Home Intruder Detection System using Machine Learning and IoT

Authors

  • Fadhluddin Sahlan Department of Computer Science, International Islamic University Malaysia, Kuala Lumpur, Malaysia
  • Faeez Zimam Feizal Department of Computer Science, Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, Selangor, Malaysia
  • Hafizah Mansor Department of Computer Science, International Islamic University Malaysia, Kuala Lumpur, Malaysia

Keywords:

home surveillance, object detection, IoT, SSD, mobile application

Abstract

Home surveillance requires human effort, time and cost. Many tragedies such as robbery and vandalism occurred at home while the owners were negligent or not at home. Some residential areas hire guards to monitor their homes but hiring workers is not considered a cost-efficient option. Home Intruder Detection System (HIDES) is an Internet of Things (IoT) system with a mobile application to help homeowners in house surveillance by alerting users for any potential threats remotely. The main objectives of HIDES are to create a reliable home security system with the implementation of IoT, to implement the object detection algorithm to determine the presence of humans, and to develop a smart mobile application for users to monitor their houses from anywhere in the world and be alerted if any threats are detected. HIDES is developed using the System Development Life Cycle (SDLC) approach. HIDES implements an object detection algorithm; Single-Shot Multibox Detection (SSD) in NVIDIA Jetson Nano to detect intruders through a camera connected to the system. HIDES successfully achieves its objective in detecting persons precisely and alerting the detection to users through mobile application remotely. The system can capture video at an average of 20 frames per second (FPS) while detecting intruders and sending detection video to the server. The mobile application achieves good performance where the loading time takes 2.3 seconds while only requiring about 0.99MB of memory to run and 66.87MB of space

References

Rambabu, K., Haritha, V., Srinivas, S. N., & Reddy, P. S. (2019). IoT-based human intrusion detection system using lab view. International Journal of Advanced Science and Technology 127, (1), 162-166.

Zhang, X., Yi, W. J., & Saniie, J. (2019, May). Home surveillance system using computer vision and convolutional neural network. In 2019 IEEE International Conference on Electro Information Technology (EIT) (pp. 266-270). IEEE.

Anitha, A. (2017). Home security system using Internet of Things. IOP Conference Series: Materials Science and Engineering, 263, 042026. https://doi.org/10.1088/1757-899x/263/4/042026

Home Security System: 24/7 Alarm System Monitoring: ADT Security.

ADT Services Malaysia. (n.d.). https://www.adt.my/smart-home-security/.

Product – GTC. (2021). Retrieved 20 June 2021, from http://www.gtc.my/product/

Ananthan, R. (2019). Crime Trends and Patterns in Malaysia | Kyoto Review of Southeast Asia. Retrieved 20 June 2021, from https://kyotoreview.org/trendsetters/crime-trends-and-patterns-in-malaysia

Netkow, M. (2021). Ionic vs Flutter: Best Platform for Hybrid App Development. Ionic Forum. https://ionic.io/resources/articles/ionic-vs-flutter-comparison-guide

Moermond, J. (2017, ). The Pros and Cons of End-of-Stroke Detection with Reed Switches. AUTOMATION INSIGHTS. https://automation-insights.blog/2010/05/24/the-pros-and-cons-of-end-of-stroke-detection-with-reed-switches/

Franklin, D. (2022). Locating Objects in DetectNet. https://github.com/dusty-nv/jetson-inference/blob/master/docs/detectnet-console-2.md#pre-trained-detection-models-available

Downloads

Published

2022-07-04

How to Cite

Sahlan, F., Feizal, F. Z., & Mansor, H. (2022). Home Intruder Detection System using Machine Learning and IoT. International Journal on Perceptive and Cognitive Computing, 8(2), 56–60. Retrieved from https://journals.iium.edu.my/kict/index.php/IJPCC/article/view/329

Issue

Section

Articles