Call Alarm Artificial Intelligence Report Correct.

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 35

CALL ALARM ARTIFICIAL INTELLIGENCE

(An automated device used for office security)


BY
JULIUS PROMISE IKECHUKWU F/ND/19/3450007
ODELANA EMMANUEL OLAMIDE F/ND/19/3450023
AKINYANRAN SAMUEL AYOMIDE F/ND/19/3450025
ZANNU ABDULMALIK AYOMIDE F/ND/19/3450047
AKINDELE WASIU OLADIMEJI F/ND/19/3450051

SUBMITTED TO THE
DEPARTMENT OF MECHATRONICS ENGINEERING
SCHOOL OF INDUSTRIAL AND MANUFACTURING ENGINEERING
YABA COLLEGE OF TECHNOLOGY, YABA LAGOS

IN PARTIAL FULFILMENT OF THE REQUIREMENT FOR


THE AWARD OF ORDINARY NATIONAL DEPLOMA IN
MECHATRONICS ENGINEERING

AUGUST, 2022
CERTIFICATION

This is to certify that the project work was carried out by Julius Promise Ikechukwu F/ND/19/3450007, Odelana
Emmanuel Olamide F/ND/19/3450023, Akinyanran Samuel Ayomide F/ND/19/3450025, Zannu Abdulmalik
Ayomide F/ND/19/3450047 and Akindele Wasiu .O. F/ND/19/3450051 of the Department of Mechatronics
Engineering, School of Industrial And Maintenance Engineering, Yaba College Of Technology YABA, Lagos State,
under my supervision.

________________________________
_____________________________
ENGR. O. TAIRU

Supervisor DATE

____________________________________
_________________________________

ENGR. JUMMAH, A.A

Project Coordinator DATE

_____________________________________
__________________________________

ENGR. O. TAIRU DATE

H.O.D (MECHATRONICS ENGINEERING)


DEDICATION
This research work is dedicated to almighty God, who is the source of our knowledge and to our individual

parents who contributed enormously to the project.


ACKNOWLEDGEMENT

The sincere success and final outcome of this project required a lot of assistance from many people and we are

extremely privilege to have gotten this all along the completion of our project and we would not forget to

thank them and show them our profound gratitude. We respect and show appreciation to Mr. And Mrs. Julius,

Mr. And Mrs. Odelana, Mr. And Mrs. Akinyanran, Mr. And Mrs. Malik, Mr. And Mrs. Akindele for providing

us the financial and moral support, and also we really appreciate our project supervisor, the person of Engr. O.

Tairu who encouraged us during the project, and also give us the necessary guidance throughout the project

analysis.
ABSTRACT

Call alarm artificial intelligence is a 7th generation resolution of the modern security technology product man

has overseen. Far more reliable than our CCTV cameras and access control system, etc. It is new technology

that will create the potential threat and challenge to physical theft and hijackers in our homes, offices, etc.at

far distance and coordinate in jet mini second. We made use the apply sensors with electronics control

system. PIR motion sensors was used create a feedback loop to our electronics in a dynamic way beyond

usual Automation that not require physical contact. A fanciful robotic head was built to house the electronics

and synchronize both the electronics which is the mobile phone and the sensor together. It is very reliable

than just cameras taking pictures


TABLE OF CONTENT
TITLE PAGE
DECLARATION
CERTIFICATION
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENT
CHAPTER ONE
1.1 INTRODUCTION
1.2 Design Summary
1.3 Problem Solving
1.4 Advantages
1.5 Limitations
1.6 Aims and Objective
1.7 Significance of the Project
1.8 Scope of the project

CHAPTER TWO
2.0 LITERATURE REVIEW
2.1 History of artificial intelligence
2.1.1 Concept of artificial intelligence
2.1.2 Artificial intelligence vs robotics
2.1.3 Importance of artificial intelligence
2.2 Concept of call alarm artificial intelligence

CHAPTER THREE
3.1 METHODOLOGY
3.2 Components Required
3.3 Machine assembly
3.4 Block diagram
3.5 Loading code and data

CHAPTER FOUR
4.0 Introduction
4.1 Results
4.2 Discussion

CHAPTER FIVE
5.1 Summary
5.2 Conclusion
5.3 Recommendation

1
CHAPTER ONE

INTRODUCTION

The day to day raising and progressing cyber security threat facing global businesses can be reduced by the

integration of Artificial Intelligence into cyber security systems. Machine learning and Artificial Intelligence

(AI) are being connected more extensively crosswise over industries and applications than any other time in

recent memory as computing power, storage capacities and data collection increase. This vast measure of

information can't be dealt with by people progressively. With machine learning and AI, that peak of data

could be carved down in fraction of time, which helps the enterprise to identify and recover from the security

threat.

Artificial Intelligence is a way of making a computer, a computer-controlled robot, or a software think

intelligently, in the similar manner the intelligent humans think. AI is accomplished by studying how human

brain thinks and how humans learn, decide, and work while trying to solve a problem, and then using the

outcomes of this study as a basis of developing intelligent software and systems. Intelligence is commonly

considered as the ability to collect knowledge and reason about knowledge to solve complex problems. In the

near future intelligent machines will replace human capabilities in many areas. Artificial Intelligence is the

study and developments of intelligent machines and software that can reason, learn, gather knowledge,

communicate, manipulate and perceive the objects.

John McCarthy coined the term in 1956 as branch of computer science concerned with making computers

behave like humans. It is the study of the computation that makes it possible to perceive reason and act.

Artificial Intelligence is different from psychology because it emphasis on computation and is different from

computer science because of its emphasis on perception, reasoning and action. It makes machines smarter and

more useful.

Artificial Intelligence or AI is the intelligence shown by machines. When any machine becomes aware of its

surroundings and does something keeping that in mind in order to achieve something. Usually the term
2
Artificial Intelligence is used when a machine behaves like a human in activities such as problem solving or

learning, which is also known as Machine Learning.

The maturation of the Information Age has forced some adaptation and evolution in our laws, regulations, and

policies. But the pace and intensity of technological change has often made it difficult for the policy,

regulations, and laws to keep up. As has been the case in other periods of intense change, the lag in the

evolution of laws and regulations can lead to significant policy gaps.

For example, data-laden societies are currently re-evaluating acceptable personal standards of privacy. This is

necessary given the growing use of ubiquitous data collection and powerful, cheaply run, and readily available

algorithms. The legal standards of reason- able or acceptable privacy need renegotiation to accommodate new

technologies that are being adopted at pace and scale. There is a lot at stake (Ohm, 2009; Davis and Osoba,

2016): health data privacy, consumer fairness, and even the constitutional Census mandate.

The emergence of AI in cyber security: Machine learning and Artificial Intelligence (AI) are being connected

more comprehensively crosswise over enterprises and applications than any

Other time in recent memory as registering power, information accumulation and capacity abilities increment.

This tremendous trove of information is significant grub for AI, which can process and examine everything

caught to see new patterns and subtle elements. For cyber security, this implies new endeavours and

shortcomings can rapidly be recognized and investigated to help moderate further assaults. It can take a

portion of the weight off human security "partners." They are cautioned when an activity is required, yet in

addition can invest their energy taking a shot at more inventive, productive undertakings

1.2 Design Summary

All we need for this project is an iron sheet (2mm thick), a sensor (PIR Sensor), and coupling of the electronic

components for the construction and success of this project.

3
Firstly, we cut and weld the iron sheets together for the development of our chassis to house the electronic

components.

We connect negative (black) wire from the battery with negative (black) wire from sensor, we then connect

yellow (signal) wire from sensor with one wire from call button, it doesn’t matter which. We connect positive

(red) wire from battery with green (input voltage) wire from sensor.

And both wires we connect and solder to the one pin from switch. We connect and solder other wire from

button call to the other pin from switch.

1.3 Problem Solving

The problem solving of this project is to create an undetectable call alarm artificial intelligence system using a

sensor and call button using an old mobile phone which can be used for the security of home, office,

organization.

1.4 Advantages

 Easy to construct and easy to build

 It’s undetectable by unauthorised visitor or criminals

 Maintenance cost is very less

 Means of operation is widely used and reliable

1.5 Limitations

There’s slight possibility of alarm distortion and the system can be hacked by a professional programming

hacker in the field.

1.6 Aims and Objectives of the Study

The aim of this study is to design a machine that secured the office or home from unauthorized access with

the use of a PIR motion sensor to track any movement across it and a call button for notification or alarming.

4
In the world we are today, AI technology has helped in many ways to keep developing the world because

technology is one the reason why the world is revolving in great development. AI helps in the following;

1. Comprehensive learning in such a way it makes learning easy

2. Ability to manipulate objects

3. Natural language processing

4. Security and guards

5. Business enhancement and development

6. Programming functions ability

The main objectives of this study is to create a standard home alarming system using a call button and a

sensor for the;

 security of house

 Security of belongings

 Security of property

 Security of body.

1.7 Significant of the Project

The study determined the use of Artificial intelligence secure the office from unauthorized access with the use

of a PIR motion sensor to track any movement across it. It is the best form of advance security because it is

unnoticeable by criminals. This project serves as an ease to the security world, we have heard and seen so

many advancement in security today, example, and the surveillance camera. But this project is the advanced

surveillance because it doesn’t need the use of camera but uses a PIR motion sensor and a call button to detect

body movement and it detects unauthorized access. We are going to do some programming on it for it to be

able to know the unauthorized to detect because if not we won’t know well from bad and right from left.

5
1.8 Scope of the Project

The call alarm artificial intelligence project is a rising advanced project. It is far beyond just giving

notification and sending signals. The project is equipped with sensor (PIR Sensor) to track and detect

movement and call button to notify the owner of a system breached.

Call alarm artificial intelligence is about how to make a call alarm with old mobile phone. It is a device that

uses a sensor to detect movements. It simply involves the components and an old mobile phone, with a

comprehensive connection.

We connect the sensor to the call button of the old mobile phone. Then, we save the number of the owner on

outgoing calls. So that when the sensor sense any movement it automatically call the owner. Remember in the

outgoing calls we only save just the number where we want to call our mobile alarm (dialled call) only.

It can be used in an office, at home, an organization, to detect movement and presence.

6
CHAPTER TWO

2.0 LITERATURE REVIEW

Earlier studies carried out in related research works by various authors available in the literatures which are

obtained from the past and recent publications in learned journals are summarized as follows:

2.1 History of Artificial Intelligence

The idea of 'a machine that thinks' dates back to ancient Greece. But since the advent of electronic
computing (and relative to some of the topics discussed in this article) important events and
milestones in the evolution of artificial intelligence include the following:
 1950: Alan Turing publishes Computing Machinery and Intelligence. In the paper, Turing—
famous for breaking the Nazi's ENIGMA code during WWII—proposes to answer the
question 'can machines think?' and introduces the Turing Test to determine if a computer can
demonstrate the same intelligence (or the results of the same intelligence) as a human. The
value of the Turing test has been debated ever since.[2]
 1956: John McCarthy coins the term 'artificial intelligence' at the first-ever AI conference at
Dartmouth College. (McCarthy would go on to invent the Lisp language.) Later that year,
Allen Newell, J.C. Shaw, and Herbert Simon create the Logic Theorist, the first-ever running
AI software program.[1]
 1967: Frank Rosenblatt builds the Mark 1 Perceptron, the first computer based on a neural
network that 'learned' though trial and error. Just a year later, Marvin Minsky and Seymour
Papert publish a book titled Perceptrons, which becomes both the landmark work on neural
networks and, at least for a while, an argument against future neural network research
projects.
 1980s: Neural networks which use a back-propagation algorithm to train itself become widely
used in AI applications.
 1997: IBM's Deep Blue beats then world chess champion Garry Kasparov, in a chess match
(and rematch).
 2011: IBM Watson beats champions Ken Jennings and Brad Rutter at Jeopardy!
 2015: Baidu's Minwa supercomputer uses a special kind of deep neural network called a
convolutional neural network to identify and categorize images with a higher rate of accuracy
than the average human.
 2016: Deep Mind's AlphaGo program, powered by a deep neural network, beats Lee Sodol,
the world champion Go player, in a five-game match. The victory is significant given the huge
number of possible moves as the game progresses (over 14.5 trillion after just four moves!).
Later, Google purchased Deep Mind for a reported USD 400 million.

2.1.1 Concept of Artificial Intelligence

7
Artificial Intelligence term was coined by John McCarthy in 1956. He defined it as "the science and

engineering of making intelligent machines.” AI is the branch of computer science which deals with the

study and design of intelligent agents that perceives its environment and takes actions which maximize its

chances of success. AI may be defined as: “The ability to hold two different ideas in mind at the same time

and still remain the ability to function”. But AI must include the learning from past experience, reasoning for

the decision making, inference power and quick response. Also it must be able to take decisions on the basis

of priorities and tackle complexity and ambiguity. Machines programmed to carry out tasks, when carried out

by humans would require intelligence, are said to possess artificial intelligence. AI's scientific goal is to

understand intelligence by building computer programs that exhibit intelligent behaviour by using symbolic

inference, or reasoning inside the machine. AI definition is not time-independent. It gives the judgment of any

system by keeping time in mind.

2.1.2 Artifical Intelligence vs Robotics

Artificial intelligence (AI) is a branch of computer science. It involves developing computer programs to

complete tasks which would otherwise require human intelligence. AI algorithms can tackle learning,

perception, problem-solving, language-understanding and/or logical reasoning.

AI is used in many ways within the modern world, from personal assistants to self-driving car. Artificial

intelligence (AI) is evolving rapidly. While science fiction every so often portraits AI as robots closely as

possible to humans.

However, Robotics is a branch of technology which deals with robots. Robots are programmable machines

which are usually able to carry out a series of actions autonomously, or semi-autonomously.

There are three main important factors which constitute a robot:

8
1. Robots interact with the physical world via sensors and actuators.

2. Robots are programmable.

3. Robots are usually autonomous or semi-autonomous.

Robots are "usually" autonomous because some robots aren't. Telerobots, for example, are entirely controlled

by a human operator but telerobotics is still classed as a branch of robotics.

Eventually, artificially intelligent robots are the bridge between robotics and AI. These are robots which are

controlled by AI programs.

Many robots are not artificially intelligent. Up until quite recently, all industrial robots could only be

programmed to carry out a repetitive series of movements. As we have discussed, repetitive movements do

not require artificial intelligence. Non-intelligent robots are quite limited in their functionality. AI algorithms

are often necessary to allow the robot to perform more complex tasks.

2.1.3 Importance of Artificial Intelligence

 Game Playing: You can buy machines that can play master level chess for a few hundred dollars. There is

some AI in them, but they play well against people mainly through brute force computation--looking at

hundreds of thousands of positions. To beat a world champion by brute force and known reliable heuristics

requires being able to look at 200 million positions per second.

 Speech Recognition: In the 1990s, computer speech recognition reached a practical level for limited

purposes. Thus United Airlines has replaced its keyboard tree for flight information by a system using speech

recognition of flight numbers and city names. It is quite convenient. On the other hand, while it is possible to

instruct some computers using speech, most users have gone back to the keyboard and the mouse as still more

convenient.

9
 Understanding Natural Language: Just getting a sequence of words into a computer is not enough.

Parsing sentences is not enough either. The computer has to be provided with an understanding of the domain

the text is about, and this is presently possible only for very limited domains.

 Computer Vision: The world is composed of three-dimensional objects, but the inputs to the human eye

and computers' TV cameras are two dimensional. Some useful programs can work solely in two dimensions,

but full computer vision requires partial three-dimensional information that is not just a set of two-

dimensional views. At present there are only limited ways of representing three-dimensional information

directly, and they are not as good as what humans evidently use.

 Expert Systems: A ``knowledge engineer'' interviews experts in a certain domain and tries to embody their

knowledge in a computer program for carrying out some task. How well this works depends on whether the

intellectual mechanisms required for the task are within the present state of AI. When this turned out not to be

so, there were many disappointing results. One of the first expert systems was MYCIN in 1974, which

diagnosed bacterial infections of the blood and suggested treatments. It did better than medical students or

practicing doctors, provided its limitations were observed. Namely, its ontology included bacteria, symptoms,

and treatments and did not include patients, doctors, hospitals, death, recovery, and events occurring in time.

Its interactions depended on a single patient being considered. Since the experts consulted by the knowledge

engineers knew about patients, doctors, death, recovery, etc., it is clear that the knowledge engineers forced

what the experts told them into a predetermined framework. The usefulness of current expert systems depends

on their users having common sense.

 Heuristic Classification: One of the most feasible kinds of expert system given the present knowledge of

AI is to put some information in one of a fixed set of categories using several sources of information. An

example is advising whether to accept a proposed credit card purchase. Information is available about the

owner of the credit card, his record of payment and also about the item he is buying and about the

10
establishment from which he is buying it (e.g., about whether there have been previous credit card frauds at

this establishment).

2.2 Concept of Call Alarm Artificial Intelligence

Remote management of several home and office appliances is a subject of growing interest and in recent years

we have seen many systems providing such controls. In this study, we have developed a cellular phone based

home/office remote controller equipped with power controllers, an alarm system, a voice memory and a back-

up battery unit. In traditional PSTN based remote controllers, the user always has the possibility of line cuts

due to fires or professional burglars cutting the wires before getting to work. Our system eliminates such

disadvantages with its unique properties.

The system consists of an 89C51 micro controller unit, a 8870 tone decoder, a cellular phone, an ISD voice

message unit, driver circuitry for the power control of the home appliances, and finally an alarm unit

embedded into the system structure. To activate the cellular phone unit on the system a call has to be made

and following the response the user has to enter a 3 digit password to access the system in order to control it.

In cases of false/null passwords the system switches back to its normal operation mode.

As we stated above the alarm system can be switched on/off by the remote user. When it is on, it

continuously monitors fire and PIR (Passive Infrared) detectors. Up to 8 detectors can be used for this

purpose. In case of any event the 89C51 micro controller (MC) executes the alarm routine, and communicates

with the mobile phone to call up to 5 different numbers including the fire brigade, the police, the owner of the

premises, etc. giving the prerecorded voice message. The received DTMF (Dual Tone Multi Frequency) codes

are decoded by the 8870 DTMF tone decoder. These codes are then fed to the micro controller. The voice

message unit consists of an ISD60 voice memory that allows the recorded voice message to be played to the

telephone numbers that are called in case of any event.

You will need an old cell phone that has an actual physical keypad, and ideally one that isn't a clamshell

design. The idea is to trigger a speed dial to the phone you actually use when a door is opened. Those old
11
phones usually have a long battery life, so you can leave it in place for extended periods of time. You will,

however, need a working Sim card for this project. But, it won't be making many calls, so you set it up with a

very cheap prepaid plan. Including a PIR motion sensor. To start, you will program the phone number you

want it to call to one of the speed dial buttons. Then, crack open the case and locate the PCB with the keypad

buttons. Soldier two very thin enameled wires to the buttons pads, and put the phone back together with those

wires existing the case. Next, attach the wires to the PIR motion sensor.

Categories of Artificial Intelligence (AI)

1. Reactive Machines

2. Limited Memory

3. Theory of mind

4. Self – aware

1. Reactive Machines: Reactive Machines perform basic operations. This level of AI is the simplest.

These types react to some input with some output. There is no learning that occurs. A machine

learning that takes human face as input and output a box around the face to identify it as a face is a

simple reactive machine.

2. Limited Memory: Limited Memory types refer to an AI's ability to store previous data and or

predictions, using that data to make better predictions. With limited Memory, machine learning

architecture becomes a little more complex. Every machine learning model requires limited Memory

to be created.

12
3.Theory of mind : We have yet to reach theory of mind artificial intelligence types. These are only in

their beginning phases and can be seen in things like self-driving cars. In this type of AI, AI begins to

interact with the thoughts and emotions of humans.

4. Self - aware: Finally, in some distance future, perhaps AI achieves nirvana. It becomes self-aware.

This kind of AI exists only in story.

13
CHAPTER THREE

3.1 METHODOLOGY

This is gradual process involved in each stages of the project when been undertaking

3.2 COMPONENTS REQUIRED

1. PIR Motion Sensor

PIRs are basically made of a Pyro electric sensor (which you can see below as the round metal can with a

rectangular crystal in the centre), which can detect levels of infrared radiation. Everything emits some low

level radiation, and the hotter something is, the more radiation is emitted. The sensor in a motion detector is

actually split in two halves. The reason for that is that we are looking to detect motion (change) not average

IR levels. The two halves are wired up so that they cancel each other out. If one half sees more or less IR

radiation than the other, the output will swing high or low.

2. 1k Resistor

This resistor performs two functions. 1) It is a pull-down resistor. 2) It is part of a voltage divider. This

allows the threshold voltage to be set to the desired value.

14
3. 2N2222 Transistor

The 2N2222 is a common NPN bipolar junction transistor (BJT) used for general purpose low-power

amplifying or switching applications. It is designed for low to medium current, low power, medium voltage,

and can operate at moderately high speeds.

5. 2x330 Ohm Resistor

6. 2x LED Bulbs

15
7. Jumper Wires

Jumper wires are electrical wires with connector pins at each end. They are used to connect two points in

a circuit without soldering. You can use jumper wires to modify a circuit or diagnose problems in a

circuit.

8. Tweezers

Tweezers (or Forceps) are an extension of our fingers and they allow us to grab, grip, place, remove or

hold items that are too small or delicate for our fingers to manipulate. The size and shape of the items

we grab, grip, place or hold necessitate the need for a variety of tweezers tip styles and shapes. Tweezers

is used during the soldering process to hold and solidified lead away from soldering surface.

9. SPDT Switch

An SPDT switch or Single Pole Double Throw switch is a type of switch that has only one input but two

inputs. It can control two electrical circuits by making or breaking the contacts with two positions. It

has one input terminal and two output terminals.

16
10. 9v (6F22) Battery

A nine-volt battery, either disposable or rechargeable, is usually used in smoke alarms, smoke detectors,

walkie-talkies, transistor radios, test and instrumentation devices, medical batteries, LCD displays,

and other small portable appliances.

11. Old Mobile Phone

It is used in this project to connect the call button of the mobile phone with the components of the device

or project.

12. Sim Card

17
3.3 Machine Assembly

 Put the iron sheet (2mm thick) together for cut marking so it can be worked on.

 Cut the sheet into desired shape of design according to the chasis spec.

 Weld, smothering, brushing all parts together.

 Finally paint the final result for perfect result and couple all the electronics components in it.

We chose this design, for it is not a suspicious chassis.

3.4 Circuit diagram and block diagram

Input Voltage
Batery
Charge
Unit
Battery Alarm

Clock

DTMF Data 89 C 51
GSM Tone Micro
Decoder Controller

ISD60 PIR Fire

Out 1

Out 2 Driver

Out 3

Block Diagram of the System

18
3.5 Load code and data

//C: <print> Command // >

/C: <print> switch 1 ---- on <yes> if no <> switch 2

// C: double --- sensor input <> if yes <> call.

<End/> program.

19
CHAPTER FOUR

This is part contains the result of effectiveness of the call alarm artificial intelligence project

4.1 Result summary

PRELIMINARY: An automated device used for office security. An integration of

ent mechatronics for a shift of paradigm.

e ENGINEERS INVOLVED: 5

50%

40%

(Percent
30%

age)
20%

10%

(System
Elec involve
Mec d)
trica
Pro
hani
l gra
cal 20
mmi
%
30
ng 20

%
50
%

CHALLENGES STATUS
Programming PIR motion sensor Bug

Helmet Casting Measurement & Dimension

AMO
MATERIAL UNT
NEEDED KEY USES REQUIRED
PIR motion sensor To detect moving object 1
1k resistor To oppose current flow in circuit 3
2N2222 Transistor For amplification 3
2x330ohmsresistor To oppose current flow 3
Led bulb As a load source 2
Jumper wires To connect loads and transfer current 10
Tweezers For adjusting components in the 1
electronics
SPDT switch To turn current ON/OFF 1
9V (6F22) battery Source of input energy 2
Old mobile phone Source of receiver and transmitter 1
Sim card Service provider 1
4.2 Discussion

The reason for this project is to reduce the risk of theft in our homes, offices etc. using this security module

criminal victims will be caught easily. It is more reliable than the cctv camera. It is a device that uses a sensor
21
to detect movements. It simply involves the components and an old mobile phone. With comprehensive

connections we connect the sensor to the call of the old mobile phone. It is also aimed at providing the

following;

1. Tightening security of properties and belongings at our home, office, company, etc.

2. It promotes advancement of technology worldwide.

3. It is a reliable security device.

4. It is easy and not complex to use.

CHAPTER FIVE

SUMMARY, CONCLUSION AND RECOMMENDATIONS

5.1 Summary
22
In chapter one, the background to the study gives the insight to call alarm artificial intelligence and the

development of artificial intelligence, the design summary was stated, the problem solving was highlighted,

the advantages, limitations, aims and objectives, significance of the study and the scope of the project was

also listed.

In chapter two, related literature were reviewed and the theory postulated by different authors was examined,

concept of artificial intelligence, artificial intelligence vs robotics, importance of artificial intelligence,

concept of call alarm artificial intelligence were reviewed.

The third chapter of this project examined the methodology used in carrying out the research work. The

components required were listed, the machine assembly was discussed, the block diagram was indicated and

the loading code and data were listed.

In chapter four, the result of the study were analysed and examined and represented in a chart diagram for

easy reading.

And finally chapter five, the summary, conclusion and recommendation were stated.

5.2 Conclusion

On the basis of the project, the study explains the importance of artificial intelligence not just for security

purpose but also for fun and relaxation (games), home automation, etc. and the reason more technology

devices need to be built with it.

5.3 Recommendation

To help increase the usage of call alarm artificial intelligence to the public to their home, offices, interest, the

following recommendations are proposed:

23
1. Size of device: This is a very important recommendation since our technology are being

replaced by Micro-Electronics. Reducing the size of our CAAI (call alarm artificial intelligence) to a

grain size makes it more mobile and easily calibrate.

2. Calibration: The CAAI device should be designed in a way that novice can have an easy access to its

usage. With simple and non-complicated settings various user without computer or electronics

knowledge can understand.

REFERENCES

R. Saracco, "Computers keep getting better … than us," IEEE Future Directions, 2018.

S. Gadam, "Artificial Intelligence and Autonomous Vehicles," 19 April 2018. [Online]. Available:

24
https://medium.com/datadriveninvestor/artificial-intelligence-and-autonomous-vehicles-ae877feb6cd2.

European Commission, "Ethics guidelines for trustworthy AI," European Commission, 2019.

A. Price, "First International Standards committee for entire AI ecosystem," e-tech, no. 03/2018, 2018.

C. Kumar, "Artificial Intelligence: Definition, Types, Examples, Technologies," 31 August 2018. [Online].
Available: https://medium.com/@chethankumargn/artificial-intelligence-definition-types-examples-
technologies-962ea75c7b9b.
Arbib, Michael A. (Ed.) (1995), “The Handbook of Brain Theory and Neural Networks”, p. 666
Bostrom, Nick (2005) "A history of transhumanist thought" , Journal of Evolution and Technology, p. 2-21
Brook R.A. “Intelligence without representation-Artificial Intelligence” 1991,p.139-159 Nagrath I.D. and
Gopal M. “Control Systems
Engineering” New Age International Publications. PC "Fuzzy Logic and Neural Networks - Practical Tools
for Process Management", May/June, 1994, p.17
Surinder Kumar and Jha A.K. “CAD/CAM”

International Research Journal of Engineering and Technology

(IRJET).ARTIFICIAL INTELLIGENCE TECHNIQUES FOR CYBER SECURITY Arockia

Panimalar.S1, Giri Pai.U2, Salman Khan.K3 1Assistant Professor, Department

of BCA & M.Sc SS, Sri Krishna Arts and Science College, Tamilnadu 2,3 III

M.Sc SS, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College,

Tamilnadu

[1] Anderson, Frivold, Valdes, “Next- Generation Intrusion Detection

Expert System (NIDES)”.[1]Anderson, Frivold, Valdes, “Next- Generation

Intrusion Detection Expert System (NIDES)”.

[2]Rosenblatt. "The Perceptron- a perceiving and recognising automaton.

Report 85-460-1, Cornell natural philosophy Laboratory, 1957.


25
[3]“Logic Programming for Engineering”, Bratko.I, AddisonWesley, 2001.

[6]B. Mayo, E. Tyugu, J. Penjam. Constraint Programming. Alignment ASI

Series, v. 131, Springer-Verlag. 1994.

[7]E. Tyugu. Algorithms and Architectures of Artificial Intelligence.IOS

Press. 2007.

[8] NabaSuroor and Syed Imtiyaz Hassan, “Identifying the factors of modern

day stress using machine learning”.

[9]Barika.F, K. Hadjar, and N. El-Kadhi, “ANN for mobile IDS solution,”

in Security and Management.

[10] TF. Lunt, R. Jagannathan. A Prototype Real-Time Intrusion-Detection

Expert System.Proc.

[11] B. Iftikhar, A. S. Alghamdi, “Application of artificial neural

network within the detection of dos attacks”, 2009.

[12] P. Norvig, S. Russell. “Artificial Intelligence: fashionable

Approach”, 2000.

Ziyad Mohamed Seleh “Artificial Intelligence Definition,Ethics and

Standards”,The British University in Egypt.

John McCathy, “what is artificial intelligence”computer science

department,2007-11-12.

26
H. Goktas, N. Daldal, published 2006,engineering, Gazi university journal of science.

Johnathan Johnson, machine learning and data blog, BMC blog.

Ibm.com, “what is artificial intelligence”.

B. Koyuncu, “PC Remote Control of Appliances By Using Telephone Lines”,IEEE Trans. Consumer

Electron. , vol. 41, no. 1, pp. 201-209, February 1995.

S. Schneider, J. Swanson and P-Y. Woo, “Remote Telephone Control System”, IEEE Trans. Consumer

Electron. , vol. 43, no. 2, pp. 103-111, May 1997.

I. Coskun and H. Ardam, “A Remote Controller for Home and Office Appliances by Telephone”, IEEE

Trans. Consumer Electron. , vol. 44, no. 4, pp. 1291-1297, November 1998

E. Wong, “A Phone-Based Remote Controller For Home And Office Automation”, IEEE Trans. Consumer

Electron. , vol. 40, no. 1, pp. 28-33, February 1995.

C. L. Churms, V. M. Prozesky and K. A. Springhorn , “The remote control of nuclear microprobes over the

Internet”, Nuclear Instruments and Methods in Physics Research Section B: Beam Interactions with

Materials and Atoms, vol. 158, pp.124-128 September 1999.

Topalis E, Mandalos L, Koubias S, Papadopoulos G, Nikiforakis I., “A novel architecture for remote home

automation e-services on an OSGi platform via highspeed internet connection

ensuringQoS support by using RSVP technology”, IEEE Transactions On Consumer Electronics, Vol:48

(4): 825-833 Nov. 2002.

27
Al-Ali AR, Al-Rousan M., “Java-based home automation system”, IEEE Transactions On Consumer

Electronics, Vol.50, pp:498-504, May 2004.

DaldalNihat, “GSM Based Security and Control System” (In Turkish), M.Sc. Term Project, Gazi University,

Ankara, 2003.

Https://www.instructables.com>circuits>mobile alarm security

Https://www.makeuseof.com>Android

Https://www.pinterest.com>pin

Https://www.bmc.com/blogs/artificial-intelligence-types/

Https://www.hackster.io/news/turn-that-old-cell-phone-into-a-diy-home-security-alarm.

Https://www.bartleby.com/essay/abstract on Artificial Intelligence

Https://www.sciencedirectcom>article>pii.com

http://www-formal.stanford.edu/jmc/whatisai/node1.html
http://www-formal.stanford.edu/jmc/whatisai/node2.html
http://www-formal.stanford.edu/jmc/whatisai/

http://www-formal.stanford.edu/jmc/whatisai/node3.html

http://www-formal.stanford.edu/jmc/whatisai/node4.html

http://en.wikipedia.org/wiki/Artificial_intelligence

http://future.wikia.com/wiki/Artificial_Intelligence

please number all the references and insert them

28
29

You might also like