We often find illegal immigrants moving from one



Yüklə 0,96 Mb.
Pdf görüntüsü
səhifə6/7
tarix18.01.2023
ölçüsü0,96 Mb.
#79579
1   2   3   4   5   6   7
Illegal Border Cross Detection and Warni

International Journal of Information and Electronics Engineering, Vol. 10, No. 2, June 2020
48


accordingly that when the human enters that range the rays 
will get the obstacle and get reflected earlier. It is 
represented in Fig. 14.
Fig. 14. Representing human intervention with diagram how IR transmitter 
and IR receiver works. 
As a matter of first importance, if an item distinguishes 
by the IR sensor and after that, the flag goes to the Node 
MCU esp8266 Wi-Fi module to the web server from where 
the HTTP request is send to the NodeMCU. Node MCU 
will check whether the Wi-Fi is associated or not. From that 
point onward, Node MCU esp8266 Wi-Fi module will 
check the flag from the IR sensor. [11] And after that, the 
Node MCU esp8266 Wi-Fi module investigation the flag 
through Arduino IDE and send an HTTP (response) 
solicitation to the BLINK cloud server. This is shown in Fig. 
15. 
Fig. 15. [11] Determining how Http request is sent over internet to the 
BLYNK cloud and its app. 
When a user needs to see the touch history, then the web 
sends a request to the cloud server. Cloud server 
synchronizes the data from the database as the data is 
categorized in NFS and CIFS and is stored in the google 
cloud. But our is stored int the Blynk cloud and response to 
the web server. [12] Finally, the user can see details of the 
time and date of the intrusion. This are handled in data 
centers. Represented in Fig. 16.
Fig. 16. Ref. [12] How data is stored in google cloud and synced. 
Over this project we use IR sensor, Node MCU, BLYNK 
cloud server, Node MCU always connected to server by Wi-
Fi service and have an ability to send http request to server 
when a new Follower (Intruder) is found it goes to the 
database to check what message is written by the admin to 
give to the user. Using functions and algorithm it is 
forwarded to FCM and from the FCM (cloud) the message 
as notification goes to the user. This is shown in Fig. 17. 
Fig. 17. New message is sent to the user when new follower arrives. And 
the path it follows to reach the user. 
This notification stores in server database and server 
notice center update. [13] When server update, then this 
update notification sends to user. User have an Arduino 
android app, and web immediately see this notification. The 
notification is given by sending a particular message over 
the Blynk app. Which ensure the user about the intruder that 
entered the restricted area. 
Initially, we included the libraries and used the 
authentication for the app then took the input from the user 
and the partial execution code of the whole system is being 
shown Fig. 18. 
Fig. 18. Execution code for the system (1). 
Below is the code of the system that is used for the 
system to execute the process that has been discussed earlier.
Here the range is compared within which if the intruder 
enters it will compare the value and execute its instructions. 
In Fig. 19 is the execution code of the process is shown. 
International Journal of Information and Electronics Engineering, Vol. 10, No. 2, June 2020
49


Fig. 19. Execution code for the system (2). 
The System is working properly after the execution of 
code and setting up the system properly using the LED, 
Buzzer and Node MCU. 
Here, the device gives the notification of the intruder and 
the alarm is set ON, we can see it in the Fig. 20 below. 
 
 
Fig. 20. Working of the project. When the switch is turned on from the 
Blynk. 
V.
C
ONCLUSION
We have seen how much hard work the army and the 
soldiers over the border do to keep their countries safe from 
terrorist attack and illegal people of other countries. It is 
really difficult to stay 24 hours fully active for the soldiers. 
To reduce their effort of the soldiers the system can be 
implemented and the security of the nation can be ensured. 
This system is really cost efficient and very easily usable for 
the soldiers.
C
ONFLICT OF 
I
NTEREST
Afsana Tasnim had an opinion of using Raspberry PI for 
the server connection. But the project would be expensive to 
use. So, Shawan Shurid decided to work it with Node MCU 
to reduce cost and make it easier. If we could use Raspberry 
PI, we would be able to get more features but the cost would 
increase 7 times more. Other than that, there was no conflict 
while doing the project.
A
UTHOR 
C
ONTRIBUTIONS
Shawan Shurid and Afsana Tasnim together conducted 
the research and system specification. Shawan Shurid 
analyzed the sytem architecture and built the circuit and 
coded for establishing connection with server. Afsana 
Tasnim wrote the paper and managed the connection 
between the user application (BLYNK App). AKM Bahalul 
Haque was responsible for overall idea generation and 
supervision of the project. Reading, reviewing the project 
and working on it. 
A
CKNOWLEDGEMENT
We respect and thank our honorable faculty AKM 
Bahalul Haque, for providing us an opportunity to do the 
project work in detection of illegal border cross and giving 
us all support and guidance, which made us complete the 
project properly. We are extremely thankful to him for 
providing such a nice support and guidance, although he had 
busy schedule managing the corporate affairs. We were 
really great full and blessed to work under his guidance. 
R
EFERENCES
[1] S. Yasukawa and M. Kim, 
“Intruder detection using radio wave 
propagation characteristics,
” in Proc. IEEE International Conference 
on Consumer Electronics - Asia
, Jeju, 2018, pp. 206-212. 
[2] R. NewlinShebiah, B. Deeksha, and S. Aparna, 
“Early warning 
system from the threat of wild animals using raspberry pi,
SSRG 
International Journal of Electronics and Communication Engineering

March 2017. 
[3] V. Jyothsna and V. Prasad. (2019). Ijcaonline.org. [Online]. 
Available:https://www.ijcaonline.org/volume28/number7/pxc387473
0.pdf
[4] N. Bhuta, J. Joshi, and S. Chavan, 
“Intruder Detection and Run Time 
Response (IDRR),
” in Proc. International Conference on Smart City 
and Emerging Technology
, Mumbai, 2018, pp. 1-5. 
[5] N. Daxini, S. Sharma, and R. Patel, 
“Real time animal detection 
system using HAAR like feature,
International Journal of 
Innovative Research in Computer and Communication Engineering

vol. 3, no. 6, June 2015. 
[6] S. J. Kamble, P. H. Marathe, and S. S. Rahatekar, 
“Human intrusion 
detection system based on IoT,
” International Journal of Electronics, 
Electrical and Computational System
, vol. 7, no. 3 March 2018. 
[7] A. Nathan, A. S. S. Navaz, J. Jayashree, and J. Vijayashree, 
“Rfid 
based automated gate security system,
” Journal of Engineering and 
Applied Sciences
, vol. 13, pp. 8901-8906, 2018. 
[8] L. Anjari and A. Budi, 
“The development of smart parking system 
based on NodeMCU 1.0 using the internet of things,
IOP 
Conference Series: Materials Science and Engineering
, vol. 384, p. 
012033, 2018. 
[9] Last Minute Engineers. (2019). Insight into ESP32 features & using it 
with 
Arduino 
IDE 
(easy 
steps). 
[Online]. 
Available: 
https://lastminuteengineers.com/esp32-arduino-ide-tutorial/ 
[10] Electronics Hub. (2019). IR (Infrared) obstacle detection sensor 
circuit. [Online]. Available: https://www.electronicshub.org/ir-sensor/ 
[11] Wikihandbk.com. (2019). 
ESP32:Примеры/Создание веб-сервера 
на базе ESP32 при помощи файлов из файловой системы (SPIFFS) 
— 
Онлайн 
справочник. 
[Online]. 
Available: 
http://wikihandbk.com/wiki/ESP32 (SPIFFS) 
[12] A. Karim. (2019). Accelerate your application migration to google 
cloud platform with NetApp Cloud Sync. [Online]. Available: 
International Journal of Information and Electronics Engineering, Vol. 10, No. 2, June 2020
50


https://cloud.netapp.com/blog/accelerate-app-migration-to-gcp-with-
netapp-cloud-sync 
[13] Subscription.packtpub.com. 
(2019). 
{{metadataController.pageTitle}}. 
[Online]. 
Available: 
https://subscription.packtpub.com/book/hardware_and_creative/9781
787288102/1/ch01lvl1sec15/connecting-the-esp8266-to-a-cloud-
server 
Copyright © 2020 by the authors. This is an open access article distributed 
under the Creative Commons Attribution License which permits 
unrestricted use, distribution, and reproduction in any medium, provided 
the original work is properly cited (CC BY 4.0). 

Yüklə 0,96 Mb.

Dostları ilə paylaş:
1   2   3   4   5   6   7




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin