accordingly that when the human enters that range the rays
will get the obstacle and get reflected earlier. It is
represented in Fig. 14.
Fig. 14. Representing human intervention with diagram how IR transmitter
and IR receiver works.
As a matter of first importance, if an item distinguishes
by the IR sensor and after that, the flag goes to the Node
MCU esp8266 Wi-Fi module to the web server from where
the HTTP request is send to the NodeMCU. Node MCU
will check whether the Wi-Fi is associated or not. From that
point onward, Node MCU esp8266
Wi-Fi module will
check the flag from the IR sensor. [11] And after that, the
Node MCU esp8266 Wi-Fi module investigation the flag
through Arduino IDE and send an HTTP (response)
solicitation to the BLINK cloud server. This is shown in Fig.
15.
Fig. 15. [11] Determining how Http request is sent over internet to the
BLYNK cloud and its app.
When a user needs to see the touch history, then the web
sends a request to the cloud server. Cloud server
synchronizes the data from the database as the data is
categorized in NFS and CIFS and is stored in the google
cloud. But our is stored int the Blynk cloud and response to
the web server. [12] Finally, the user can see details of the
time and date of the intrusion. This are handled in data
centers. Represented in Fig. 16.
Fig. 16. Ref. [12] How data is stored in google cloud and synced.
Over this project we use IR sensor, Node MCU, BLYNK
cloud server, Node MCU always connected to server by Wi-
Fi service and have an ability to send http request to server
when a new Follower (Intruder)
is found it goes to the
database to check what message is written by the admin to
give to the user. Using functions and algorithm it is
forwarded to FCM and from the FCM (cloud) the message
as notification goes to the user. This is shown in Fig. 17.
Fig. 17. New message is sent to the user when new follower arrives. And
the path it follows to reach the user.
This notification stores in server database and server
notice center update. [13] When server update, then this
update notification sends to user. User have an Arduino
android app, and web immediately see this notification. The
notification is given by sending a particular message over
the Blynk app. Which ensure the user about the intruder that
entered the restricted area.
Initially, we included the libraries and used the
authentication for the app then took the input from the user
and the partial execution code of the whole system is being
shown Fig. 18.
Fig. 18. Execution code for the system (1).
Below is the code of the
system that is used for the
system to execute the process that has been discussed earlier.
Here the range is compared within which if the intruder
enters it will compare the value and execute its instructions.
In Fig. 19 is the execution code of the process is shown.
International Journal of Information and Electronics Engineering, Vol. 10, No. 2, June 2020
49
Fig. 19. Execution code for the system (2).
The System is working properly after the execution of
code and setting up the system properly using the LED,
Buzzer and Node MCU.
Here, the device gives the notification of the intruder and
the alarm is set ON, we can see it in the Fig. 20 below.
Fig. 20. Working of the project. When the switch is turned on from the
Blynk.
V.
C
ONCLUSION
We have seen how much hard work the army and the
soldiers over the border do to keep their countries safe from
terrorist attack and illegal people of other countries. It is
really difficult to stay 24 hours fully active for the soldiers.
To reduce their effort of the
soldiers the system can be
implemented and the security of the nation can be ensured.
This system is really cost efficient and very easily usable for
the soldiers.
C
ONFLICT OF
I
NTEREST
Afsana Tasnim had an opinion of using Raspberry PI for
the server connection. But the project would be expensive to
use. So, Shawan Shurid decided to work it with Node MCU
to reduce cost and make it easier. If we could use Raspberry
PI, we would be able to get more features but the cost would
increase 7 times more. Other than that, there was no conflict
while doing the project.
A
UTHOR
C
ONTRIBUTIONS
Shawan Shurid and Afsana Tasnim together conducted
the research and system specification. Shawan Shurid
analyzed the sytem architecture and built the circuit and
coded for establishing connection with server. Afsana
Tasnim wrote the paper and managed the connection
between the user application (BLYNK App). AKM Bahalul
Haque was responsible for overall idea generation and
supervision of the project. Reading,
reviewing the project
and working on it.
A
CKNOWLEDGEMENT
We respect and thank our honorable faculty AKM
Bahalul Haque, for providing us an opportunity to do the
project work in detection of illegal border cross and giving
us all support and guidance, which made us complete the
project properly. We are extremely thankful to him for
providing such a nice support and guidance, although he had
busy schedule managing the corporate affairs. We were
really great full and blessed to work under his guidance.
R
EFERENCES
[1] S. Yasukawa and M. Kim,
“Intruder
detection using radio wave
propagation characteristics,
” in
Proc. IEEE International Conference
on Consumer Electronics - Asia
, Jeju, 2018, pp. 206-212.
[2] R. NewlinShebiah, B. Deeksha, and S. Aparna,
“Early warning
system from the threat of wild animals using raspberry pi,
”
SSRG
International Journal of Electronics and Communication Engineering
,
March 2017.
[3] V. Jyothsna and V. Prasad. (2019). Ijcaonline.org. [Online].
Available:https://www.ijcaonline.org/volume28/number7/pxc387473
0.pdf
[4] N. Bhuta, J. Joshi, and S. Chavan,
“Intruder Detection and Run Time
Response (IDRR),
” in
Proc. International Conference on Smart City
and Emerging Technology
, Mumbai, 2018, pp. 1-5.
[5] N. Daxini, S. Sharma, and R. Patel,
“Real time animal detection
system using HAAR like feature,
”
International Journal of
Innovative Research in Computer and Communication Engineering
,
vol. 3, no. 6, June 2015.
[6] S. J. Kamble, P. H. Marathe, and S. S. Rahatekar,
“Human intrusion
detection system based on IoT,
”
International Journal of Electronics,
Electrical and Computational System
, vol. 7, no. 3 March 2018.
[7] A. Nathan, A. S. S. Navaz, J. Jayashree, and J. Vijayashree,
“Rfid
based automated gate security system,
”
Journal of Engineering and
Applied Sciences
, vol. 13, pp. 8901-8906, 2018.
[8] L. Anjari and A. Budi,
“The development of smart parking system
based on NodeMCU 1.0 using the internet of things,
”
IOP
Conference Series: Materials Science and Engineering
, vol. 384, p.
012033, 2018.
[9] Last Minute Engineers. (2019). Insight into ESP32 features & using it
with
Arduino
IDE
(easy
steps).
[Online].
Available:
https://lastminuteengineers.com/esp32-arduino-ide-tutorial/
[10] Electronics Hub. (2019). IR (Infrared)
obstacle detection sensor
circuit. [Online]. Available: https://www.electronicshub.org/ir-sensor/
[11] Wikihandbk.com. (2019).
ESP32:Примеры/Создание веб-сервера
на базе ESP32 при помощи файлов из файловой системы (SPIFFS)
—
Онлайн
справочник.
[Online].
Available:
http://wikihandbk.com/wiki/ESP32 (SPIFFS)
[12] A. Karim. (2019). Accelerate your application migration to google
cloud platform with NetApp Cloud Sync. [Online]. Available:
International Journal of Information and Electronics Engineering, Vol. 10, No. 2, June 2020
50
https://cloud.netapp.com/blog/accelerate-app-migration-to-gcp-with-
netapp-cloud-sync
[13] Subscription.packtpub.com.
(2019).
{{metadataController.pageTitle}}.
[Online].
Available:
https://subscription.packtpub.com/book/hardware_and_creative/9781
787288102/1/ch01lvl1sec15/connecting-the-esp8266-to-a-cloud-
server
Copyright © 2020 by the authors. This is an open access article distributed
under the Creative Commons Attribution License which permits
unrestricted use, distribution, and reproduction in any medium, provided
the original work is properly cited (CC BY 4.0).
Dostları ilə paylaş: