he/she can manage the magnetic door (lock /unlock) using the button. If there is any abnormalities like increase in temperature and pressure the buzzer will make an alert sound. Key Words: Face detection, Alert mail, Voice recognition, Buzzer, Sensor. 1. INTRODUCTION This system covers the need for blind people, they are facing more problems and difficultiesin their daily routineandthis system will give the solution relatively based on security management system. 1.1 Face Authentication In this system if there is any motion in front of the sensor it will turn on the camera. The camera will immediately start capturing the image. In smart machine system we have already saved the recognized image of theauthorizedperson in system data base. The capturing image will be compared with the image that is present in the database. If the image got matched then the door will be opened automatically or else the captured imageoftheunauthorized person will be sent to the guardian’s mail id. Additionallythe authorized person can operate magnetic lock that is the person can lock and unlock the door while he/she is inside the home by using the button. 1.2 Device Control After the successful completion of face authentication process the person will enter into the home. Nowhe/shecan operate home appliances by the voice command. Once the voice command is recognized by the system, thenthesystem will stimulates the relay and perform the operation(on/off) voice command. 1.3 Sound Alert If there any abnormalities like increase in temperature and pressure, the buzzer will make an alert sound. The range of the temperature and the pressure will be fixed as per our convenience. 2. PROPOSED SYSTEM In this proposed method face recognition based home security and also monitoring system using ARM11 Processor. ThisProject implement to all thehomemembers face image are stored in database, so easily identify the authorized user or not in the system. And also sensors are used to monitor the home status. If any unknown person is detected, the unknown person image is send to the mail. 3. ARCHITECTURE DIAGRAM This system implemented in the smart home security using ARM11 processor . PIR sensor is used to any motion is detected camera and microphone is enabled to the microprocessor. At the same time camera is detecting the face and recognize the face is authorized or not if the face is not authenticated suddenly capture the picture and send to the mail. If anyone is authorized door is unlocked. At the same time sensors will monitor temperatureandpressure,if the temperature or pressure increases the alarm will producesalert sound. Microphone isusedtocontrolthevoice command. The relay will manage the appliances (on/off). 4. HARDWARE REQUIREMENTS 4.1 Raspberry pi Raspberry pi is a credit card sized computer and is to create a low cost device thatwouldimproveprogrammingskillsand hardware understanding at the pre-university level. Credit card sized computer that plug in to TV and standard pc keyboard. It cost between $5 and $35. It is available anywhere inthe world, and can function asa properdesktop computer or be used to build smart devices.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 860 4.2 Web Camera Webcam is a video camera that can capture images continuously. The image capturing processcan be viewed in the monitor. The captured image can be stored in thesystem and used for future use like sending image, comparingimage and so on. 4.3 Microphone It is used to get the voice command. It is a transducer. It will convert the sound waves into electrical signal which is used in many applications liketelephone, soundrecording,speech recognition ect., 4.4 PIR Sensor PIR stands for passiveinfrared sensor. Itis electronic sensor. It is used to detect human beings within the range. It ranges from5m to12m. It candetectthehuman being around itand produce the output. PIRwill be triggered by themotions. It’s output can be used in many applications like door opening, smart homes, VCDs, DVD players, ect., 4.4 MCP3008 EMCP3008 is an ADC, which is analog to digital converter. It has 10 bit 8-channel analog to digital converter (ADC). It is easy to connect and cost efficient. It will not need any additional components. It uses SPI bus protocol which is supported by pi’s GPIO header. 5. SOFTWARE REQUIREMENTS 5.1 LBP Algorithm LBP stands for Local Binary Pattern. The LBP input image is converted into gray scale image, we are going to apply the threshold value to the gray scale image and then it will be converted in to binary image. This is the process of LBP algorithm. The LBP operator can be seen as approach like statistical and structural models to identify the texture analysis and it is used in various applications. The most important of LBP operator is perhaps in real world application, Example illumination variations. Another important property is computational simplicity, which possible to analyze images in challenging real time settings.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 861 5.2 HAAR cascade Algorithm HAAR cascade algorithm is a face detectionmethod,todetect the face intheimage. This algorithmconsistsoffourmethods. They are knowledge-based method, feature-invariant method, template matching method and appearance based method. 1. Knowledge-based method: It is also a rule-based method that encodes our knowledge of human faces using different rules. 2. Feature- invariant method:This algorithmtofindinvariant feature of a face despite its angle or position. 3. Template matching method: This algorithm compares the input image with stored pattern of face or features. 4. Appearance based method: A template matching method whose pattern databases learning from a set of the images. 6. CONCLUSION Though this system is significantly useful for blind people, it has its own limitations. The command should be very clear else the system will get confused and the operation will be failed or command may be mismatched. On scanning face some time mismatch can takesplace. HenceirisScanningcan be done for more efficient output. In future the enhanced voice recognition and more efficient iris scan willbeusedfor the greater performance of the systems. REFERENCES [1] Rajmane Sunita Ramesh and Dr.A.Karwankar, “Voice enabled device control using ARM processor,” International Journal of Engineering Trends and Technology (IJETT),vol.4, Dec. 2015, ISSN. 2277-9655. [2] Ms.Jaya, M.Jadhav, Ms.Deipali, V.Gore, “Introducing Celebrities in an Images Using HAAR Cascade Algorithm,” vol.3, August 2013, ISSN.2277 128X. [3] Port S A Jain, Stevan Maineka, Pranali Nimgade, “Application of IOT-WSN in home automation system,” vol.3, Jan. 2016, ISSN.2348-6953. [4] Sheena S, Sheena Mathew, “A Study of Multimodal Biometric System,” IJRET, vol.3, Dec. 2014. [5] Marek Novak, Frantisek Jakab, and Luis Lain, “Anomaly Detection in User Daily Patterns in Smart-Home Environment,” JSHI, vol.3, June 2013. [6] Kiran S Hosur, Chandrika C N, “A Cloud based Security management scheme for Home Area Network(HAN) in the Smart Grid,” IJCSCN, vol.6(2), April-May 2016, ISSN.2249-5789.