SlideShare una empresa de Scribd logo
1 de 3
Descargar para leer sin conexión
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1886
DEVELOPMENT OF FISHERMEN BORDER ALERT AND SPEED REDUCTION
SYSTEM USING RFID WITH GSM ALERT
P Raaj Vignesh1, M Vasantha Kumar2, Mary Joseph3
1Department of Computer Science, Anand Institute of Higher Technology, Chennai.
2Faculty of Computer Science Department, Anand Institute of Higher Technology, Chennai.
---------------------------------------------------------------------------***-----------------------------------------------------------------------
Abstract - The design is a border alert system to safeguard
the fisherman from being caught by other countries in coastal
area. RF communication system Global System for Mobile
communication and Wireless Networks can be the best choice
for addressing the maritime border crossing issue. In case to
prevent further movement it reduces the speed and completely
stops the motor of the boats. The information is maintained on
the movement and location of the fishermen. As because of the
major threatening issue it leads to loss in the both humans as
well as their economic incomes. The border system uses the
Location of the fishermen to alert when they reach the border
or try to cross the border. The system further reduces the speed
and completely stops the motor if in case they try to cross the
Border. Future avenues of work include implementing the
system on a hardware platform and testing it with real life
scenarios.
Keywords—Border System, Global System for Mobile
communication, Alert system, Sensor, Transmitter, RF
communication system, Microcontroller, Robustness.
I. INTRODUCTION
In the modern era, securing international borders is a
complex task and involves international collaboration,
deployment of advanced technological solutions and
professional skill-sets. The island like Sri Lanka, peninsula
like India and the coastal countries are separated by their
maritime borders. Crossing the border is being a serious
offence. Due to carelessness or unknowing the boundary
limit, the fisherman used to rude the maritime borders. Once
they rude the border, they arrested or killed by the relevant
navy and they are being abducted and their boats are being
captured by the neighborhood countries. The technology
proliferation will be an apt choice for resolving the nautical
boundary crossing issue. RF communication system Global
System for Mobile communication (GSM) and Wireless
Networks can be the best choice for addressing the maritime
border crossing issue. The proposed system is used to devise
a low cost alert system for fisherman that gives an alert when
the boat/ship crossed beyond other country’s border. If the
fishermen violate the border agreement, an alarm is
generated and the driver reduces the speed and stops the
motor through the use of microcontroller and Ethernet
shield. Thus guards in the shore can assist and provide
additional help to those fishermen if needed. Keeping in
mind about lives of Indian fishermen, this device has been
created to help them not to move beyond Indian border.
II. RELATED WORKS
[1] A wireless sensor network (WSN) for the surveillance of
critical areas and properties is currently developed which
incorporates mechanisms to ensure information security.
The system is focused on ensuring integrity and authenticity
of generated alarms and availability in the presence of an
attacker who may even compromise a limited number of
sensor nodes. One of the most interesting application
scenarios for WSNs is the domain of area surveillance
systems. The project FleGSens realizes such a surveillance
system for critical areas like e.g. borders or private
properties. Its main objectives are the secure detection and
signaling of trespassers within a predefined area in the
presence of both malicious and non-malicious interference.
The system consists of a trespass detection protocol that
detects trespassers and signals the detection towards a
dedicated gateway, and a node failure detection protocol
which informs the gateway if a node fails to respond for a
specified period of time. Currently the tested is being
extended for further outdoor experiments and to test the
protocols in larger real-world scenarios.
[2] Border protection from intrusion has always been
difficult and expensive, especially when the terrain is in
hospitable. The system proposes a new energy efficient
approach to provide early detection of intrusion using
Wireless sensor Networks. The systematically deployed
sensor nodes not only detect the intrusion but also help to
track them. The long and inhospitable terrain conditions of
the border make it very difficult to detect the intrusions in
all weather conditions. Existing WSNs developed for battle
field monitoring consist of dense deployment of complex
nodes which could be either static or mobile. Multi-hop
mechanisms are used to communicate the sensed alerts to
be delivered at Access Points. The proposed system uses
sensors which are less complex and hence can be cheaper
and can provide better battery life. Most of the hardware
proposed can be easily integrated from existing available off
the shelf systems used for radars and communication
systems.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1887
[3] Surveillance is a critical problem for harbor protection,
border control or the security of commercial facilities. The
effective protection of vast near-coast sea surfaces and busy
harbor areas from intrusions of unauthorized marine vessels,
such as pirate’s smugglers or illegal fishermen is particularly
challenging. Intrusion detection on the sea is a critical
surveillance problem for harbor protection, border security,
and the protection of commercial facilities, such as oil
platforms and fisheries. The traditional methods of detecting
ships entail the use of radars or satellites which are very
expensive. Besides the high cost, satellite images are easily
affected by cloud cover, and it is difficult to detect small
boats or ships on the sea with marine radar due to the noise
or clutter generated by the uneven sea surface. They exploit
the spatial and temporal correlations of the intrusion to
increase the detection reliability and conducted evaluations
with real data collected by our initial experiments, and
provide analysis of the system.
[4] Wireless sensor networks (WSNs) can be used to
monitor the interested region using multihop
communication. Coverage is a primary metric to evaluate
the capacity of monitoring. Connectivity also needs to be
guaranteed so that the sink node receives all sensed data for
future processing. They proposed allocation-independent,
energy-efficient routing algorithm EECCR, which
simultaneously preserves the network-coverage ratio and
the sensor n-connectivity probability. A WSN is composed of
numerous tiny sensor nodes. These nodes have processing
and communication capacities, which enable the collection
of surrounding information and then the transmission of the
report data to a sink node/base station. Coverage is an
important metric to measure the quality of service of the
network. An improved algorithm should be designed so that
the interested region can be evenly m-covered with a
desired ratio by the active nodes. Another direction is to
schedule the sensor nodes with the different initial energy
in an energy- efficient approach.
[5] The application can be widely used by people in the
border to find the appropriate path to reach the destination.
The notification will be sent to the border security forces
which act as the server to all other devices that are operated
by people in ships. The application will notify the
information of where the devices are being located and
intimate them about the issues that occur due to opponent
forces in ships to server. This can act as an incident
management application to avoid conflicts at varying
situations.
III. PROPOSED SYSTEM
1. BORDER ALERT SYSTEM USING RFID AND GSM
a. REGISTRATION AND LOGIN
The user will perform either login or registration operation.
After these operations get over he will go to the next phase.
The module allows the new user to register and open the
application to the browser which helps to monitor the
actions that are happening in the border that could be traced
by the officer and user. The security credentials are
maintained so the issues that occur can be easily resolved.
The registration can also be done by means of personal id
also which is highly useful for illiterate people which can be
directly used by the user or officer by just typing their id in
that text fields.
b. RECEIVING SIGNAL:
The transmitter and receiver modules are connected with
arduino boards. The transmitter is place in the field and the
receiver is placed in the system end. The transmitter and
receiver is given an id while configuring it. All the
transmitters in the field should know the receiver’s id which
is the destination address. The receiver will receive signal
from various transmitters kept in the field. The receiver at
the system end is connected to the web server via UART. The
UART is used here because of its low cost while interfacing
with arduino micro -controller and fast connection
establishment. When the data from the transmitter receives
the receiver, it sends request to the web server. The SERIAL
communication cable is connected to the arduino micro-
controller.
c. CONNECT HARDWARE TO SERVER
Connecting the hardware components like sensors, power
supply, motor and buzzer to the arduino board. Then the
connection is started between the arduino to server by
clicking the button event, once we start the server all the
data will be received by the computer from the arduino.
d. REPORT AND ALERT:
The data processing is the task of checking the various
sensors data received from the field with the already fixed
threshold values. The threshold values vary according to the
fixed value. The motor will be slow or switched off
automatically based on the signal level. If the sensor value is
detect like abnormal then the sms is send to nearest officer.
If the boat reaches the border or it is nearer to the border, an
alarm is indicated by buzzer. It will keep on increasing by
pulse width modulation.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1888
IV.BLOCK DIAGRAM
V. CONCLUSION
This paper studies the complex and sometimes
conflicting requirements for such a WSN system. After
determining that detection probability or orthogonal
paths is an appropriate metric for measuring the
crossing detection quality of the LWSN, we presented a
method that calculates the required network density to
achieve the specified level of coverage, while maintaining
radio connectivity within the network.
VI. FUTURE ENHANCEMENT
Future avenues of work include implementing the system on
a hardware platform and testing it with real life scenarios,
such as various intrusion models, complex terrains and
different sensing modalities. Current scenario is of building
50 WiFi-based BSNs, which are equipped with accelerometer
vibration sensors. This hardware platform is designed to
accept a broad range of sensor types, which will allow testing
the proposed system in other applications such as gas
pipeline monitoring.
VII.REFERENCES
[1] E. U. C. House of Lords, “Frontex: the eu external borders
agency,” Authority of the House of Lords, March 2008.
[2] L. Boaz, S. Kaijage, and R. Sinde, “Wireless sensor node for
gas pipeline leak detection and location,” International
Journal of Computer Applications, vol. 100, no. 18, pp. 29–33,
August 2014.
[3] A. O. Adejo, A. J. Onumanyi, J. M. Anyanya, and S. O.
Oyewobi, “Oil and gas process monitoring through wireless
sensor networks: A survey,” Ozean Journal of Applied
Science, vol. 6, no. 2, 2013.
[4] M. Hammoudeh, R. Newman, C. Dennett, S. Mount, and O.
Aldabbas, “Map as a service: A framework for visualising and
maximising information return from multi-modalwireless
sensor networks,” Sensors, vol. 15, no. 9, p. 22970, 2015.
[5] Z. Sun, P. Wang, M. C. Vuran, M. A. Al-Rodhaan, A. M. Al-
Dhelaan, and I. F. Akyildiz, “Bordersense: Border patrol
through advanced wireless sensor networks,” Ad Hoc Netw.,
vol. 9, no. 3, pp. 468–477, May 2011.
[6] T. Yang, D. Mu, W. Hu, and H. Zhang, “Energy-efficient
border intrusion detection using wireless sensors network,”
EURASIP Journal on Wireless Communications and
Networking,vol. 2014,no. 1,pp.1–12, 2014.
[7] H. Luo, K. Wu, Z. Guo, L. Gu, and L. M. Ni, “Ship detection
with wireless sensor networks,” IEEE Transactions on
Parallel and Distributed Systems, vol. 23, no. 7, pp. 1336–
1343, July 2012.
[8] Y. Dong, H. Chang, Z. Zou, and S. Tang, “Energy aware
routing algorithm for wsn applications in border
surveillance,” in Technologies for Homeland Security (HST),
2010 IEEE International Conference on, Nov 2010, pp. 530–
535.
[9] Y. Jin, L. Wang, J. Y. Jo, Y. Kim, M. Yang, and Y. Jiang,
“Eeccr: An energy-efficient m -coverage and n -connectivity
routing algorithm under border effects in heterogeneous
sensor networks,” IEEE Transactions on Vehicular
Technology, vol. 58, no. 3, pp. 1429–1442, March 2009.
[10] H. Sharei-Amarghan, A. Keshavarz-Haddad, and G.
Garraux, Routing Protocols for Border Surveillance Using
ZigBee-Based Wireless Sensor Networks. Springer Science,
2013, pp. 114–123.

Más contenido relacionado

La actualidad más candente

Gsa vdfd stakout pro bro 3-pnl sm
Gsa vdfd stakout pro bro 3-pnl smGsa vdfd stakout pro bro 3-pnl sm
Gsa vdfd stakout pro bro 3-pnl smIlias Varsamis
 
Fft perimeter intrusion_detection_-_iaa_jan12
Fft perimeter intrusion_detection_-_iaa_jan12Fft perimeter intrusion_detection_-_iaa_jan12
Fft perimeter intrusion_detection_-_iaa_jan12IPPAI
 
border security using gsm
border security using gsmborder security using gsm
border security using gsmbharath naidu
 
A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)Saurabh Giratkar
 
AIS XB-8000 WiFi Transponder from Vesper Marine
AIS XB-8000 WiFi Transponder from Vesper MarineAIS XB-8000 WiFi Transponder from Vesper Marine
AIS XB-8000 WiFi Transponder from Vesper MarineVesper Marine
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksKarthik
 
GSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj VermaGSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj VermaOWASP Delhi
 
Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)Ankit Singh
 
An IDS for Secure Visible Light Communication on Android Devices
An IDS for Secure Visible Light Communication on Android DevicesAn IDS for Secure Visible Light Communication on Android Devices
An IDS for Secure Visible Light Communication on Android DevicesBen Graham
 
Gsm security by usman zulfqar
Gsm security by usman zulfqarGsm security by usman zulfqar
Gsm security by usman zulfqarusman zulfqar
 
shipping container tracking
shipping container trackingshipping container tracking
shipping container trackingStarcom Systems
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its applicationRoma Vyas
 
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02Sindhu Nathan
 
Security in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksSecurity in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksNaveen Kumar
 
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529ISSA LA
 
Make things come alive in a secure way - Sigfox
Make things come alive in a secure way - SigfoxMake things come alive in a secure way - Sigfox
Make things come alive in a secure way - SigfoxSigfox
 
44Con 2014: GreedyBTS - Hacking Adventures in GSM
44Con 2014: GreedyBTS - Hacking Adventures in GSM44Con 2014: GreedyBTS - Hacking Adventures in GSM
44Con 2014: GreedyBTS - Hacking Adventures in GSMiphonepentest
 
Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604ISSA LA
 
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesSmartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesIOSR Journals
 

La actualidad más candente (20)

Gsa vdfd stakout pro bro 3-pnl sm
Gsa vdfd stakout pro bro 3-pnl smGsa vdfd stakout pro bro 3-pnl sm
Gsa vdfd stakout pro bro 3-pnl sm
 
Fft perimeter intrusion_detection_-_iaa_jan12
Fft perimeter intrusion_detection_-_iaa_jan12Fft perimeter intrusion_detection_-_iaa_jan12
Fft perimeter intrusion_detection_-_iaa_jan12
 
Gsm security final
Gsm security finalGsm security final
Gsm security final
 
border security using gsm
border security using gsmborder security using gsm
border security using gsm
 
A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)
 
AIS XB-8000 WiFi Transponder from Vesper Marine
AIS XB-8000 WiFi Transponder from Vesper MarineAIS XB-8000 WiFi Transponder from Vesper Marine
AIS XB-8000 WiFi Transponder from Vesper Marine
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
GSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj VermaGSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj Verma
 
Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)
 
An IDS for Secure Visible Light Communication on Android Devices
An IDS for Secure Visible Light Communication on Android DevicesAn IDS for Secure Visible Light Communication on Android Devices
An IDS for Secure Visible Light Communication on Android Devices
 
Gsm security by usman zulfqar
Gsm security by usman zulfqarGsm security by usman zulfqar
Gsm security by usman zulfqar
 
shipping container tracking
shipping container trackingshipping container tracking
shipping container tracking
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
 
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
 
Security in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksSecurity in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) Networks
 
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
 
Make things come alive in a secure way - Sigfox
Make things come alive in a secure way - SigfoxMake things come alive in a secure way - Sigfox
Make things come alive in a secure way - Sigfox
 
44Con 2014: GreedyBTS - Hacking Adventures in GSM
44Con 2014: GreedyBTS - Hacking Adventures in GSM44Con 2014: GreedyBTS - Hacking Adventures in GSM
44Con 2014: GreedyBTS - Hacking Adventures in GSM
 
Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604
 
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesSmartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
 

Similar a RFID Border Alert

WORKER SAFETY HELMET and MINING TRACKING
WORKER SAFETY HELMET and MINING TRACKINGWORKER SAFETY HELMET and MINING TRACKING
WORKER SAFETY HELMET and MINING TRACKINGIRJET Journal
 
Coal Mine Safety Monitoring and Alerting System
Coal Mine Safety Monitoring and Alerting SystemCoal Mine Safety Monitoring and Alerting System
Coal Mine Safety Monitoring and Alerting SystemIRJET Journal
 
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET Journal
 
IRJET- Emergency Navigation System using Mobile Computing
IRJET-  	  Emergency Navigation System using Mobile ComputingIRJET-  	  Emergency Navigation System using Mobile Computing
IRJET- Emergency Navigation System using Mobile ComputingIRJET Journal
 
IRJET- Location Monitoring System for Maritime Security using RSSI Technology
IRJET- Location Monitoring System for Maritime Security using RSSI TechnologyIRJET- Location Monitoring System for Maritime Security using RSSI Technology
IRJET- Location Monitoring System for Maritime Security using RSSI TechnologyIRJET Journal
 
Intelligent Navigation System for Fishing Boats Using GPS
Intelligent Navigation System for Fishing Boats Using GPSIntelligent Navigation System for Fishing Boats Using GPS
Intelligent Navigation System for Fishing Boats Using GPSIRJET Journal
 
Centralized Fault Management of Docks in Marine Sensor Networks
Centralized Fault Management of Docks in Marine Sensor NetworksCentralized Fault Management of Docks in Marine Sensor Networks
Centralized Fault Management of Docks in Marine Sensor NetworksIOSR Journals
 
RFID Based School Children Security System
RFID Based School Children Security SystemRFID Based School Children Security System
RFID Based School Children Security SystemIRJET Journal
 
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET Journal
 
Fishermen Nautical Border Alert System
Fishermen Nautical Border Alert SystemFishermen Nautical Border Alert System
Fishermen Nautical Border Alert Systemijtsrd
 
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...srinivasanece7
 
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesSmartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesIOSR Journals
 
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...srinivasanece7
 
IRJET- Underwater Drone
IRJET- Underwater DroneIRJET- Underwater Drone
IRJET- Underwater DroneIRJET Journal
 
IRJET- Smart Marine Boundary Identification System using GSM & GPS
IRJET- Smart Marine Boundary Identification System using GSM & GPSIRJET- Smart Marine Boundary Identification System using GSM & GPS
IRJET- Smart Marine Boundary Identification System using GSM & GPSIRJET Journal
 
Improvement of quality of service parameters using
Improvement of quality of service parameters usingImprovement of quality of service parameters using
Improvement of quality of service parameters usingeSAT Publishing House
 
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...eSAT Journals
 
Intelligent Car System for Accident Prevention
Intelligent Car System for Accident PreventionIntelligent Car System for Accident Prevention
Intelligent Car System for Accident PreventionIRJET Journal
 

Similar a RFID Border Alert (20)

WORKER SAFETY HELMET and MINING TRACKING
WORKER SAFETY HELMET and MINING TRACKINGWORKER SAFETY HELMET and MINING TRACKING
WORKER SAFETY HELMET and MINING TRACKING
 
Coal Mine Safety Monitoring and Alerting System
Coal Mine Safety Monitoring and Alerting SystemCoal Mine Safety Monitoring and Alerting System
Coal Mine Safety Monitoring and Alerting System
 
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
 
IRJET- Emergency Navigation System using Mobile Computing
IRJET-  	  Emergency Navigation System using Mobile ComputingIRJET-  	  Emergency Navigation System using Mobile Computing
IRJET- Emergency Navigation System using Mobile Computing
 
IRJET- Location Monitoring System for Maritime Security using RSSI Technology
IRJET- Location Monitoring System for Maritime Security using RSSI TechnologyIRJET- Location Monitoring System for Maritime Security using RSSI Technology
IRJET- Location Monitoring System for Maritime Security using RSSI Technology
 
Intelligent Navigation System for Fishing Boats Using GPS
Intelligent Navigation System for Fishing Boats Using GPSIntelligent Navigation System for Fishing Boats Using GPS
Intelligent Navigation System for Fishing Boats Using GPS
 
F010133036
F010133036F010133036
F010133036
 
Centralized Fault Management of Docks in Marine Sensor Networks
Centralized Fault Management of Docks in Marine Sensor NetworksCentralized Fault Management of Docks in Marine Sensor Networks
Centralized Fault Management of Docks in Marine Sensor Networks
 
RFID Based School Children Security System
RFID Based School Children Security SystemRFID Based School Children Security System
RFID Based School Children Security System
 
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
 
Fishermen Nautical Border Alert System
Fishermen Nautical Border Alert SystemFishermen Nautical Border Alert System
Fishermen Nautical Border Alert System
 
A0550110
A0550110A0550110
A0550110
 
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
 
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesSmartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
 
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
 
IRJET- Underwater Drone
IRJET- Underwater DroneIRJET- Underwater Drone
IRJET- Underwater Drone
 
IRJET- Smart Marine Boundary Identification System using GSM & GPS
IRJET- Smart Marine Boundary Identification System using GSM & GPSIRJET- Smart Marine Boundary Identification System using GSM & GPS
IRJET- Smart Marine Boundary Identification System using GSM & GPS
 
Improvement of quality of service parameters using
Improvement of quality of service parameters usingImprovement of quality of service parameters using
Improvement of quality of service parameters using
 
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...
 
Intelligent Car System for Accident Prevention
Intelligent Car System for Accident PreventionIntelligent Car System for Accident Prevention
Intelligent Car System for Accident Prevention
 

Más de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Más de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Último

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 

Último (20)

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 

RFID Border Alert

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1886 DEVELOPMENT OF FISHERMEN BORDER ALERT AND SPEED REDUCTION SYSTEM USING RFID WITH GSM ALERT P Raaj Vignesh1, M Vasantha Kumar2, Mary Joseph3 1Department of Computer Science, Anand Institute of Higher Technology, Chennai. 2Faculty of Computer Science Department, Anand Institute of Higher Technology, Chennai. ---------------------------------------------------------------------------***----------------------------------------------------------------------- Abstract - The design is a border alert system to safeguard the fisherman from being caught by other countries in coastal area. RF communication system Global System for Mobile communication and Wireless Networks can be the best choice for addressing the maritime border crossing issue. In case to prevent further movement it reduces the speed and completely stops the motor of the boats. The information is maintained on the movement and location of the fishermen. As because of the major threatening issue it leads to loss in the both humans as well as their economic incomes. The border system uses the Location of the fishermen to alert when they reach the border or try to cross the border. The system further reduces the speed and completely stops the motor if in case they try to cross the Border. Future avenues of work include implementing the system on a hardware platform and testing it with real life scenarios. Keywords—Border System, Global System for Mobile communication, Alert system, Sensor, Transmitter, RF communication system, Microcontroller, Robustness. I. INTRODUCTION In the modern era, securing international borders is a complex task and involves international collaboration, deployment of advanced technological solutions and professional skill-sets. The island like Sri Lanka, peninsula like India and the coastal countries are separated by their maritime borders. Crossing the border is being a serious offence. Due to carelessness or unknowing the boundary limit, the fisherman used to rude the maritime borders. Once they rude the border, they arrested or killed by the relevant navy and they are being abducted and their boats are being captured by the neighborhood countries. The technology proliferation will be an apt choice for resolving the nautical boundary crossing issue. RF communication system Global System for Mobile communication (GSM) and Wireless Networks can be the best choice for addressing the maritime border crossing issue. The proposed system is used to devise a low cost alert system for fisherman that gives an alert when the boat/ship crossed beyond other country’s border. If the fishermen violate the border agreement, an alarm is generated and the driver reduces the speed and stops the motor through the use of microcontroller and Ethernet shield. Thus guards in the shore can assist and provide additional help to those fishermen if needed. Keeping in mind about lives of Indian fishermen, this device has been created to help them not to move beyond Indian border. II. RELATED WORKS [1] A wireless sensor network (WSN) for the surveillance of critical areas and properties is currently developed which incorporates mechanisms to ensure information security. The system is focused on ensuring integrity and authenticity of generated alarms and availability in the presence of an attacker who may even compromise a limited number of sensor nodes. One of the most interesting application scenarios for WSNs is the domain of area surveillance systems. The project FleGSens realizes such a surveillance system for critical areas like e.g. borders or private properties. Its main objectives are the secure detection and signaling of trespassers within a predefined area in the presence of both malicious and non-malicious interference. The system consists of a trespass detection protocol that detects trespassers and signals the detection towards a dedicated gateway, and a node failure detection protocol which informs the gateway if a node fails to respond for a specified period of time. Currently the tested is being extended for further outdoor experiments and to test the protocols in larger real-world scenarios. [2] Border protection from intrusion has always been difficult and expensive, especially when the terrain is in hospitable. The system proposes a new energy efficient approach to provide early detection of intrusion using Wireless sensor Networks. The systematically deployed sensor nodes not only detect the intrusion but also help to track them. The long and inhospitable terrain conditions of the border make it very difficult to detect the intrusions in all weather conditions. Existing WSNs developed for battle field monitoring consist of dense deployment of complex nodes which could be either static or mobile. Multi-hop mechanisms are used to communicate the sensed alerts to be delivered at Access Points. The proposed system uses sensors which are less complex and hence can be cheaper and can provide better battery life. Most of the hardware proposed can be easily integrated from existing available off the shelf systems used for radars and communication systems.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1887 [3] Surveillance is a critical problem for harbor protection, border control or the security of commercial facilities. The effective protection of vast near-coast sea surfaces and busy harbor areas from intrusions of unauthorized marine vessels, such as pirate’s smugglers or illegal fishermen is particularly challenging. Intrusion detection on the sea is a critical surveillance problem for harbor protection, border security, and the protection of commercial facilities, such as oil platforms and fisheries. The traditional methods of detecting ships entail the use of radars or satellites which are very expensive. Besides the high cost, satellite images are easily affected by cloud cover, and it is difficult to detect small boats or ships on the sea with marine radar due to the noise or clutter generated by the uneven sea surface. They exploit the spatial and temporal correlations of the intrusion to increase the detection reliability and conducted evaluations with real data collected by our initial experiments, and provide analysis of the system. [4] Wireless sensor networks (WSNs) can be used to monitor the interested region using multihop communication. Coverage is a primary metric to evaluate the capacity of monitoring. Connectivity also needs to be guaranteed so that the sink node receives all sensed data for future processing. They proposed allocation-independent, energy-efficient routing algorithm EECCR, which simultaneously preserves the network-coverage ratio and the sensor n-connectivity probability. A WSN is composed of numerous tiny sensor nodes. These nodes have processing and communication capacities, which enable the collection of surrounding information and then the transmission of the report data to a sink node/base station. Coverage is an important metric to measure the quality of service of the network. An improved algorithm should be designed so that the interested region can be evenly m-covered with a desired ratio by the active nodes. Another direction is to schedule the sensor nodes with the different initial energy in an energy- efficient approach. [5] The application can be widely used by people in the border to find the appropriate path to reach the destination. The notification will be sent to the border security forces which act as the server to all other devices that are operated by people in ships. The application will notify the information of where the devices are being located and intimate them about the issues that occur due to opponent forces in ships to server. This can act as an incident management application to avoid conflicts at varying situations. III. PROPOSED SYSTEM 1. BORDER ALERT SYSTEM USING RFID AND GSM a. REGISTRATION AND LOGIN The user will perform either login or registration operation. After these operations get over he will go to the next phase. The module allows the new user to register and open the application to the browser which helps to monitor the actions that are happening in the border that could be traced by the officer and user. The security credentials are maintained so the issues that occur can be easily resolved. The registration can also be done by means of personal id also which is highly useful for illiterate people which can be directly used by the user or officer by just typing their id in that text fields. b. RECEIVING SIGNAL: The transmitter and receiver modules are connected with arduino boards. The transmitter is place in the field and the receiver is placed in the system end. The transmitter and receiver is given an id while configuring it. All the transmitters in the field should know the receiver’s id which is the destination address. The receiver will receive signal from various transmitters kept in the field. The receiver at the system end is connected to the web server via UART. The UART is used here because of its low cost while interfacing with arduino micro -controller and fast connection establishment. When the data from the transmitter receives the receiver, it sends request to the web server. The SERIAL communication cable is connected to the arduino micro- controller. c. CONNECT HARDWARE TO SERVER Connecting the hardware components like sensors, power supply, motor and buzzer to the arduino board. Then the connection is started between the arduino to server by clicking the button event, once we start the server all the data will be received by the computer from the arduino. d. REPORT AND ALERT: The data processing is the task of checking the various sensors data received from the field with the already fixed threshold values. The threshold values vary according to the fixed value. The motor will be slow or switched off automatically based on the signal level. If the sensor value is detect like abnormal then the sms is send to nearest officer. If the boat reaches the border or it is nearer to the border, an alarm is indicated by buzzer. It will keep on increasing by pulse width modulation.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1888 IV.BLOCK DIAGRAM V. CONCLUSION This paper studies the complex and sometimes conflicting requirements for such a WSN system. After determining that detection probability or orthogonal paths is an appropriate metric for measuring the crossing detection quality of the LWSN, we presented a method that calculates the required network density to achieve the specified level of coverage, while maintaining radio connectivity within the network. VI. FUTURE ENHANCEMENT Future avenues of work include implementing the system on a hardware platform and testing it with real life scenarios, such as various intrusion models, complex terrains and different sensing modalities. Current scenario is of building 50 WiFi-based BSNs, which are equipped with accelerometer vibration sensors. This hardware platform is designed to accept a broad range of sensor types, which will allow testing the proposed system in other applications such as gas pipeline monitoring. VII.REFERENCES [1] E. U. C. House of Lords, “Frontex: the eu external borders agency,” Authority of the House of Lords, March 2008. [2] L. Boaz, S. Kaijage, and R. Sinde, “Wireless sensor node for gas pipeline leak detection and location,” International Journal of Computer Applications, vol. 100, no. 18, pp. 29–33, August 2014. [3] A. O. Adejo, A. J. Onumanyi, J. M. Anyanya, and S. O. Oyewobi, “Oil and gas process monitoring through wireless sensor networks: A survey,” Ozean Journal of Applied Science, vol. 6, no. 2, 2013. [4] M. Hammoudeh, R. Newman, C. Dennett, S. Mount, and O. Aldabbas, “Map as a service: A framework for visualising and maximising information return from multi-modalwireless sensor networks,” Sensors, vol. 15, no. 9, p. 22970, 2015. [5] Z. Sun, P. Wang, M. C. Vuran, M. A. Al-Rodhaan, A. M. Al- Dhelaan, and I. F. Akyildiz, “Bordersense: Border patrol through advanced wireless sensor networks,” Ad Hoc Netw., vol. 9, no. 3, pp. 468–477, May 2011. [6] T. Yang, D. Mu, W. Hu, and H. Zhang, “Energy-efficient border intrusion detection using wireless sensors network,” EURASIP Journal on Wireless Communications and Networking,vol. 2014,no. 1,pp.1–12, 2014. [7] H. Luo, K. Wu, Z. Guo, L. Gu, and L. M. Ni, “Ship detection with wireless sensor networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 7, pp. 1336– 1343, July 2012. [8] Y. Dong, H. Chang, Z. Zou, and S. Tang, “Energy aware routing algorithm for wsn applications in border surveillance,” in Technologies for Homeland Security (HST), 2010 IEEE International Conference on, Nov 2010, pp. 530– 535. [9] Y. Jin, L. Wang, J. Y. Jo, Y. Kim, M. Yang, and Y. Jiang, “Eeccr: An energy-efficient m -coverage and n -connectivity routing algorithm under border effects in heterogeneous sensor networks,” IEEE Transactions on Vehicular Technology, vol. 58, no. 3, pp. 1429–1442, March 2009. [10] H. Sharei-Amarghan, A. Keshavarz-Haddad, and G. Garraux, Routing Protocols for Border Surveillance Using ZigBee-Based Wireless Sensor Networks. Springer Science, 2013, pp. 114–123.