Design and Development of Monitoring and Self-Intrusion System
Achuthakannan A1, V Chentala2, Siddharth Chander3, DG. Y. Rajaa Vikhram4

1Achuthakannan A*, B.Tech EIE, SRM Institute of Science and Technology, Chengalpattu, India.
2V Chentala, B.Tech EIE, SRM Institute of Science and Technology, Chengalpattu, India.
3Siddharth Chander, B.Tech EIE, SRM Institute of Science and Technology, Chengalpattu, India.
4Dr. G. Y. Rajaa Vikhram, Assistant. Prof. of EIE dept., SRM Institute of Science and Technology, Chengalpattu, India. 

Manuscript received on March 28, 2020. | Revised Manuscript received on April 25, 2020. | Manuscript published on April 30, 2020. | PP: 2176-2179 | Volume-9 Issue-4, April 2020. | Retrieval Number: D9063049420/2020©BEIESP | DOI: 10.35940/ijeat.D9063.049420
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Let’s talk about security at a private access place taking into account the amount of effort one wants to keep it as such only listed personnel to enter, but intrusions are found, and raising security and scanning alone doesn’t bring down one such issue.These days we find that most of the research has a much higher usage of servers which is termed expensive as to run the processing of the software. Few places would not be able to afford such costs. The objective of this project is to provide a surveillance and a self-monitoring intrusion system that ensures regular checking, from the current surveillance of a security personnel. This software aims to classify the people entering and leaving a particular place with a whitelist. This will also help exercise caution that can be implemented in places that require inspection. This system is programmed to alert real-time intrusion to the owner and/or security via MMS. We want to make sure to build a prototype that can sustain such parameters and be market-ready. The core theme of the project is to have another set of surveillance integration to warn/alert the respected person about an intrusion per se someone who’s not in the whitelist mentioned.
Keywords: CNN, Deep Learning for training, Raspberry p, Twilio, Adafruit Servo Driver