Dual-Level Secured Autonomous Bank Locker System
نویسندگان
چکیده
The proposed development intends to establish an autonomous bank locker using industry-standard innovative technologies deliver more flexible and reasonably priced semi-autonomous security mechanisms with minimal human intervention. In this design, there are two layers of security. system in effort is a better regarding the number tiers. Its primary base facial recognition. first level implemented by asking user input passkey. A matrix keypad Python programming both employed. then authorized continue subsequent stage if match confirmed exist. second was programming, OpenCV software, face detection identification techniques. To make Windows compatible third-party apps Putty Xming, Raspberry Pi linked laptop IEEE 802.3 Ethernet X11 forwarding on UBUNTU operating system. 802.11 USB Wi-Fi used connect devices network. HAAR standard has been for because its Face Acceptance Rejection Ratio. EIGENFACES employed recognition due efficacy, robustness, simplicity.
منابع مشابه
Anti Collision and Secured Level Crossing System
The road and rail accidents are increasing with the advancement of human errors. Majority of the level crossing positions are not guided by any accident preventive mechanism and even not accompanied by a skilled person. This paper presents an automatic rail gate control system at level crossing positions and accident prevention mechanism. Two vibration sensors are used to control the open and c...
متن کاملMulti-Level and Secured Agent-Based Intrusion Detection System
Since Intrusion Detection System IDS has become necessary security tool for detecting attacks on computer network and resources, it is essential to improve previous designs. Recently many mobile agent-based IDSs have been designed, but there are still some drawbacks. Some of these drawbacks are lowdetection efficiency,high false alarm rate and agent security. A multi-level and secured IDS archi...
متن کاملSecureD: A Secure Dual Core Embedded Processor
Security of embedded computing systems is becoming of paramount concern as these devices become more ubiquitous, contain personal information and are increasingly used for financial transactions. Security attacks targeting embedded systems illegally gain access to the information in these devices or destroy information. The two most common types of attacks embedded systems encounter are code-in...
متن کاملSystem Level Modelling of Autonomous Microsystem
We propose a multidisciplinary approach for embedded autonomous microsystems design. Such devices are usually performed with batteries involving the introduction of cables and a limited lifetime. Our aim is to support the design of autonomous microsystems able to harvest the available energy in their environment. Microsystem design requires multidisciplinary skills to get efficient structures t...
متن کاملSecured remote health monitoring system
Wireless medical sensor network is used in healthcare applications that have the collections of biosensors connected to a human body or emergency care unit to monitor the patient's physiological vital status. The real-time medical data collected using wearable medical sensors are transmitted to a diagnostic centre. The data generated from the sensors are aggregated at this centre and transmitte...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal on Recent and Innovation Trends in Computing and Communication
سال: 2023
ISSN: ['2321-8169']
DOI: https://doi.org/10.17762/ijritcc.v11i4.6452