Development of Smart Farm Security System With Alarm Mechanism Using Image Processing

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

LPU-Laguna Journal of Engineering and Computer Studies

Vol. 3 No.3 October 2016

Development of Smart Farm Security System with Alarm Mechanism using


Image Processing
Ronnel Kylon A. Mendoza1*, Bill Jay S. Malijan1, Rionel B. Caldo1
1Computer Engineering Department, Lyceum of the Philippines University – Laguna
Corresponding email: *ninekylon@yahoo.com

ABSTRACT significance. This area would set as a


Area security is very important nowadays,
support in characterizing the acceptability
no one wants their investments to be
ruined by someone who intends to rob or of the study.
destroy the property. The proponents
Background of the Study
came up with this research to strengthen
the existing security system and develop a
new way of securing a particular area. Agriculture plays an important part
This system will use image processing to
in an economy. Agriculture provides us
determine the identity of the one who
entered and distinguish if that one is food and raw material as well as
authorized personnel, an intruder, or a
employment chances to a massive extent
crop-destroying animal. A Closed-circuit
television (CCTV) will be used to monitor of population in our country. For decades,
the area and provide a video record for
agriculture had been connected with the
security purposes. A motion detector
controlled by the Arduino Microcontroller generation of fundamental nourishment
will be the one to address the Graphical
yields and farming was synonymous so
User Interface (GUI) that is to be
programmed by the proponents when to long as farming was not marketed. In any
take the snapshot on the video which is
case, as the procedure of financial
displayed on the GUI that will be used on
image processing to determine the identity advancement quickened, numerous more
of the captured object. An opto-isolator will
different occupations partnered to farming
be used as the switch for the alarming
system; it is connected on parallel port came to be perceived as a piece of
which is converted from USB port to
agriculture. Furthermore technology has
command when the switch will be on or
off. If the system detects that there is an assumed a major part in building up the
intruder or crop-destroying animal, an
farming business and has changed the
alarm will trigger until it is turned off by the
respondents. agricultural industry by substituting human
labor with machines that are activated or
Keywords: image processing, Closed-
circuit television, parallel port, USB port, controlled by people or other machines.
Graphical User Interface, opto-isolator.
Smart farming is commonly used by
agriculturist to make the quality and also
quantity of agricultural production using
detecting technology to make farms better
INTRODUCTION and more intelligent. This sort of
This section means to talk about the technology is also called precision
inspiration and achievements of the agriculture or also known as smart farming
research. It states the problem that leads where the idea is about how will observe,
the proponents with this study as well as measure and react to inter and intra-field
its background. The goals and extensions variability of crops.
of the task are expressed with its

73
LPU-Laguna Journal of Engineering and Computer Studies
Vol. 3 No.3 October 2016

Nowadays, security is becoming has an alarm which will trigger when a


an significant matter for farmers, despite movement recognized. So with this, the
that the threat of a violence on farm is proponents’ think of a system which is
marginal, we must consider our liability to security with alert mechanism which
criminal deeds such as robbery of farm includes recognition of undesirable
equipment or chemicals, criminal individual, creature or an item in an
disruption involving unsecured equipment ensured range, so at whatever point
and machinery, destruction of there's a suspicious intruders it will be
bioengineered plants, common vandalism. identify and set off the caution. In this
Acts of terrorism have elevated our case, the authorized personnel in a
consciousness of the requirement for particular area will be frightened that there
increased personal and farm security. is intruder distinguished.
Unauthorized access to farm chemicals
and application equipment are greatest Objectives of the Study
security danger to farms, nurseries and
greenhouses where plants are developed. The general objective of this study is
And as an adult we know that insecticides to develop a smart farm security system
should be stored away from children. In with alarm mechanism using image
addition, insecticides should be protected processing.
from trespassers, vandals, intruders, and Specifically, the study aims to:
thieves who may accidentally, or 1. Detect movements inside the
intentionally, use these chemicals to farm using motion sensor.
damage other individuals, crop or non- 2. Take a snapshot on the video
crop lands, the environment or even record that is displayed on
themselves. Be responsible for the safety the GUI by the control of
of yourself, your family, representatives, Arduino.
and your group. Set up your farm to 3. Process the captured image
endure the pressure of unauthorized in MatLab image processing
activity. Thus this study aims for the application.
solution for the problem. This system will 4. Determine if the moving
help to secure and monitor the particular object captured is an
area to lessen the time and effort of authorized personnel,
farmers. intruder or crop-destroying
animal by its color.
In due course, the proponents 5. Trigger the alarm based on
design and implemented a system that the detection.
utilizing a sensor and CCTV which the 6. Test the accuracy and
advocate will use to identify the trespasser reliability of the system.
inside the secured area and produce a
yield. This yield is a security system that

74
LPU-Laguna Journal of Engineering and Computer Studies
Vol. 3 No.3 October 2016

Significance of the Study


This project can contribute a Scope and Limitation of the Study
unique way of securing a certain place,
particularly, farms. Based on some studies The study includes image
the proponents have read, the security for processing using an application that
farms is only under surveillance of a process the captured image to determine
camera, no alarming system [2]. the identity of a certain object on the
photo, whether it is an animal or a person
We all know that in this country who intends to enter the farm. There is a
there are a lot of farm owners, a trusted motion detector to be placed inside the
security system is for sure what they want farm. The proposed farm to be built is a
to ensure the safety of their land. That is closed environment so that the motion
why it is important to develop this study to detector will be accurate on detecting
enhance the security level of such places some movements inside. If there is
like farms. something moving, the programmed GUI
in VB.NET by the proponents will
This study will have a large impact screenshot the video displayed on the
on education because we all know that application. Those captured images will be
planting is a part of basic education. By placed on a certain folder to be fetched by
the help of this study, the health of the the MatLab for the image analysis and
crops that can be used for academic pre-processing.
purposes will be longer because of proper
security that could happen using the Images will undergo in some
proposed system. process in order to identify the moving
object. The histogram of the image is one
Security system with alarm part; it is a graphical representation of the
mechanism is unusual because normally pixel’s number in an image as their
the existing security system for a particular intensity function. Next is the image
place is only monitoring using a camera. filtering, the linear filtering of an image is
What makes this study unique the image finished by an operation which is
that is captured by the camera will be convolution. It is an area operation in
processed using MatLab image which every yield pixel is the weighted
processing application to determine if the aggregate of neighboring information
one who is entering the farm is valid, and if pixels. The network of weights is known as
not, an alarm will occur right away by the the convolution bit, otherwise called the
control of the Opto-isolator until it is turned filter. Then the image binarization, the
off, so that no harm can happen on the input image will be converted to a binary
plants. The captured images will be placed by thresholding, getting the image edges
on a certain folder to be fetched by the and eroded.
MatLab to process the image.

75
LPU-Laguna Journal of Engineering and Computer Studies
Vol. 3 No.3 October 2016

The concept of the image limitation of hardware specifications to be


processing part is to detect if there was an used in the system.
intruder who entered the farm using a
surveillance camera, it is determined by REVIEW OF RELATED LITERATURES
the color which is set by the developer.
The image will undergo on some function This section focuses on related
in the image processing toolbox to come literature, studies and the synthesis. The
up with the desired result. If the color that proponents gathered some references that
is detected by the MatLab image would give them different ideas,
processing application does not match the perspectives and data in building up the
processed color of the photo captured, an study. By these studies, the proponents
alarm will trigger by the control of the could think of a generous learning about
Opto-isolator as the switch, it will be creating inventive thoughts that would add
turned off by the authorized personnel who to the study.
responded.
Based on the table of comparison,
The prototype is supported by an it can be seen that the research are done
alarm or a Piezo Buzzer that will trigger if with the same goal which is security using
the detection in the processed image is different methods and efficiency.
positive. In this case, the intruder or the Therefore, the proponents decided to
crops destroying animal may panic and improve the security of the smart farm by
destroy the crops but at least they will be implementing digitized and computerized
frightened and will go out of the farm. monitoring standards since it has not yet
been installed with any advanced security
The system is only capable of a medium. Furthermore, the proponents
single image process at a time. This designed a prototype that will monitor and
means if there is an on-going process of detect the security of smart farm by
the captured image; the system will stop capturing the image of the exact moment
taking snapshots of the video record until when something suspicious moves inside
the system is done processing the photo. the farm. If the detection is positive, an
alarm will trigger for the authorized
The study will only takes place on personnel to respond.
a certain part of the school which is
Lyceum of the Philippines-Laguna, the On the review of the related
proponents and their colleagues of the literatures, some have the same approach
related study will create a small farm to on improving the security of a certain
support the data and information that will place and also they have differences on
be used on the study. The proponents only some process that they tackle for the
consider daytime monitoring for the security purposes. There are some that
accuracy of the detection due to the used alarm mechanism, some used image

76
LPU-Laguna Journal of Engineering and Computer Studies
Vol. 3 No.3 October 2016

processing, but there is no study yet that


includes both intelligence in one system
for the security of a farm. That is why the
proponents came up with this kind of
research because security is more efficient
if detection using image processing is
linked with the alarm mechanism.

CONCEPTUAL AND THEORETICAL


FRAMEWORK Figure 1. Methods of Research

This chapter means to discuss the Figure 1 shows the methods of


research process followed by the research that is to be followed by the
proponents in the development of Smart proponents to accomplish the system.
Farm Security System with Alarm First is to analyze the existing problem
Mechanism and Notification using Image regarding the security of agricultural place.
Processing. This section includes the Next is to plan how to work and resolve
software and hardware to be used in the the problem. Then do the research
study and its process to come up with the processes in order to increase the
desired result. It approaches the knowledge and ideas about the system.
conceptual framework of the study as well Next, design the system according to what
as the theoretical. is planned, then develop it based on
problems that occurred. After that, do the
Conceptual Framework testing procedures and come up with
This research aims to develop a conclusions about the created system.
reliable security system for a Smart Farm
which is to be formed in a particular part of
Lyceum of the Philippines-Laguna. The
system includes image processing by
using MatLab, a major tool for image
processing procedure. Figure 1 represents
the high-level block diagram of the
proposed system for more comprehensible Figure 2. IPO Chart
procedures and Figure 2 is the methods of
research used by the proponents. The figure 2 above explains how the
system works and the needs to make it
work. The surveillance camera will
transmit the video record to the computer
server through Wi-Fi connection and will

77
LPU-Laguna Journal of Engineering and Computer Studies
Vol. 3 No.3 October 2016

be displayed on the GUI which is to be


programmed in by the proponents. If the
motion sensor detects movement, it will
command the application to take a
snapshot by the control of Arduino through
Wi-Fi connection also. The captured
image will be saved a certain storage file
and will be used for image processing for
detection purposes. If the system detects
that there is something or someone
unwanted in the farm, an alarm will trigger
for the authorized personnel to respond.

Figure 4. Flow Chart of the System

The figure above shows the flow


of the system. If the motion detector
detects something moving, the camera will
capture the image. The image will be
Figure 3. Block Diagram of the System
processed by MatLab for recognition
A part of the campus’ vacant lot
purposes. If the system recognizes
will be used by the proponents for the
something unwanted in the farm, an alarm
system to be implemented to be used in
will sound until it is turned off and a
the study. The proponents will use a
notification will be sent to the authorized
camera to record the video and to be
personnel for them to be aware on what
transmitted to the main server and be
happening in the farm. The camera will
displayed on GUI which is to be
transmit the video record to the main
programmed by the proponents in Visual
server through Wi-Fi connection and will
Basic.NET. If the sensor detects
be displayed on the GUI which is to be
movement, by the control of Arduino
programmed by the proponents. If the
Microcontroller the application will take a
motion sensor detects movement, it will
snapshot on the video and that image will
command the application to take a
be processed to monitor the condition of
snapshot by the control of Arduino through
the farm. The proponents only consider
Wi-Fi connection also. MatLab will be
daytime monitoring for the accuracy of the
opened by the control of GUI and the
detection due to the limitation of hardware
captured image will be saved in a certain
specifications to be used in the system.
storage file and later will be fetched by the
image processing application to be used
for detection purposes. If the system

78
LPU-Laguna Journal of Engineering and Computer Studies
Vol. 3 No.3 October 2016

detects that there is something unwanted discharged the .NET stage; it is a redesign
in the farm, an alarm will trigger for the variant of Visual Basic that takes after the
authorized personnel to be aware. .NET stage. VB.NET permits developers
to compose a Web or desktop application
Theoretical Framework and programming with the same dialect; it
Gizduino (Arduino Clone) is likewise completely protest situated as
restricted earlier forms that backing the
A pre-amassed Arduino board object-oriented dialect.
incorporates a microcontroller which is
modified utilizing Arduino programming VB.NET is an object-oriented
dialect and the Arduino improvement language that comprises of two basic
environment. In quintessence, this stage parts. First is the visual part, it contains of
gives an approach to construct and objects sets and second is the language
program electronic parts. Arduino part which is made of a high-level routine
programming dialect is a streamlined from programming language. These two
of C/C++ programming dialect in view of elements were combined to create a
what Arduino calls draws, which utilize different application which is usually seen
essential programming structures, inside the desktop.
variables, and capacities. These are then
changed over into a C++ program [13]. MatLab Image Processing

Arduino permits clients a basic MatLab is one application that has


pathway to make intuitive articles that can a superior language for specialized
take contribution from switches and computing. It can be utilized for
sensors, and control physical yields like processing, picturing, and programming a
lights, engines, or actuators. Since the simple to-use environment where the
dialect depends on very much utilized client can take care of the issues
structures, Arduino can collaborate with effortlessly, quick, and readably. It is
other programming on the PC like Flash or additionally an imparting framework whose
even web APIs like Twitter. essential information component is a
Visual Basic.NET cluster which does not require any
dimensioning on the framework. It is great
Visual Basic was presented as the in tackling network, vectors, or even a part
main programming dialect that backings to make the outcomes less complex and
programmable graphical client interfaces precise [14].
(GUI) utilizing dialect supplied objects. In
2002, there were other five renditions Toolbox for Image Processing
discharged in the business sector, each gives a complete arrangement of
has diverse elements to expand the force reference-standard such as calculations,
level of the dialect. In 2001, Microsoft capacities, and application utilized for

79
LPU-Laguna Journal of Engineering and Computer Studies
Vol. 3 No.3 October 2016

picture preparing, examination, convolution. It is an area operation in


representation, and calculation which every yield pixel is the weighted
improvement. It can perform picture aggregate of neighboring information
investigation and in addition picture pixels. The network of weights is known as
division, commotion lessening, picture the convolution bit, otherwise called the
upgrade, and a considerable measure of filter.
elements utilized for any picture exercises
or strategies to get the fundamental article Image Binarization
in the photograph. In utilizing this
programming application, you should In the binarization, the input image
consider the determination necessities on will be converted to a binary by
your desktop on the other hand PC like thresholding, getting the image edges and
multicore processors, GPUs, and C-code eroded.
era to run the programming smooth and
quick. Surveillance Camera (CCTV)

Toolbox for Image Processing Security cameras are a great


supports different arrangements of picture approach to give security to your home or
sorts, including high dynamic reach, working environment. And in addition
gigapixel resolution, installed ICC profile, furnishing you with video footage of any
and tomographic. In accordance with this occasions which may happen, they
perception capacity, it gives the clients a additionally go about as a noticeable
chance to investigate the picture, extricate obstacle to crooks. [26].
the picture at its most extreme capacity
and also recordings. Looking at the area of
pixels, modify shading and differentiate, or Motion Sensor
make histograms and control the whole
protest inside the application. The feature of "motion sensing" on
most lights is a system which is passive
Image Histogram and detects energy that is infrared. They
are known as PIR or passive infrared
The histogram of the image is a detector. So as to make a sensor that can
graphical representation of the pixel’s determine a person, you have to make the
number in an image as their intensity sensor touchy to human body
function. temperature. People, with a temperature
of skin around 93 degrees F, transmit
Image Filtering infrared vitality with a wavelength
somewhere around 9 and 10 micrometers.
The linear filtering of an image is Consequently, the sensors are regularly
finished by an operation which is

80
LPU-Laguna Journal of Engineering and Computer Studies
Vol. 3 No.3 October 2016

touchy in the scope of 8 to 12 micrometers influencing a lesser power framework


[27]. accepting a sign [28].
Proposed Design
Piezo Buzzer

An device in electronics routinely


used to make sound. Light in weight, clear
improvement and low esteem make it easy
to use in some applications like auto/truck
pivoting pointer, PCs, call ringers et
cetera. Piezo ringer relies on upon the
inverse rule of piezo force found by
Jacques and Mr. Pierre Curie. It is the Figure 5. Proposed Layout
miracles of making force when weight in
mechanical is associated with particular Figure 5 is a 2D layout of the
materials and the other route around is in proposed farm and explains that the
like manner substantial. Those materials camera/sensor cannot cover all the
are so called piezo electric. These
corners of the farm but can cover a wide
materials are either really open or range throughout the farm.
manufactured. Piezoceramic is class of
engineered material, which stances piezo
electric effect and is comprehensively
used to make plate, the heart of piezo
ringer. Right when subjected to a trading
electric field they develop or pack,
according to the repeat of the sign along
these lines making sound [29].
Opto-isolator

Figure 6. System Flow


An opto-isolator is a
In this research, the proponents
semiconductor gadget that uses an optical
aim to develop a system which will make
transmission shortly in a way to exchange
the target location more secured. This
an electrical sign between the circuits or
study includes image processing to secure
components of a circuit, while keeping
the Smart Farm that is to be developed.
them electrically disengaged from each
The image processing will help to detect
other. These parts are utilized as a part of
the objects that can harm the crops or
a wide assortment of interchanges, control
other equipment in the farm. If the
and observing frameworks that utilization
detection is positive, an alarm will sound
light to keep electrical high voltage from

81
LPU-Laguna Journal of Engineering and Computer Studies
Vol. 3 No.3 October 2016

for the person who guards the farm to be mad_Fadhil_Abdul_Malek_(_CD_


alert. 5414_).pdf

REFERENCES [6] R.Anandan, Mr.B.Karthik and


Dr.T.V.U.Kiran KumarWireless
[1] [Online]. Farm Security System (2013). Home and Industrial
Available:http://www.farmcameras. Automation Security System
com/farm-security.shtml Using GSM. Retrieved May 7,
[Accessed April 24, 2016]. 2016 from rroij.com/open-
access/wireless-home-and-
[2] C. Ford Runge and Juan industrial-automation-security-
Gonzalez-Valero (2011). The system-using-gsm-126-132.pdf
Theory and Practice of
Performance Indicators for [7] Yi Gu, Myoungjin Kim, Yun Cui
Sustainable Food Security: A and Hanku Lee (2012). An UPnP-
Checklist Approach. Retrieved Based Surveillance Camera
April 24, 2016 from System for Home Security.
ageconsearch.umn.edu/bitstream/ Retrieved May 7, 2016 from
117537/2/WP11-02.pdf smcc.konkuk.ac.kr/papers/2012%
20ICONI_Yi%20Gu.pdf
[3] [Online] Farm Security Cameras
Available:https://www.videosurveill [8] Masaki Fujikawa, Hiroshi Doi and
ance.com/farms.asp [Accessed Shigeo Tsujii (2006). Proposal for
April 24, 2016]. a New Home Security System in
terms of User-friendliness and
[4] S. Dharanya, V. Divya, S. Prompt Intrusion Notification.
Shaheen and A. Umamakeswar Retrieved May 7, 2016 from
(2013). Embedded Based 3G www.researchgate.net/publication/
Security System for Prison. 224057181_Proposal_for_a_New
Retrieved April 24, 2016 _Home_Security_System_in_term
from s_of_Userfriendliness_and_Promp
www.indjst.org/index.php/indjst/art t_Intrusion_Notification
icle/viewFile/33251/27554
[9] Jyotika Kapur and Akshay. J.
[5] Muhammad Fadhil Bin Abdul Baregar (2013). Security using
Malek (2010). Bluetooth-Triggered Image Processing. Retrieved May
Alarm Security System. Retrieved 7, 2016 from
May 6, 2016 from airccse.org/journal/ijmit/papers/52
umpir.ump.edu.my/1999/1/Muham 13ijmit02.pdf

82
LPU-Laguna Journal of Engineering and Computer Studies
Vol. 3 No.3 October 2016

[10] Bindiya Bansal and Kulwinder


Singh (2015). Rule Based [15] Lee Sang-Hyun, Jeong-Gi Lee
Intrusion Detection System to and Moon Kyung-Il (2013). Smart
Identify Attacking Behaviour and Home Security System Using
Severity of Attacks. Retrieved May Multiple ANFIS. Retrieved May 8,
7, 2016 from 2016 from
www.ijarcsse.com/docs/papers/Vo www.sersc.org/journals/IJSH/vol7
lume_5/1_January2015/V4I12- _no3_2013/11.pdf
0493.pdf
[16] Zixuan Song (2011). A Network
[11] Arturo Preciado Ruiz and based Home
Fernando Javier Ruiz (2006). Surveillance/Monitoring System.
Alarm System with Probabilistic Retrieved May 8, 2016 from
Reject of False Alert. Retrieved people.kth.se/~maguire/DEGREE-
May 7, 2016 from PROJECT-REPORTS/110604-
www.wacong.org/wac2006/allpap Zixuan_Song-with-cover.pdf
ers/isiac/isiac_117.pdf
[17] Giovanni Bocchetti, Concetta
[12] K. Kraus, O. Martikainen and R. Pragliola, Alfio Pappalardo and
RedaSecurity (2008). Francesco Flammini (2009).
Management Process for Video Dependable Integrated
Surveillance Systems in Surveillance Systems for the
Heterogeneous Communication Physical Security of Metro
Networks. Retrieved May 8, 2016 Railways. Retrieved May 8, 2016
from from
www.kiwisecurity.com/fileadmin/fil www.slideshare.net/flamminifra/de
es/publications/NETCON08_- pendable-integrated-surveillance-
_Security_Management_Process_ systems-for-the-physical-security-
KK02102008.pdf of-metro-railways-poster

[13] [Online]. TechoPedia. Arduino. [18] Bing-Fei Wu, Hsin-Yuan Peng and
Available:https://www.techopedia. Chao-Jung Chen (2006). A
com/definition/27874/arduino Practical Home Security System
[Accessed: May 8, 2016] via Mobile Phones. Retrieved May
8, 2016 from
[14] [Online]. Mat Lab citeseerx.ist.psu.edu/viewdoc/dow
Available:http://cimss.ssec.wisc.ed nload?doi=10.1.1.148.9886&rep=r
u/wxwise/class/aos340/spr00/what ep1&type=pdf
ismatlab.htm/ [Accessed: May 10,
2015]

83
LPU-Laguna Journal of Engineering and Computer Studies
Vol. 3 No.3 October 2016

[19] M. Sathishkumar and S.Rajini Security System with Face


(2015). Smart Surveillance Recognition, SMS Alert and
System Using PIR Sensor Embedded Network Video
Network and GSM. Retrieved May Monitoring Terminal. Retrieved
8, 2016 from ijarcet.org/wp- May 9, 2016 from
content/uploads/IJARCET-VOL-4- airccse.org/journal/ijsptm/papers/2
ISSUE-1-70-74.pdf 513ijsptm02.pdf

[20] S. Kanagamalliga, Dr. S. Vasuki, [24] Md Athiq UR Raza Ahamed M.


A. Vishnu Priya and V. Viji (2014). and Wajid Ahamed (2013). A
Security Monitoring Using Domestic Robot for Security
Embedded Systems. Retrieved Systems by Video Surveillance
May 9, 2016 from Using Zigbee Technology.
www.ijirset.com/upload/2014/iciet/ Retrieved May 9, 2016 from
eee/107_P31.pdf ijset.com/ijset/publication/v2s5/pa
per25.pdf
[21] Ashraf Elfasakhany, Jorge
Hernández, Juan Carlos García, [25] Gudipudi Sushma, Mary Joseph,
Mario Reyes and Francisco A.Ruth Tabitha and
Martell (2011). Design and M.B.Prashanth Yokesh (2015).
Development of a House-Mobile Image Tracking Based Home
Security System. Retrieved May 9, Security Using Arduino
2016 from Microcontroller. Retrieved May 9,
file.scirp.org/pdf/ENG2011120000 2016 from
7_26061490.pdf www.ijircce.com/upload/2015/etit/
23_IMAGE_TRACKING_BASED_
[22] Jayashri Bangali and Arvind HOME_SECURITY_USING_ARD
Shaligram (2013). Design and UINO_MICROCONTROLLER.pdf
Implementation of Security
Systems for Smart Home based [26] [Online] Available:
on GSM technology. Retrieved http://www.swann.com/au/security
May 9, 2016 from -cameras [Accessed May 17,
www.sersc.org/journals/IJSH/vol7 2016].
_no6_2013/19.pdf

[23] J. Shankar Kartik, K. Ram Kumar


and V.S. Srimadhavan (2013).

84

You might also like