This paper presents a secure and reliable home automation system in order to make everyone’s life simpler and fulfil the needs of the disabled or the elderly. The paper proposes a system based on efficient smart watch that uses arduino microcontroller which is embedded with a WIFI module and enables us to control a number of home appliances such as lights, fans and others using on/off relay. In our work, the appliances need not to be smart beforehand as arduino would be externally connected to them such that the system designed would be controlled by gestures i.e. users can control the working of the appliances by moving their hand in upward or downward direction over the screen. This system is comparatively efficient and cost effective than other proposed systems in terms of scalability and reliability. Also, the proposed system has been thoroughly tested and verified in various environmental conditions.
This paper compares the performance of three popular convolutional neural network (CNN) models, VGG-16, VGG-19, and ResNet-101, for the task of suspicious activity detection. The VGG networks are known for their depth and the use of small convolutional filters, while ResNet is known for its residual connections that allow for deeper networks without the issue of vanishing gradients. The study utilizes a dataset of surveillance videos for training and testing the models. The results show that the VGG-19 model outperforms the other two in terms of accuracy, specifically for the detection of suspicious activities. Overall, this study demonstrates the effectiveness of the three different models for suspicious activity detection and highlights its potential for use in real-world surveillance systems.
Hackers have started taking help from ancient techniques like Telepathy and Hypnosis as Psychotronic Weapons for committing cybercrimes. Psychotronic Weapons mean Brain Manipulation from a Distance. These weapons interact with the nervous system of the target individual, affecting the target's conscious and subconscious mind, and resulting in suffering. A TI is a person being tortured by Psychotronic Weapons [2]. There are a variety of means that are used remotely to harm and control their target. Some of these techniques are Voice-to-Skull (V2K), Synthetic Telepathy, Electronic Harassment, Microwave Hearing, Boys-to-School technology, Voice-of-God weapon, and Brain- Computer-Interface (BCI). You may have not heard of these terms earlier, but we found many websites dedicated to this phenomenon. These voices are being transmitted by microwaves and by misuse of online surveillance technologies. These methods, unfortunately, have become another tool to aid organized crimes run by criminals and terrorist groups worldwide. Media in the USA had widely reported such types of cybercrimes in the past decade. Their law enforcement agencies faced challenges to counter such offenses. We would like to bring to your attention an overview of this less talked about form of online crime and a few ways to protect ourselves from being its victims.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.