You are on page 1of 6

Proceedings of the Third International Conference on Electronics and Sustainable Communication Systems (ICESC 2022)

IEEE Xplore Part Number: CFP22V66-ART; ISBN: 978-1-6654-7971-4

Design and Implementation of Motion


Sensing Security System
2022 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC) | 978-1-6654-7971-4/22/$31.00 ©2022 IEEE | DOI: 10.1109/ICESC54411.2022.9885628

Vaishnavi Kalbande Gautami Tikale Rahul Agrawal


UG Student, UG Student, Assistant Professor,
Department of Electronics Department of Electronics Department of Electronics
Engineering, Engineering Engineering
G H Raisoni College of G H Raisoni College of G H Raisoni College of
Engineering Nagpur Engineering Nagpur Engineering Nagpur
kalbande_vaishnavi.ex@ghrce.raisoni.net tikale_gautami.ex@ghrce.raisoni.net rahul.agrawal@raisoni.net

Swati Sorte Dr. Laxman Thakre Dr.Ganesh Khekare


Assistant Professor Assistant Professor Associate Professor
Department of Electronics Department of Electronics Department of Computer Science
Engineering Engineering & Engineering
G H Raisoni College of G H Raisoni College of Parul University,
Engineering Nagpur Engineering Nagpur Vadodara
swati.sorte@raisoni.net laxman.thakre@raisoni.net khekare.123@gmail.com

Abstract –In modern-day international places of work, human body and is therefore known as the "Human Sensor".
laboratories, faculty or domestic, the first factor which Design for the acquisition of a defense system unit based on
challenge is the security. So as to make your facts, cash, AI technology ". Especially in high-risk areas such as banks,
premises and private belongings secure and secured from corporations, government agencies and public services. In the
unauthorized men or women. This Work represents a absence of the owner, offices, service room and lock. It
fingerprint reputation biometrics gadget based totally on should consider the actions of people who try to escape or
real time embedded machines so as to give a whole safety that cause injuries. Level of protection from accidents, losses
solution and making it unable to get entry for the and criminals. The hectic pace of life leads to the need to
unauthorized human beings as well as Keypad for code manage household resources remotely and to increase the
lock, and Face recognition the usage of image processing. need for home supervision. In this activity, we explore the
The proposed system is based on an image detecting background of IoT apps and security measures and identify
analysis to determine the identity of an unknown person the best privacy models needed and suitable for the different
and to distinguish if the person is known or unknown. layers of IoT-operated applications. In this project a special
Practical results have shown that, if someone crosses the sensor is used, which can detect any unauthorized movement
Area where then the motion detecting system detects the that occurs in the room where the sensor is stored, one part
face and gives them out as if the person is known then the buzzer and special power supply is provided in the safety
door will open and if the person is known then it starts system. Whenever the sensor detects any motion, then the
ringing and alerts the people. The design is actually based logic goes high i.e. 1 output signals, the controller provides a
on security purposes and its design and algorithms are command to the GSM module with a warning message on the
based on some of the system functions mentioned above. pre-defined telephone number set in the Attic command
CCTV is used to monitor the specific place and provide a system, the buzzer block is turned on for control. . Call the
video record for security purposes. With the exception of an user immediately.
external attacker, the seller or related organization may be
II. LITERATURE REVIEW
liable for a break of privacy.
In this paper [1] a photo processing system intended to work
Keywords: - Raspberry pi (RP), Passive infrared sensor
for flight attendants who monitor passengers entering the
(PIR), Theft detection system (TDS), general purpose
corridor. Movement acquisition is achieved by a gray image
Input/output (GPIO).
by the distinction between reference and current images with
I. INTRODUCTION mosaic spacing. Movement analysis and predictive square
measurement are performed for victim prediction templates
Finding a home is an important job because of and the square measure is primarily controlled by a legal
burglary. In modern times, it is not uncommon for people to system that alternates between moving changes and mosaic
walk out of the house unoccupied, with so many people motion prediction images. The detection system is highly
following a daily routine. The whole body produces a certain proven against false alarms created by moving shadows and
amount of heat in the form of infrared that is invisible to small movements such as arm swings. The system has
human eyes. However, an electric sensor can be detected. The sufficient speed and sensitivity to detect small objects such
standard PIR sensor detects red infrared waves from the as a fire alarm or a small package thrown into a reading

978-1-6654-7971-4/22/$31.00 ©2022 IEEE 612


Authorized licensed use limited to: PES University Bengaluru. Downloaded on October 10,2023 at 03:52:53 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Third International Conference on Electronics and Sustainable Communication Systems (ICESC 2022)
IEEE Xplore Part Number: CFP22V66-ART; ISBN: 978-1-6654-7971-4

camera area. The program collectively contains the works by removing the straight exit from the front that is
complexity of recognizing the dynamic human path of constantly changing. Significant noise adjustment and
overcrowded travelers. structural congestion between the rear and front frame
indicate movement. The paradigm is the first to be developed
In this research paper [2] the project is made for home into a virtual Box software that is abused before using it on
security. It is necessary because of the increasing number of the Raspberry Pi. This paper can show project compatibility.
burglaries or breaches of home security. Such a system would
work especially well to look at a limited area wherever it is
In the paper [6] the police video for automatic video detection
installed and is a high value for private use. This paper of crime scenes is provided with mathematical features. If the
introduces a feature system web to support home security incident indicates an unusual situation such as a bag snatch,
with remote and time-based monitoring and movement a child fainting and a street fighter, PSS pleads guilty and
detection. The IoT system uses wireless steering to get the automatically reports to the agency. Local performance of
most points within a node sensor connected to a small moving targets in the scene and measurement of human
controller. Passive Infrared and measurement system is a behavior are important processes of the thought process.
local unit of GY-61 used due to sensor element detection. Three moving elements are determined by video streaming:
DIY sensor made at home and then upgraded. The simulation Distance between objects and object space. These symptoms
shows that the sensory system works well because it is in a often confirm a person's behavior. We usually use these 2
position to detect anything inside the bond that differs from types of action sequences in a training knowledge set. When
any movement of door and window. The program is one of you create a separator. We usually use a sequence check for
the most comprehensive home security solutions ready for those continuous videos of human behavior that include
multiple actions in a row. Experimental results show that the
home-based movement detection and movement detection.
strategy is useful in locating the scene of a racist behavior. In
This paper proposes [3] a movement detection code that this Earlier work [7] a matter of analyzing smart cops
allows the USA to detect movement around Associate with recently. They will provide Linked Care in advance or help
the United States of America find interesting video frames.
Nursing Objects or the visible area. Recovery code is very
During this paper, we often suggest a good way to get a video
popular in compiling important security measures in recent
of police work based largely on motion detection technology
days. Familiarity with the development of existing protective [8]. We often use a shared feature, a moving vector to return
devices as a feature of the movement sensor in the light of frames with predefined moving objects.
internal and external security cameras. Safety cameras
measure a single square foot between standard devices using This paper describes [9] an advanced movement
motion detection technology. Now, for maximum protection, synchronization method that uses 5 consecutive fields to
mobile detector cameras make a very popular square. This determine movement. The law of motion detection, searches
paper is recommended here to look at one in the middle of for the function of detecting motion between fields with
the python movement detection code. In this paper [4] we stratified block blocks primarily based on structure and thus
often propose a dynamic view of information science for reduces arithmetic quantity. This reduction depends on the
sensory networks as security systems. Network detector scope of the movement activity between the fields and will
technology combines great power to solve a few important be in the form of image scenes. Non-linear lines such as the
scientific and social problems. However, the complexity of video area unit and include the exploitation of lattice motion
the process is news, especially large ones in the event of such information as video forums; by giving extra weight to the
a large amount of information that cannot be achieved. A temporary translation of the objects of the video group and
by giving extra weight to the local rendering on the dynamics
systematic view finds the scientific touch of the human
of the video group. Test results have shown that the DE
senses and the combination of the eyes of an insect. Through interlacing operating system offers fewer translation errors
basic tests, we often confirm that a systematic perspective than most DE access methods.
can be used to detect human behavior.

Here [5] the technology can be a sophisticated weapon once In this paper [10] The Author offers the gift of an algorithmic
it has changed the way we normally do daily tasks. Sadly, the program for extracting a video object that combines image
separation and motion detection. Contains 3 stages of
unrighteous can see new ways to use technology to make
temporary image detection and spatiotemporal speculation.
their own mistakes. The CCTV area unit is a good security
Additionally, proper mobility detection is essential for video
measure that will often be used to catch criminals, but systems and police investigation programs. Due to the
without banks, supermarkets, educational institutions etc., development of hardware camera options, various planned
the CCTV response is too far from the home budget and strategies are growing. Throughout this paper we often
needs constant monitoring. As a result of the mobile unit's develop a completely different approach to visual flow based
first cell phone, it makes sense to combine this with a CCTV primarily on finding motion in the videos [11]. During this
response. The Motion Detection Security System Alerts a process through the deviation of the element, the existing
Raspberry Pi abuse message with a message because the points of the victims of these points are calculated. If the
name suggests. Mistreatment Raspberry Pi, a movement difference in effect is greater than the edge, these points are
detection system is developed with a back lift technique that marked as point points. So basically, [12] Human movement
detection is a method of finding where various methods and

978-1-6654-7971-4/22/$31.00 ©2022 IEEE 613


Authorized licensed use limited to: PES University Bengaluru. Downloaded on October 10,2023 at 03:52:53 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Third International Conference on Electronics and Sustainable Communication Systems (ICESC 2022)
IEEE Xplore Part Number: CFP22V66-ART; ISBN: 978-1-6654-7971-4

tools are combined to assess and determine the state of human  This is necessary because, PIR sensor has a stop
movement. The distance between the radar and any objects time when it measures its sensor in an environment
found during the distance is one of the most widely used and stabilizes the infrared detector.
sources of information for human movement.  During this time, there should be very little so that
there is no movement before the sensor.
III. PROPOSED WORK  If the PIR sensor detects any movement, then PIR
sensor output is high.
This section provides a summary of the details and evaluation  Arduino then connected to the GSM module via a
process used in this project. This project is designed using the serial connection to dial a pre-programmed cell
PIR sensors. Highlights of the system are long-distance phone number.
downloads and robust integration software with a database  An important point to note about PIR sensors is that
containing the information about the user privilege. The the output will be high when it detects movement.
project has three main stages-  Occasionally the sensor output goes down, even
A. Increased awareness / sensitivity when there is a movement that may mislead the
B. Medium processing micro-controller to assume that there is no
C. Implementation / Action movement.
 This problem should be addressed in the Arduino
system by ignoring low output signals that have a
shorter duration than previously specified.
Camera
 This is done assuming that the pre-PIR sensor
movement is continuous.
Power Raspberry
A. Flow project chart-
supply pi

START: CAMERA
ATmega328 INPUT
Arduino
Nano

ENTER THEFT
Internet Owner

Fig.1 Block Diagram of Motion Detecting Security System PROSESSING

In the block diagram above, i.e. in the figure. 1 shows


the design of the system. The Raspberry Pi and camera
are the main components of the project. This is the main NO
controller for the whole project. This system will be an MOTION
intelligent system and can eliminate the need for DETECTED
continuous supervision by human resources. Therefore,
additional human work is excluded. In this project, a
Raspberry Pi 3 B (model) is used as the heart system. The YES PIR=1
system continuously checks with the sensor whether it
is entering the store and sends an alert message to the SEND ALERT SMS/IMAGE TO OWNER
owner along with the captured image. This security
system uses image processing technology to detect motion .
Devices will receive input from the system that can be
attached or fitted to a door or any other hidden area to activate END
the alarm of the motion sensing system.

Fig.2 Flow chart of the System


IV. IMPLEMENTATION

The implementation of this project is as follow:  Camera Input: - When we provide power supply
then the whole thing will start working. It need
6/12V power supply.

978-1-6654-7971-4/22/$31.00 ©2022 IEEE 614


Authorized licensed use limited to: PES University Bengaluru. Downloaded on October 10,2023 at 03:52:53 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Third International Conference on Electronics and Sustainable Communication Systems (ICESC 2022)
IEEE Xplore Part Number: CFP22V66-ART; ISBN: 978-1-6654-7971-4

 Enter Theft: - When all work is done and turn on the TABLE 1: RESULTS FOR MAXIMUM SENSITIVITY OF THE PIR
SENSOR
power supply then the camera starts capturing the images.
If someone comes in front of camera it will detect and
going for the next processing. Experiment PIR motion Open CV
 Processing: - The processing is done by the Arduino Uno, detection camera motion
Transformer and so on. detection
 Motion Detected: - If the motion is detected but it’s not a Accu Stream Accur Strea
theft then the processing back to the capturing process or racy ing acy ming
if the motion is detected then the PIR sensor sends the % latency % latenc
signal to the GSM module. (fps) y
(fps)
 Output: - When the motion is detected then by the GSM
module send the message to the mobile phone of the Human 100 100
owner. Detection
Motion detection under sunlight exposure:

10am 90 30-35 100 15-24


2pm 70 100
5pm 50 100
Non-human 70 100
detection
Overall 76 30-35 100 15-24

Fig .3 Project Hardware Model

The above model is consist of PIR sensor, Transformer, LCD


display, Camera, Arduino UNO, GSM module, Buzzer and
Power Supply.

V. RESULTS

Fig .5 Test of received SMS

A. Database and Server Tool:-


A database is a collection of information organized to
help computer programs quickly select the desired data.
The author of further defines it as a collection of data or
information specially organized for rapid computer
searches and searches. The database management system
(DBMS) responds to queries and extracts information from
the database. In fact, the database created for the security
system consists of two levels. Users and pivots. Users
include information such as usernames, passwords,
emails, phone numbers, and addresses. This information
is obtained from registered users to give staff access to video
information. The pivot contains the URL (video link) and
upload date. This helps distinguish between the video sent to
Fig.4 Motion Sensing Security System Output the server and the Raspberry Pi. After creating the

978-1-6654-7971-4/22/$31.00 ©2022 IEEE 615


Authorized licensed use limited to: PES University Bengaluru. Downloaded on October 10,2023 at 03:52:53 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Third International Conference on Electronics and Sustainable Communication Systems (ICESC 2022)
IEEE Xplore Part Number: CFP22V66-ART; ISBN: 978-1-6654-7971-4

database, I used the "bracket" software to create a PHP script


called "registration". This allows security VII. FUTURE SCOPE
system users to enroll in the system and store details in the
database. Appropriate authentication is performed each time Over time as we began to understand the smallest
a user logs in to prevent unauthorized users details of our work, we realized significantly that our
from accessing the system. The other two PHP software would be very important in the world to come. Put
scripts also work in conjunction with the Register PHP into effect the gadget in real time and test the device in a
script. The first PHP script is the connect-php massive variety of lengthy sequences. Identification of
script, which handles establishing a connection between the persons getting into premises the machine can apprehend
server and the database. The second is a PHP exciting human behavior. Authenticated users can briefly
script "adduser" that allows the user who entered the data to turn off the caution to apply remote login to go into the room.
be added to the database. The login PHP script is written to
allow registered users access to video feeds from the
security system. REFERENCES

TABLE 2: PERFORMANCE EVALUATION PIR-BASED MOTION [1] Purana and G.G. Modi, “Domestic Intruder System” .Indian Journal of
DETECTION AND OPENCV CAMERA-BASED MOTION DETECTION Computer Engineering., Vol.2, PP. 506-515, Sept.2011.
SYSTEMS [2] A. Upasana , B.Manisha,, G. Mohini,, and K .Pradnya,” Real Time Security
Using Human Motion Detection,” International Journal of Computer
Science and Mobile Computing. ,Vol. 4,PP 245-250, Nov. 2015
Distance in Buzzer ON/OFF Alert Send [3] P.B. Patel, V.M Choksi, S.J adhav, and M.B Potdar,” Smart Motion
meters Detection Using Raspberry Pi” .International Journal of Applied
Information Systems. ,Vol. 10, PP37- 40, Feb.2016
15 OFF NO [4] M.J Charadva,, R. V Sejpal , and N .P Sarwade, “ of Motion Detection
Method for Smart Home System”. International Journal of Innovative
10 OFF NO Research in Advanced Engineering.,Vol. 1, PP. 148-151, June.2014
[5] S.S.Kapre, S.S.Salunkhe, R.M.Thakkar , A.P.Pawar, and O.A. Malusare ”
Advanced Security Guard with PIR sensor for Commercial and Residential
8 ON YES use”. International Journal for Advance Research in Engineering and
Technology.,Vol.2 , PP. 29- 34,Nov.2014.
6 ON YES [6] R.Dellosa,” Development of an Anti- Theft Device using Motion Detection
and Body Temperature”. Asian Pacific Journal of Multidisciplinary
5 ON YES Research., Vol. 2 , PP. 121- 124, Dec.2014.
[7] P. Kharat, and J. Kharat ,”Wireless Intrusion Detection System Using
Wireless Sensor Network: A Conceptual Frame”. International Journal of
4 ON YES Electronics and Electrical Engineering.,Vol. 2 ,PP. 80-84, June.2014.
[8] J. Bangali , and A. Shaligram, (2013). Design and Implementation of
3 ON YES Security System for Smart Home based on GSM technology. International
Journal of Smart Home. Vol.7 , PP. 201-208, Dec.2013.
[9] D. Frelichowski.,K. Gosciewski , P.Forczmanski, and R. Hofman
,”SmartMonitor-An Intelligent Security System for the Protection of
Individuals and Small Properties with the Possibility of Home
VI. CONCLUSION Automation''. Open Access Sensors.,Vol. doi: 10.339, PP .9923-9948,
May.2014. 36
This Program is therefore a common home security [10] G.M.Joseph, E.L.Nwankwo, O.M.Eniola , and C.D.Eneh,” Design of a
Real –Time Microcontroller based GSM-Embedded Intrusion Security
system using a call function to connect the system with the System” .International Journal of Scientific and Engineering Research.,
user. This project can monitor a common home security Vol.6 , PP. 232-241, Dec. 2015.
system using a call function to connect the system with the [11] R.K.Mendoza.,B.J. Malijan, and R.B.Caldo,” Development of Smart Farm
user. This project can monitor the home/offices using PIR Security System with Alarm Mechanism Using Image Processing”, Lpu-
Laguna Journal of Engineering and Computer Studies., Vol 3, PP. 73-84,
sensors connected to the microcontroller and the GSM unit. Oct.2016.
GSM is used to call a purpose to the owner to inform the [12] A.V Bhatkuli, U.B .Shinde, and S.R .Zanwar, “ Home based Security
attacker that there is a burglar who has broken into the Control System Using Raspberry Pi and GSM”. International Journal of
house/offices. Calling method is used to notify users of a cell Innovative Research in Computer and Communication Engineering.,Vol.
4, PP. 16259-16264, Sept.2016.
phone in case of interference. The project model can be used [13] M.H. Jusoh, M.F .Bin Jamali , A.F.Bin Zainal Abidin ,A.A.Sulaiman and
in such as banks, office. Modern equipment has become M.F. Husin ,” Wi-Fi and GSM Based Motion Sensor for Home Security
ubiquitous, making it easy to reduce the chances of looting in System Application”. 4 th International Conference on Electronic Devices,
a number of different ways without the expenses of material Systems and Applications, Vol. doi: 10,1088, PP. 1-7, June.2015.
[14] O. Eseosa, and E. Promise,” GSM Based Intelligent Home Security System
resources. By lodging a complaint against such criminals/ for Intrusion Detection, “International Journal of Engineering and
thieves within the police. Stealing tactics are now in control, Technology.,Vol. 4, PP. 595-605, Oct.2014.
varying according to location and type. Here we conclude [15] B.O. Oyebola,,” Microcontroller based motion detection alarm System
that in order to provide security and privacy between user using PIR sensor”. The Saapade Journal of Management, Science and
Technology. Vol.1, PP .230-236, Oct.2015.
devices from thieves/burglars and any other malicious means [16] Chen, Joy Iong Zong, and Lu-Tsou Yeh. “Graphene based Web Framework
we have decided to establish such a system that will provide for Energy Efficient IoT Applications.” Journal of Information Technology
users with security and proof of their lost equipment that they 3, no. 01 (2021): 18-28.
can use. [17] Sathesh, A. “Computer Vision on IOT Based Patient Preference
Management System.” Journal of Trends in Computer Science and Smart
Technology 2, no. 2 (2020): 68-77.
[18] Jacob, I. Jeena, and P. Ebby Darney. “Design of Deep Learning Algorithm
for IoT Application by Image based Recognition.” Journal of ISMAC 3,

978-1-6654-7971-4/22/$31.00 ©2022 IEEE 616


Authorized licensed use limited to: PES University Bengaluru. Downloaded on October 10,2023 at 03:52:53 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Third International Conference on Electronics and Sustainable Communication Systems (ICESC 2022)
IEEE Xplore Part Number: CFP22V66-ART; ISBN: 978-1-6654-7971-4

no. 03 (2021): 276-290. [26] Rahul Agrawal, Dr. Preeti Bajaj, Presented Technical Paper on “EEG
[19] Patil, Prachu J., Ritika V. Zalke, Kalyani R. Tumasare, Bhavana A. Based Brain state Classification technique using Support Vector Machine -
Shiwankar, Shivani R. Singh, and Shailesh Sakhare. “IoT Protocol for A Design Approach”, 3rd International Conference
Accident Spotting with Medical Facility.” Journal of Artificial Intelligence on Intelligent Sustainable Systems (ICISS 2020) organized by SCAD
3, no. 02 (2021): 140-150. Institute of Technology, Palladam, India from 03- 05, December 2020
[20] Sharma, R. Rajesh. "Design of Distribution Transformer Health (Indexed by IEEE) ISBN: 978-1-7281-7089-3/20 2020 IEEE ,PP. 1523-
Management System using IoT Sensors." Journal of Soft Computing 1528.
Paradigm 3, no. 3 (2021): 192-204. [27] S. Sorte , P M Ghutke, W V Patil,S N Joshi, “Vision system check for
[21] Balasubramaniam, Vivekanadam. "IoT based Biotelemetry for Smart authentication of quality of industry automation for detection of system
HealthCare Monitoring System." Journal of Information Technology and parts using raspberry pi ”, Journal of Physics: Conference Series, Volume
Digital World 2, no. 3 (2020): 183-190. 1913, International Conference on Research Frontiers in Sciences (ICRFS
[22] Chetan Dhule, Rahul Agrawal, Sanjay Dorle, “Study of Design of IoT 2021) 5th-6th February 2021, Nagpur, India.
based Digital Board for Real Time Data Delivery on National Highway”, [28] Wani Videsh Patil, Prema Daigavane, “A Novel approach for the screening
6th International Conference on Inventive Computation Technologies and the classification of Macular Ischemia caused by Diabetic Retinopathy
(ICICT), 978-1-7281-8501-9/21/ 2021 IEEE, PP 841-844. Disease using Retinal Image Datasets” , 2015 7th International Conference
[23] Rahul Agrawal, Dr. Kapil Jajulwar, Urvashi Agrawal, “A Design Approach on Emerging Trends in Engineering & Technology (ICETET), 18-20 Nov.
for Performance Analysis of Infants Abnormality Using K Means 2015 , ISBN: 978-1-4673-8305-9, 2015, Doi: 10.1109/ICETET.2015.30.
Clustering” 5th International Conference on Trends in Electronics and [29] Nosiri O.C., Akwiwu-Uzoma C.C., Nmaju U.A., Emeziem C.H. “Motion
Informatics ICOEI 2021. 3-5, June 2021, 978-1-6654-1571-2/21 2021 Detector Security System for Indoor Geolocation”. International Journal of
IEEE, PP. 992-997. Engineering and Applied Sciences (IJEAS) ISSN: 2394-3661, Volume-5,
[24] Rahul Agrawal. Dr.Preeti Bajaj, “Comparative Classification Techniques Issue-11, November 2018.
for Identification of Brain States Using TQWT Decomposition” Journal of [30] Akey Sungheetha, Rajesh Sharma R. "Classification of Remote Sensing
Intelligent and Fuzzy Systems, IOS Press, Volume 41, Issue 5, pp. 5287– Image Scenes Using Double Feature Extraction Hybrid Deep Learning
5297.
Approach." Journal of Information Technology 3, no. 02 (2021): 133-149
[25] Ms. Swati Palheriya, Dr.S.S.Dorle, Prof. Rahul Agrawal,’’ Review On
[31] Chen, Joy Iong-Zong, and Jen-Ting Chang. "Route Choice Behavior
Human-Machine Interface based on EOG’’ International Journal of
Modeling using IoT Integrated Artificial Intelligence." Journal of Artificial
Science, Engineering and Technology Research (IJSETR) Volume 6, Issue
Intelligence 2, no. 04 (2020): 232- 237.
3, March 2017, ISSN: 2278 -7798,pp 317-319.

978-1-6654-7971-4/22/$31.00 ©2022 IEEE 617


Authorized licensed use limited to: PES University Bengaluru. Downloaded on October 10,2023 at 03:52:53 UTC from IEEE Xplore. Restrictions apply.

You might also like