Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Intelligent Border Security Intrusion Detection Using Iot: Review On

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 17

ANNAMACHARYA INSTITUTE OF TECHNOLOGY AND SCIENCIES, KADAPA

Department of Electronics and Communication Engineering

Review On

INTELLIGENT BORDER SECURITY


INTRUSION DETECTION USING IOT

Presented By :
1. SMD Abul Nadeem 19HM1A0451 Under the guidance of:
2. S. Shoukath Ali 19HM1A0446 O. Homa Kesav
3. B. Mehataz 20HM5A0403 Assistant Professor
4. S. Guru Sekhar 20HM5A0420 Department of E.C.E.
OBJECTIVE:-

The objective of the proposed system is to enhance the monitoring


and surveillance capabilities of border control.
ABSTRACT:

Terrorists cross our borders unknowingly. It is not possible for


our soldiers to watch the borders at each and every moment.
An essential requirement in security is the capability to
automatically detect terrorist in borders .
In this paper we propose an LASER which identifies terrorist
using IR sensor and capture image of terrorist using pi camera
and sends notification to respective admin.
If admin accept to shootout that terrorist then that notification is
sent back to DEVICE(Laser) through server to kill that person,
if admin decline to shootout then the process will stop their
itself. This development enables security personnel to effectively
detect terrorist at low cost.
INTRODUCTION:
-
• This proposed System enhances the border security and protect
national borders from threats.

• IoT technology involves the use of interconnected devices that can collect
and transmit data over a network.

• In border security, IoT devices such as sensors, cameras, and drones can be
used to monitor and detect potential intrusions in real-time.
• The data collected from these devices can then be analyzed and
processed using artificial intelligence (AI).

• This can lead to more effective and efficient border security.

• This proposed System provides an advanced level of security that can


enhance the ability of security personnel to detect and respond to potential
intrusions.
Existing System:

Fig: Block diagram of Existing System


1 .8051 Controller :

 It is 8 bit Micro Controller and it is first


introduced by Intel in 1980.

Specifications:
 Architecture: 8-bit Harvard Architecture
 Program Memory: 64 KB on-chip flash memory
 Data Memory: 256 bytes on-chip RAM
 Input/Output (I/O) ports: 4 8-bit Ports
 Timers: Two 16-bit timers/counters
 Operating Voltage: 2.7V to 5.5VPackage
 Type: 40-pin dual in-line package (DIP)
2. ULTRA: -

An ultrasonic sensor emits sound


waves towards an object and determines
its distance by detecting reflected
waves

Specifications:-
 The sensing range lies between 40 cm
to 300 cm.
 The response time is between 50
milliseconds to 200 milliseconds.
 The Beam angle is around 50.
3.LCD Display
 LCD (Liquid Crystal Display) is used to
display the data collected by the monitoring
equipment.

Specifications:

 Screen Ratio : 16 X 2
 The operating voltage of this display ranges
from 4.7V to 5.3V
4. LASER: -

• A laser is a device that emits light through a process of optical amplification


based
on the stimulated emission of electromagnetic radiation.

SPECIFICATIONS:-
1. Wave length range: At least nm. µm
2. Beam Area: At least. mm² ft² cm² .
3. Beam Divergence: At least. degrees. radians.
turns. ...
4. Laser Power: At least. kilowatts. watts. milliwatts. ...
5. BUZZER:-

A buzzer is used as an audible to alert disaster management


alarm personnel in the event of
emergency.
 Specification:
 Frequency range : 3,300Hz
 Operating voltage : 1.5 to 12V
DISADVANTAGES:-
 Cost
 technical Challenges
 Data Privacy and Security
 Dependence on Technology
 Bias
 Legal And Ethical Consideration
PROPOSED
SYSTEM :-

Fig: Block diagram of Border Security System


ADVANTAGES :-
 Real-time monitoring
 Improved efficiency
 Better decision making
 Enhanced mobility
 Increased collaboration
Hardware & Software
Requirements:-
 Hardware Components  Software Required
1. RPS 1. Arduino IDE
2. ULTRA
3. METAL
4. SOUND
5. LCD
6. LASER
7. WIFI
8. BUZZER
APPLICATIONS:
-
• Defence security systems
• Remote Monitoring and control
• Predictive Analytics

You might also like