Professional Documents
Culture Documents
Call Alarm Artificial Intelligence Report Correct.
Call Alarm Artificial Intelligence Report Correct.
Call Alarm Artificial Intelligence Report Correct.
SUBMITTED TO THE
DEPARTMENT OF MECHATRONICS ENGINEERING
SCHOOL OF INDUSTRIAL AND MANUFACTURING ENGINEERING
YABA COLLEGE OF TECHNOLOGY, YABA LAGOS
AUGUST, 2022
CERTIFICATION
This is to certify that the project work was carried out by Julius Promise Ikechukwu F/ND/19/3450007, Odelana
Emmanuel Olamide F/ND/19/3450023, Akinyanran Samuel Ayomide F/ND/19/3450025, Zannu Abdulmalik
Ayomide F/ND/19/3450047 and Akindele Wasiu .O. F/ND/19/3450051 of the Department of Mechatronics
Engineering, School of Industrial And Maintenance Engineering, Yaba College Of Technology YABA, Lagos State,
under my supervision.
________________________________
_____________________________
ENGR. O. TAIRU
Supervisor DATE
____________________________________
_________________________________
_____________________________________
__________________________________
The sincere success and final outcome of this project required a lot of assistance from many people and we are
extremely privilege to have gotten this all along the completion of our project and we would not forget to
thank them and show them our profound gratitude. We respect and show appreciation to Mr. And Mrs. Julius,
Mr. And Mrs. Odelana, Mr. And Mrs. Akinyanran, Mr. And Mrs. Malik, Mr. And Mrs. Akindele for providing
us the financial and moral support, and also we really appreciate our project supervisor, the person of Engr. O.
Tairu who encouraged us during the project, and also give us the necessary guidance throughout the project
analysis.
ABSTRACT
Call alarm artificial intelligence is a 7th generation resolution of the modern security technology product man
has overseen. Far more reliable than our CCTV cameras and access control system, etc. It is new technology
that will create the potential threat and challenge to physical theft and hijackers in our homes, offices, etc.at
far distance and coordinate in jet mini second. We made use the apply sensors with electronics control
system. PIR motion sensors was used create a feedback loop to our electronics in a dynamic way beyond
usual Automation that not require physical contact. A fanciful robotic head was built to house the electronics
and synchronize both the electronics which is the mobile phone and the sensor together. It is very reliable
CHAPTER TWO
2.0 LITERATURE REVIEW
2.1 History of artificial intelligence
2.1.1 Concept of artificial intelligence
2.1.2 Artificial intelligence vs robotics
2.1.3 Importance of artificial intelligence
2.2 Concept of call alarm artificial intelligence
CHAPTER THREE
3.1 METHODOLOGY
3.2 Components Required
3.3 Machine assembly
3.4 Block diagram
3.5 Loading code and data
CHAPTER FOUR
4.0 Introduction
4.1 Results
4.2 Discussion
CHAPTER FIVE
5.1 Summary
5.2 Conclusion
5.3 Recommendation
1
CHAPTER ONE
INTRODUCTION
The day to day raising and progressing cyber security threat facing global businesses can be reduced by the
integration of Artificial Intelligence into cyber security systems. Machine learning and Artificial Intelligence
(AI) are being connected more extensively crosswise over industries and applications than any other time in
recent memory as computing power, storage capacities and data collection increase. This vast measure of
information can't be dealt with by people progressively. With machine learning and AI, that peak of data
could be carved down in fraction of time, which helps the enterprise to identify and recover from the security
threat.
intelligently, in the similar manner the intelligent humans think. AI is accomplished by studying how human
brain thinks and how humans learn, decide, and work while trying to solve a problem, and then using the
outcomes of this study as a basis of developing intelligent software and systems. Intelligence is commonly
considered as the ability to collect knowledge and reason about knowledge to solve complex problems. In the
near future intelligent machines will replace human capabilities in many areas. Artificial Intelligence is the
study and developments of intelligent machines and software that can reason, learn, gather knowledge,
John McCarthy coined the term in 1956 as branch of computer science concerned with making computers
behave like humans. It is the study of the computation that makes it possible to perceive reason and act.
Artificial Intelligence is different from psychology because it emphasis on computation and is different from
computer science because of its emphasis on perception, reasoning and action. It makes machines smarter and
more useful.
Artificial Intelligence or AI is the intelligence shown by machines. When any machine becomes aware of its
surroundings and does something keeping that in mind in order to achieve something. Usually the term
2
Artificial Intelligence is used when a machine behaves like a human in activities such as problem solving or
The maturation of the Information Age has forced some adaptation and evolution in our laws, regulations, and
policies. But the pace and intensity of technological change has often made it difficult for the policy,
regulations, and laws to keep up. As has been the case in other periods of intense change, the lag in the
For example, data-laden societies are currently re-evaluating acceptable personal standards of privacy. This is
necessary given the growing use of ubiquitous data collection and powerful, cheaply run, and readily available
algorithms. The legal standards of reason- able or acceptable privacy need renegotiation to accommodate new
technologies that are being adopted at pace and scale. There is a lot at stake (Ohm, 2009; Davis and Osoba,
2016): health data privacy, consumer fairness, and even the constitutional Census mandate.
The emergence of AI in cyber security: Machine learning and Artificial Intelligence (AI) are being connected
Other time in recent memory as registering power, information accumulation and capacity abilities increment.
This tremendous trove of information is significant grub for AI, which can process and examine everything
caught to see new patterns and subtle elements. For cyber security, this implies new endeavours and
shortcomings can rapidly be recognized and investigated to help moderate further assaults. It can take a
portion of the weight off human security "partners." They are cautioned when an activity is required, yet in
addition can invest their energy taking a shot at more inventive, productive undertakings
All we need for this project is an iron sheet (2mm thick), a sensor (PIR Sensor), and coupling of the electronic
3
Firstly, we cut and weld the iron sheets together for the development of our chassis to house the electronic
components.
We connect negative (black) wire from the battery with negative (black) wire from sensor, we then connect
yellow (signal) wire from sensor with one wire from call button, it doesn’t matter which. We connect positive
(red) wire from battery with green (input voltage) wire from sensor.
And both wires we connect and solder to the one pin from switch. We connect and solder other wire from
The problem solving of this project is to create an undetectable call alarm artificial intelligence system using a
sensor and call button using an old mobile phone which can be used for the security of home, office,
organization.
1.4 Advantages
1.5 Limitations
There’s slight possibility of alarm distortion and the system can be hacked by a professional programming
The aim of this study is to design a machine that secured the office or home from unauthorized access with
the use of a PIR motion sensor to track any movement across it and a call button for notification or alarming.
4
In the world we are today, AI technology has helped in many ways to keep developing the world because
technology is one the reason why the world is revolving in great development. AI helps in the following;
The main objectives of this study is to create a standard home alarming system using a call button and a
security of house
Security of belongings
Security of property
Security of body.
The study determined the use of Artificial intelligence secure the office from unauthorized access with the use
of a PIR motion sensor to track any movement across it. It is the best form of advance security because it is
unnoticeable by criminals. This project serves as an ease to the security world, we have heard and seen so
many advancement in security today, example, and the surveillance camera. But this project is the advanced
surveillance because it doesn’t need the use of camera but uses a PIR motion sensor and a call button to detect
body movement and it detects unauthorized access. We are going to do some programming on it for it to be
able to know the unauthorized to detect because if not we won’t know well from bad and right from left.
5
1.8 Scope of the Project
The call alarm artificial intelligence project is a rising advanced project. It is far beyond just giving
notification and sending signals. The project is equipped with sensor (PIR Sensor) to track and detect
Call alarm artificial intelligence is about how to make a call alarm with old mobile phone. It is a device that
uses a sensor to detect movements. It simply involves the components and an old mobile phone, with a
comprehensive connection.
We connect the sensor to the call button of the old mobile phone. Then, we save the number of the owner on
outgoing calls. So that when the sensor sense any movement it automatically call the owner. Remember in the
outgoing calls we only save just the number where we want to call our mobile alarm (dialled call) only.
6
CHAPTER TWO
Earlier studies carried out in related research works by various authors available in the literatures which are
obtained from the past and recent publications in learned journals are summarized as follows:
The idea of 'a machine that thinks' dates back to ancient Greece. But since the advent of electronic
computing (and relative to some of the topics discussed in this article) important events and
milestones in the evolution of artificial intelligence include the following:
1950: Alan Turing publishes Computing Machinery and Intelligence. In the paper, Turing—
famous for breaking the Nazi's ENIGMA code during WWII—proposes to answer the
question 'can machines think?' and introduces the Turing Test to determine if a computer can
demonstrate the same intelligence (or the results of the same intelligence) as a human. The
value of the Turing test has been debated ever since.[2]
1956: John McCarthy coins the term 'artificial intelligence' at the first-ever AI conference at
Dartmouth College. (McCarthy would go on to invent the Lisp language.) Later that year,
Allen Newell, J.C. Shaw, and Herbert Simon create the Logic Theorist, the first-ever running
AI software program.[1]
1967: Frank Rosenblatt builds the Mark 1 Perceptron, the first computer based on a neural
network that 'learned' though trial and error. Just a year later, Marvin Minsky and Seymour
Papert publish a book titled Perceptrons, which becomes both the landmark work on neural
networks and, at least for a while, an argument against future neural network research
projects.
1980s: Neural networks which use a back-propagation algorithm to train itself become widely
used in AI applications.
1997: IBM's Deep Blue beats then world chess champion Garry Kasparov, in a chess match
(and rematch).
2011: IBM Watson beats champions Ken Jennings and Brad Rutter at Jeopardy!
2015: Baidu's Minwa supercomputer uses a special kind of deep neural network called a
convolutional neural network to identify and categorize images with a higher rate of accuracy
than the average human.
2016: Deep Mind's AlphaGo program, powered by a deep neural network, beats Lee Sodol,
the world champion Go player, in a five-game match. The victory is significant given the huge
number of possible moves as the game progresses (over 14.5 trillion after just four moves!).
Later, Google purchased Deep Mind for a reported USD 400 million.
7
Artificial Intelligence term was coined by John McCarthy in 1956. He defined it as "the science and
engineering of making intelligent machines.” AI is the branch of computer science which deals with the
study and design of intelligent agents that perceives its environment and takes actions which maximize its
chances of success. AI may be defined as: “The ability to hold two different ideas in mind at the same time
and still remain the ability to function”. But AI must include the learning from past experience, reasoning for
the decision making, inference power and quick response. Also it must be able to take decisions on the basis
of priorities and tackle complexity and ambiguity. Machines programmed to carry out tasks, when carried out
by humans would require intelligence, are said to possess artificial intelligence. AI's scientific goal is to
understand intelligence by building computer programs that exhibit intelligent behaviour by using symbolic
inference, or reasoning inside the machine. AI definition is not time-independent. It gives the judgment of any
Artificial intelligence (AI) is a branch of computer science. It involves developing computer programs to
complete tasks which would otherwise require human intelligence. AI algorithms can tackle learning,
AI is used in many ways within the modern world, from personal assistants to self-driving car. Artificial
intelligence (AI) is evolving rapidly. While science fiction every so often portraits AI as robots closely as
possible to humans.
However, Robotics is a branch of technology which deals with robots. Robots are programmable machines
which are usually able to carry out a series of actions autonomously, or semi-autonomously.
8
1. Robots interact with the physical world via sensors and actuators.
Robots are "usually" autonomous because some robots aren't. Telerobots, for example, are entirely controlled
Eventually, artificially intelligent robots are the bridge between robotics and AI. These are robots which are
controlled by AI programs.
Many robots are not artificially intelligent. Up until quite recently, all industrial robots could only be
programmed to carry out a repetitive series of movements. As we have discussed, repetitive movements do
not require artificial intelligence. Non-intelligent robots are quite limited in their functionality. AI algorithms
are often necessary to allow the robot to perform more complex tasks.
Game Playing: You can buy machines that can play master level chess for a few hundred dollars. There is
some AI in them, but they play well against people mainly through brute force computation--looking at
hundreds of thousands of positions. To beat a world champion by brute force and known reliable heuristics
Speech Recognition: In the 1990s, computer speech recognition reached a practical level for limited
purposes. Thus United Airlines has replaced its keyboard tree for flight information by a system using speech
recognition of flight numbers and city names. It is quite convenient. On the other hand, while it is possible to
instruct some computers using speech, most users have gone back to the keyboard and the mouse as still more
convenient.
9
Understanding Natural Language: Just getting a sequence of words into a computer is not enough.
Parsing sentences is not enough either. The computer has to be provided with an understanding of the domain
the text is about, and this is presently possible only for very limited domains.
Computer Vision: The world is composed of three-dimensional objects, but the inputs to the human eye
and computers' TV cameras are two dimensional. Some useful programs can work solely in two dimensions,
but full computer vision requires partial three-dimensional information that is not just a set of two-
dimensional views. At present there are only limited ways of representing three-dimensional information
directly, and they are not as good as what humans evidently use.
Expert Systems: A ``knowledge engineer'' interviews experts in a certain domain and tries to embody their
knowledge in a computer program for carrying out some task. How well this works depends on whether the
intellectual mechanisms required for the task are within the present state of AI. When this turned out not to be
so, there were many disappointing results. One of the first expert systems was MYCIN in 1974, which
diagnosed bacterial infections of the blood and suggested treatments. It did better than medical students or
practicing doctors, provided its limitations were observed. Namely, its ontology included bacteria, symptoms,
and treatments and did not include patients, doctors, hospitals, death, recovery, and events occurring in time.
Its interactions depended on a single patient being considered. Since the experts consulted by the knowledge
engineers knew about patients, doctors, death, recovery, etc., it is clear that the knowledge engineers forced
what the experts told them into a predetermined framework. The usefulness of current expert systems depends
Heuristic Classification: One of the most feasible kinds of expert system given the present knowledge of
AI is to put some information in one of a fixed set of categories using several sources of information. An
example is advising whether to accept a proposed credit card purchase. Information is available about the
owner of the credit card, his record of payment and also about the item he is buying and about the
10
establishment from which he is buying it (e.g., about whether there have been previous credit card frauds at
this establishment).
Remote management of several home and office appliances is a subject of growing interest and in recent years
we have seen many systems providing such controls. In this study, we have developed a cellular phone based
home/office remote controller equipped with power controllers, an alarm system, a voice memory and a back-
up battery unit. In traditional PSTN based remote controllers, the user always has the possibility of line cuts
due to fires or professional burglars cutting the wires before getting to work. Our system eliminates such
The system consists of an 89C51 micro controller unit, a 8870 tone decoder, a cellular phone, an ISD voice
message unit, driver circuitry for the power control of the home appliances, and finally an alarm unit
embedded into the system structure. To activate the cellular phone unit on the system a call has to be made
and following the response the user has to enter a 3 digit password to access the system in order to control it.
In cases of false/null passwords the system switches back to its normal operation mode.
As we stated above the alarm system can be switched on/off by the remote user. When it is on, it
continuously monitors fire and PIR (Passive Infrared) detectors. Up to 8 detectors can be used for this
purpose. In case of any event the 89C51 micro controller (MC) executes the alarm routine, and communicates
with the mobile phone to call up to 5 different numbers including the fire brigade, the police, the owner of the
premises, etc. giving the prerecorded voice message. The received DTMF (Dual Tone Multi Frequency) codes
are decoded by the 8870 DTMF tone decoder. These codes are then fed to the micro controller. The voice
message unit consists of an ISD60 voice memory that allows the recorded voice message to be played to the
You will need an old cell phone that has an actual physical keypad, and ideally one that isn't a clamshell
design. The idea is to trigger a speed dial to the phone you actually use when a door is opened. Those old
11
phones usually have a long battery life, so you can leave it in place for extended periods of time. You will,
however, need a working Sim card for this project. But, it won't be making many calls, so you set it up with a
very cheap prepaid plan. Including a PIR motion sensor. To start, you will program the phone number you
want it to call to one of the speed dial buttons. Then, crack open the case and locate the PCB with the keypad
buttons. Soldier two very thin enameled wires to the buttons pads, and put the phone back together with those
wires existing the case. Next, attach the wires to the PIR motion sensor.
1. Reactive Machines
2. Limited Memory
3. Theory of mind
4. Self – aware
1. Reactive Machines: Reactive Machines perform basic operations. This level of AI is the simplest.
These types react to some input with some output. There is no learning that occurs. A machine
learning that takes human face as input and output a box around the face to identify it as a face is a
2. Limited Memory: Limited Memory types refer to an AI's ability to store previous data and or
predictions, using that data to make better predictions. With limited Memory, machine learning
architecture becomes a little more complex. Every machine learning model requires limited Memory
to be created.
12
3.Theory of mind : We have yet to reach theory of mind artificial intelligence types. These are only in
their beginning phases and can be seen in things like self-driving cars. In this type of AI, AI begins to
4. Self - aware: Finally, in some distance future, perhaps AI achieves nirvana. It becomes self-aware.
13
CHAPTER THREE
3.1 METHODOLOGY
This is gradual process involved in each stages of the project when been undertaking
PIRs are basically made of a Pyro electric sensor (which you can see below as the round metal can with a
rectangular crystal in the centre), which can detect levels of infrared radiation. Everything emits some low
level radiation, and the hotter something is, the more radiation is emitted. The sensor in a motion detector is
actually split in two halves. The reason for that is that we are looking to detect motion (change) not average
IR levels. The two halves are wired up so that they cancel each other out. If one half sees more or less IR
radiation than the other, the output will swing high or low.
2. 1k Resistor
This resistor performs two functions. 1) It is a pull-down resistor. 2) It is part of a voltage divider. This
14
3. 2N2222 Transistor
The 2N2222 is a common NPN bipolar junction transistor (BJT) used for general purpose low-power
amplifying or switching applications. It is designed for low to medium current, low power, medium voltage,
6. 2x LED Bulbs
15
7. Jumper Wires
Jumper wires are electrical wires with connector pins at each end. They are used to connect two points in
a circuit without soldering. You can use jumper wires to modify a circuit or diagnose problems in a
circuit.
8. Tweezers
Tweezers (or Forceps) are an extension of our fingers and they allow us to grab, grip, place, remove or
hold items that are too small or delicate for our fingers to manipulate. The size and shape of the items
we grab, grip, place or hold necessitate the need for a variety of tweezers tip styles and shapes. Tweezers
is used during the soldering process to hold and solidified lead away from soldering surface.
9. SPDT Switch
An SPDT switch or Single Pole Double Throw switch is a type of switch that has only one input but two
inputs. It can control two electrical circuits by making or breaking the contacts with two positions. It
16
10. 9v (6F22) Battery
A nine-volt battery, either disposable or rechargeable, is usually used in smoke alarms, smoke detectors,
walkie-talkies, transistor radios, test and instrumentation devices, medical batteries, LCD displays,
It is used in this project to connect the call button of the mobile phone with the components of the device
or project.
17
3.3 Machine Assembly
Put the iron sheet (2mm thick) together for cut marking so it can be worked on.
Cut the sheet into desired shape of design according to the chasis spec.
Finally paint the final result for perfect result and couple all the electronics components in it.
Input Voltage
Batery
Charge
Unit
Battery Alarm
Clock
DTMF Data 89 C 51
GSM Tone Micro
Decoder Controller
Out 1
Out 2 Driver
Out 3
18
3.5 Load code and data
<End/> program.
19
CHAPTER FOUR
This is part contains the result of effectiveness of the call alarm artificial intelligence project
e ENGINEERS INVOLVED: 5
50%
40%
(Percent
30%
age)
20%
10%
(System
Elec involve
Mec d)
trica
Pro
hani
l gra
cal 20
mmi
%
30
ng 20
%
50
%
CHALLENGES STATUS
Programming PIR motion sensor Bug
AMO
MATERIAL UNT
NEEDED KEY USES REQUIRED
PIR motion sensor To detect moving object 1
1k resistor To oppose current flow in circuit 3
2N2222 Transistor For amplification 3
2x330ohmsresistor To oppose current flow 3
Led bulb As a load source 2
Jumper wires To connect loads and transfer current 10
Tweezers For adjusting components in the 1
electronics
SPDT switch To turn current ON/OFF 1
9V (6F22) battery Source of input energy 2
Old mobile phone Source of receiver and transmitter 1
Sim card Service provider 1
4.2 Discussion
The reason for this project is to reduce the risk of theft in our homes, offices etc. using this security module
criminal victims will be caught easily. It is more reliable than the cctv camera. It is a device that uses a sensor
21
to detect movements. It simply involves the components and an old mobile phone. With comprehensive
connections we connect the sensor to the call of the old mobile phone. It is also aimed at providing the
following;
1. Tightening security of properties and belongings at our home, office, company, etc.
CHAPTER FIVE
5.1 Summary
22
In chapter one, the background to the study gives the insight to call alarm artificial intelligence and the
development of artificial intelligence, the design summary was stated, the problem solving was highlighted,
the advantages, limitations, aims and objectives, significance of the study and the scope of the project was
also listed.
In chapter two, related literature were reviewed and the theory postulated by different authors was examined,
The third chapter of this project examined the methodology used in carrying out the research work. The
components required were listed, the machine assembly was discussed, the block diagram was indicated and
In chapter four, the result of the study were analysed and examined and represented in a chart diagram for
easy reading.
And finally chapter five, the summary, conclusion and recommendation were stated.
5.2 Conclusion
On the basis of the project, the study explains the importance of artificial intelligence not just for security
purpose but also for fun and relaxation (games), home automation, etc. and the reason more technology
5.3 Recommendation
To help increase the usage of call alarm artificial intelligence to the public to their home, offices, interest, the
23
1. Size of device: This is a very important recommendation since our technology are being
replaced by Micro-Electronics. Reducing the size of our CAAI (call alarm artificial intelligence) to a
2. Calibration: The CAAI device should be designed in a way that novice can have an easy access to its
usage. With simple and non-complicated settings various user without computer or electronics
REFERENCES
R. Saracco, "Computers keep getting better … than us," IEEE Future Directions, 2018.
S. Gadam, "Artificial Intelligence and Autonomous Vehicles," 19 April 2018. [Online]. Available:
24
https://medium.com/datadriveninvestor/artificial-intelligence-and-autonomous-vehicles-ae877feb6cd2.
European Commission, "Ethics guidelines for trustworthy AI," European Commission, 2019.
A. Price, "First International Standards committee for entire AI ecosystem," e-tech, no. 03/2018, 2018.
C. Kumar, "Artificial Intelligence: Definition, Types, Examples, Technologies," 31 August 2018. [Online].
Available: https://medium.com/@chethankumargn/artificial-intelligence-definition-types-examples-
technologies-962ea75c7b9b.
Arbib, Michael A. (Ed.) (1995), “The Handbook of Brain Theory and Neural Networks”, p. 666
Bostrom, Nick (2005) "A history of transhumanist thought" , Journal of Evolution and Technology, p. 2-21
Brook R.A. “Intelligence without representation-Artificial Intelligence” 1991,p.139-159 Nagrath I.D. and
Gopal M. “Control Systems
Engineering” New Age International Publications. PC "Fuzzy Logic and Neural Networks - Practical Tools
for Process Management", May/June, 1994, p.17
Surinder Kumar and Jha A.K. “CAD/CAM”
of BCA & M.Sc SS, Sri Krishna Arts and Science College, Tamilnadu 2,3 III
M.Sc SS, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College,
Tamilnadu
Press. 2007.
[8] NabaSuroor and Syed Imtiyaz Hassan, “Identifying the factors of modern
Expert System.Proc.
Approach”, 2000.
department,2007-11-12.
26
H. Goktas, N. Daldal, published 2006,engineering, Gazi university journal of science.
B. Koyuncu, “PC Remote Control of Appliances By Using Telephone Lines”,IEEE Trans. Consumer
S. Schneider, J. Swanson and P-Y. Woo, “Remote Telephone Control System”, IEEE Trans. Consumer
I. Coskun and H. Ardam, “A Remote Controller for Home and Office Appliances by Telephone”, IEEE
Trans. Consumer Electron. , vol. 44, no. 4, pp. 1291-1297, November 1998
E. Wong, “A Phone-Based Remote Controller For Home And Office Automation”, IEEE Trans. Consumer
C. L. Churms, V. M. Prozesky and K. A. Springhorn , “The remote control of nuclear microprobes over the
Internet”, Nuclear Instruments and Methods in Physics Research Section B: Beam Interactions with
Topalis E, Mandalos L, Koubias S, Papadopoulos G, Nikiforakis I., “A novel architecture for remote home
ensuringQoS support by using RSVP technology”, IEEE Transactions On Consumer Electronics, Vol:48
27
Al-Ali AR, Al-Rousan M., “Java-based home automation system”, IEEE Transactions On Consumer
DaldalNihat, “GSM Based Security and Control System” (In Turkish), M.Sc. Term Project, Gazi University,
Ankara, 2003.
Https://www.makeuseof.com>Android
Https://www.pinterest.com>pin
Https://www.bmc.com/blogs/artificial-intelligence-types/
Https://www.hackster.io/news/turn-that-old-cell-phone-into-a-diy-home-security-alarm.
Https://www.sciencedirectcom>article>pii.com
http://www-formal.stanford.edu/jmc/whatisai/node1.html
http://www-formal.stanford.edu/jmc/whatisai/node2.html
http://www-formal.stanford.edu/jmc/whatisai/
http://www-formal.stanford.edu/jmc/whatisai/node3.html
http://www-formal.stanford.edu/jmc/whatisai/node4.html
http://en.wikipedia.org/wiki/Artificial_intelligence
http://future.wikia.com/wiki/Artificial_Intelligence
28
29