A New Security Alarm Based on Interaction

Authors

  • Mehdi Gheisari Department of Cognitive Computing, Institute of Computer Science and Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, India
  • Yang Liu Department of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), China
  • Hamidreza Hajiaghai Department of Electrical Power Engineering, Islamic Azad University, Iran
  • Roghayeh Rezaei Department of Computer Engineering, Technical and Vocational University of Kosar, Iran
  • Naser Khodabakhshi-Javinani Electrical and Computer Engineering Department, Yadegar-e-Imam Khomeini (RAH) Shahre Rey Branch, Islamic Azad University, Iran
  • Saman Khammar Faculty of Electrical and Computer Engineering, University of Sistan and Baluchestan, Iran

DOI:

https://doi.org/10.61360/BoniGHSS242016870801

Keywords:

telephone, automatic bell ringer, call control, messaging systems

Abstract

An alarm or an alarm system is a device that warns or detects any violation of privacy in different places by making noise, sound, or warning the person in a variety of ways, including via email, SMS, phone call, or sounding. Alarms that are currently available in the market have different shapes and types. Generally, they have a common structure and their main purpose is similar to each other. There is another type of burglar alarm in the market, which is used today in certain places to protect property and assets, and in certain organizations such as banks and car alarms. This article reviews and presents a different alarm, whose main purpose is to provide possible security in public and private places, especially military places.

References

Abdullah, J. (2011). The design of mobile control car security system. IACSIT International Journal of Engineering and Technology, 3, Journal of Engineering and Development, 16 (2012). ISSN: 1813-7822 329.

Alarm Systems: A Guide to Design, Management and Procurement, (2013). The Engineering Equipment and Materials Users Association (EEMUA) publication No. 191.

Alarm-kravspesifikasjon for Amoco Norway Oil Company, Valhall CCR Upgrade Project, IFE/HR/F-99/1118.

Almasi, M. (2019). An investigation on face detection applications. International Journal of Computer Applications, 177, 17–23.

Almasi, M. (2020). Designing a non-contact sensor for capturing pacemaker. International Journal of Computer Trends and

Technology, 68, 43–48,

Almasi, M. (2020). Human movement analysis from the egocentric camera view. In International Conference on Electronics and Sustainable Communication Systems (ICESC). http://doi.org/ 10.1109/icesc48915.2020.9155757.

Almasi, M., & Alimardani, M. (2020). Application of self- organizing map for time-varying biological to predicting of complexity Systems. International Journal of Computer Trends and Technology, 68, 59–64,

Almasi, M., Fathi, H., Adel, S., & Samiee, S. (2019). Human action recognition through the first-person point of view, case study two basic task. International Journal of Computer Applications, 177, 19–23.

Cloud Based Intruder Security System Conference (2022). 16th International Conference on Intelligent Systems and Controls (ISCO’22) At: Karpagam College of Engineering, Coimbatore, Coimbatore, Tamil Nadu, India. http://doi.org/10.5281/zenodo.5839759

Gheisari, M., et al. (2022). A novel enhanced algorithm for efficient human tracking. International Journal of Informatics and Communication Technology, 11, 1–7.

Hasan, R., Khan, M. M., Ashek, A., & Rumpa, I. J. (2015).

Microcontroller based home security system with GSM technology. Open Journal of Safety Science and Technology, 5, 55–62. Published Online in SciRes. http://www.scirp.org/ journal/ojsst

Kaur, S., Singh, R., Khairwal, N., & Jain, P. (2016). Home automation and security system. Advanced Computational Intelligence: An International Journal (ASCII), 3, 17–23.

Khan, S. R., Al Mansur, A., Kabir, A., Jaman, S., & Chowdhury, N. (2012). Design and implementation of low-cost home security system using GSM network. International Journal of Scientific & Engineering Research, 3.

Liao, I. (2007). Infrared Remote Control Based on LCD Displayer and Speech Synthesizer, M.S. Theses of Electronic Engineering Dept., National Taiwan Technology and Science University.

Liu, X., & Jiang, S. (2017). The vehicle hijacking alarm system. In 2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD) (pp. 633–637). http://doi.org/10.1109/FSKD.2017.8393344.

Liu, Z., & He, G. (2005). A vehicle anti-theft and alarm system based on computer vision. In IEEE International Conference on Vehicular Electronics and Safety (pp. 326–330). http://doi.org/10.1109/ICVES.2005.1563666.

Mohsen, A., et al. (2015). An improved node scheduling scheme for resilient packet ring network. Majlesi Journal of Electrical Engineering, 9, 43.

Moshayedi, A. J., et al. (2022). Simulation and validation of optimized PID controller in AGV (Automated Guided Vehicles) model using PSO and BAS algorithms. Computational Intelligence and Neuroscience, 2022, Article ID 7799654, 22 pages. https://doi.org/10.1155/2022/7799654.

Nehmadi, L., & Meyer, J. (2011). A system for studying usability of mobile security. In Third International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU), San Francisco, CA, USA, June 12.

NORSOK Standard I-002.

Nusser, R., & Pelz, R. (2000). Bluetooth-based wireless connectivity in an automotive environment. In Proceedings of IEEE Vehicular Technology Conference (VTC), vol. 4 (pp. 1935–1942).

Nwalozie, G. C., Aniedu, A. N., Nwokoye, C. S., & Abazuonu, I. E. (2015). Enhancing home security using SMS-based intruder detection system. International Journal of Computer Science and Mobile Computing, 4, 1177–1184. Available Online at www.ijcsmc.com

Rahmani, A. I., Almasi, M., Saleh, N., & Katouli, M. (2020). Image fusion of noisy images based on simultaneous empirical wavelet transform. Traitement du Signal, 37, 703–710 .

Rashidi, F., Ariff, M., & Ibrahim, M. (2011). Car monitoring using bluetooth security system. In International Conference on Electrical, Control and Computer Engineering Pahang, Malaysia, June 21–22.

Requirement Specification for the HAMBO Alarm System, (2000). IFE/HR/F-2000/1141.

Salram, K., Gunasekaran, N., & Rama Reddy, S. (2002). Bluetooth in Wireless Communication. IEEE Communications Magazine, 90–96.

Sohr, K., Mustafa, T., & Nowak, A. (2011). Software security aspects of java-based mobile phones. In SAC 2011, Taichung, Taiwan, March 21–25.

Wu, B., Peng, H., & Chen, C. (2006). A practical home security system via mobile phones. In Proceedings of the 5th WSEAS International Conference on Telecommunications and Informatics, Istanbul, Turkey (pp. 299–304), May 27–29.

www.ptil.no

Yaraziz, M. Y., et al. (2022). Recent trends towards privacy- preservation in Internet of Things, its challenges and future directions. IET Circuits, Devices & Systems.

Yun, L., & YinGen, Y. (2009). Design and implementation of a mobile phone integrated alarming-system. In International Conference on Multimedia Information Networking and Security, IEEE.

Zainal Arifin, M. A., Kassim, M., Mahmud, A. R., & Izwan Suliman, S. (2019). Automation security system with laser lights alarm on web pages and mobile apps. In 2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE) (pp. 287–292). http://doi.org/10.1109/ISCAIE.2019.8743998.

Ziaei, S., & Almasi, M. (2020). Approaching mobile cloud computing, security issues, and challenges. In The 2nd. International Congress on Science & Engineering, Paris, France.

Downloads

Published

2024-08-29

Issue

Section

Research Article

How to Cite

A New Security Alarm Based on Interaction. (2024). Journal of Global Humanities and Social Sciences, 5(8), 300-303. https://doi.org/10.61360/BoniGHSS242016870801

Similar Articles

1-10 of 16

You may also start an advanced similarity search for this article.