IoT-Based Automatic Boom Barrier for Enhancing Surveillance Security in Public Places

IoT-Based Automatic Boom Barrier for Enhancing Surveillance Security in Public Places

Monika Mehta, Shivani Mishra, Santosh Kumar, Muskaan Bansal
DOI: 10.4018/978-1-6684-5255-4.ch007
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In order to reduce the unnecessary waste of the workforce, the proposed system has been developed. In this chapter, a secure environment from that future will secure and help increase motivation for intelligent things and productivity and enter newly grown markets, startups, and entrepreneurs. The significant contribution to knowledge was to improve the automatic boom barrier system, considering the low cost of the budget. This chapter is concerned with providing an automatic boom barrier, the gate operated by Raspberry Pi. Some of the features considered during this system's design were cost-effective and easy to use compared to existing systems. Security plays an essential role in making smart cities using the “automatic boom barrier system.”
Chapter Preview
Top

Introduction

A boom barrier, also known as a boom gate, is a bar or pole pivoted to allow the boom to block vehicular or pedestrian access through a controlled point. Typically, the tip of a boom gate rises in a vertical arc to a near-vertical position. Boom gates are often counterweighted, so the pole is easily tipped (Ata et al., 2019; Deshmukh & Joshi, 2019; Jain et al., 2017; Mishra et al., 2019). Boom gates have often paired either end to end or offset appropriately to block traffic in both directions. Some boom gates also have a second arm which hangs 300 to 400 mm below the upper arm when lowered to increase approach visibility, and which hangs on links, so it lies flat with the main boom as the barrier is raised. Some barriers also feature a pivot roughly halfway, whereas the barrier is raised, the outermost half remains horizontal, with the barrier resembling an upside-down L when raised.

In this system, Raspberry-Pi is the central controller. Also, the web camera, motor, and ultrasonic sensor are the crucial parts of this device. Firstly, Identify a car through KNN and Raspberry Pi. It will then automatically operate the Raspberry Pi if it is under the ultrasonic sensor range (for example – if any vehicle arrived, then the Raspberry Pi camera auto-capture number plate). After that, the Pi recognized the car photo. The car details are then stored in a known database like Plate number, date, time. After that, data comparison with the existing database will find the authorized car and then automatically operate (example-open the gate); otherwise, not perform any operation.

Figure 1.

Automatic boom barrier architecture in the proposed environment

978-1-6684-5255-4.ch007.f01

This paper contains five sections, including an introduction and conclusion. The next section, Related Work, tells us about the problem's concern with security challenges, market opportunities, and needs. The next section gives a detailed view of the system's configuration, the hardware involved, and the proposed system and its Implementation through the components used in our system. The database stores the information of the vehicle number plate for the authorized and unauthorized vehicle. Similarly, the web page will help a user interact easily with this device running on the local server to record vehicle details. In the next section, the results of the proposed work have been discussed. Finally, the work is summarized with future recommendations and application areas.

Top

There was the same functionality in the previously existing system that used an RFID sensor as our system work. However, there is some problem like an installation problem and some workforce for controlling the system. To overcome these problems, we make a low-cost system, not a requirement for any installation, and manually entering use only for unknown vehicles, but it will work automatically for the known vehicle. We use IoT because it can use different APIs to combine more than one language to make technology behave like a weapon in the security matter (Gawade & Meeankshi, 2017; Persada et al., 2019; Pratama et al., 2020; Saleem et al., 2020; Sethuramalingam, 2019). With the help of IoT, we can make any powerful technology concerned with security reasons. Table 1 describes the existing technology used along with its limitation.

Complete Chapter List

Search this Book:
Reset