Door security system for home monitoring based on ESp32

CR Aldawira, HW Putra, N Hanafiah, S Surjarwo… - Procedia Computer …, 2019 - Elsevier
Door plays an important role in home security. To secure the house, the occupants of the
house will always have the door locked. However, sometimes the house occupants forget to …

Enhanced method of object tracing using extended Kalman filter via binary search algorithm

S Kumar, A Shailu, A Jain, NR Moparthi - Journal of Information …, 2022 - jitm.ut.ac.ir
Day by day demand for object tracing is increasing because of the huge scope in real-time
applications. Object tracing is one of the difficult issues in the computer vision and video …

Architecture and Applications of IoT Devices in Socially Relevant Fields

SA Lakshman, S Akash, J Cynthia, R Gautam… - arXiv preprint arXiv …, 2023 - arxiv.org
Number of IoT enabled devices are being tried and introduced every year and there is a
healthy competition among researched and businesses to capitalize the space created by …

IoT inspired intelligent monitoring and reporting framework for education 4.0

A Verma, A Singh, D Anand, HM Aljahdali… - IEEE …, 2021 - ieeexplore.ieee.org
Education 4.0 contemplates the involvement of emerging technologies like IoT (Internet of
Things), Fog and cloud computing. Ubiquitous real-time monitoring in the challenging …

Pir-sensor-based surveillance tool for intruder detection in secured environment: A label-consistency-based modified sequential dictionary learning approach

P De, A Chatterjee, A Rakshit - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
In modern days, the importance of developing intelligent surveillance tools for activities of
daily living is rising day by day. Identifying intruder (s) among the people who have access …

IoT based smart security system using PIR and microwave sensors

MZ Saeed, RR Ahmed, OB Samin… - 2019 13th International …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) helps to create safe cities, businesses, and homes by allowing
both public and private organizations to remotely and securely monitor facilities and public …

Secure Artificial Intelligence of Things (AIoT)-enabled authenticated key agreement technique for smart living environment

S Thapliyal, M Wazid, DP Singh, R Chauhan… - Computers and …, 2024 - Elsevier
The use of Internet of Things (IoT) devices in Artificial Intelligence of Things (AIoT)
applications has generated significant interest in recent years. AIoT security comes under …

Improving smart home surveillance through YOLO model with transfer learning and quantization for enhanced accuracy and efficiency

S Dalal, UK Lilhore, N Sharma, S Arora… - PeerJ Computer …, 2024 - peerj.com
The use of closed-circuit television (CCTV) systems is widespread in all areas where serious
safety concerns exist. Keeping an eye on things manually sounds like a time-consuming and …

An Ensemble Sentiment Classification System of Twitter Data for Airline Services Analysis: Smart Use of Soft Computing

S Pokhriyal, S Gairola, S Vats, RS Rawat… - … Security and Artificial …, 2023 - ieeexplore.ieee.org
To perform the airline services analysis it is difficult to gather the data by means of
questionnaire investigation as it is both labour and time consuming. Using information …

A smart security systems using national instruments myRIO

S Krishnaveni, M Harsha Priya, S Mallesh… - Confidential Computing …, 2022 - Springer
A built-up security system is becoming more important due to the increasing crime and theft
around us. In this paper, a smart security system is proposed based on Laboratory Virtual …