CFP last date
20 December 2024
Reseach Article

Monitoring System for Prisoner with GPS using Wireless Sensor Network (WSN)

by Pooja B. Patil, Sneha Chapalkar, Neha D. Dhamne, Niharika M. Patel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 91 - Number 13
Year of Publication: 2014
Authors: Pooja B. Patil, Sneha Chapalkar, Neha D. Dhamne, Niharika M. Patel
10.5120/15943-5235

Pooja B. Patil, Sneha Chapalkar, Neha D. Dhamne, Niharika M. Patel . Monitoring System for Prisoner with GPS using Wireless Sensor Network (WSN). International Journal of Computer Applications. 91, 13 ( April 2014), 28-31. DOI=10.5120/15943-5235

@article{ 10.5120/15943-5235,
author = { Pooja B. Patil, Sneha Chapalkar, Neha D. Dhamne, Niharika M. Patel },
title = { Monitoring System for Prisoner with GPS using Wireless Sensor Network (WSN) },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 91 },
number = { 13 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 28-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume91/number13/15943-5235/ },
doi = { 10.5120/15943-5235 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:12:40.771510+05:30
%A Pooja B. Patil
%A Sneha Chapalkar
%A Neha D. Dhamne
%A Niharika M. Patel
%T Monitoring System for Prisoner with GPS using Wireless Sensor Network (WSN)
%J International Journal of Computer Applications
%@ 0975-8887
%V 91
%N 13
%P 28-31
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In day today's life security is a very important thing in the world. For better achievement of security advanced technology have been undertaken in correctional facilities. Various security devices like CCTV, Tracking bracelets, ID barcode scanning and other devices have contributed to the improved and secure management. The aim of this paper is to invent a security system against prisoner by using RF Transmitter and receiver technology. It is based on RF Transmitter and Receiver technology on ultra high frequency range which can be applied to use in access control by using RF Transmitter and Receiver tag. The RF Transmitter and Receiver tag contains a unique set of number as a code, so it can be identified. The RF Transmitter will act as the bracelet and the RF Receiver will be at the server side. For keeping the track of prisoner Global Positioning System (GPS) is used. This technology can be used for monitoring the prisoners in the jail, patients in the hospitals or mental asylums who basically try to escape or run away from jails and mental asylums. It tracks the particular person wearing the bracelet within its range and as soon as it's outside the range the GPS connected to the bracelet gets activated and we can track that particular person with the help of GPS on the bracelet. It's also very useful in the schools for students and the staff, colleges, employees in the offices and etc where we need to keep track of someone's presence. There is no need of keeping continuous watch due to this technology, for example if the prisoner runs away from the jail a message will be sent to the jailer and buzzer will ring. Due to this technique it will be easy for monitoring purpose.

References
  1. Jinaporn ,N . Dept. of Electronics. & Electron. Eng. , Ubonratchathani Univ. , UbonRatchathani , "Security system against asset theft by using Radio Frequency Identification Technology ",IEEE Aug. 2009.
  2. Modares ,H. ; Dept. of Comput. Syst. & Technol. , Univ. of Malaya, Kuala Lumpur, Malaysia ;Salleh, R. ; Moravejosharieh, A. , "Overview of Security Issues in Wireless Sensor Networks",IEEE Aug. 20-22 Sept. 2011.
  3. K. Domdouzis, B. Kumar and C. Anumba, "Radio-Frequency Identification (RFID) applications: A brief introduction," Advanced Engineering Informatics, vol. 21, issue 4, pp. 350-355, October 2007.
  4. M. Ward, R. van Kranenburg, "RFID: Frequency, standards, adoption and innovation", JISC Technology and Standards Watch, May 2006.
  5. R. Angeles, "RFID technologies: Supply-chain applications and implementation issues," Information Systems Management, vol. 22, issue ,pp. 51-65, 2005.
  6. W. M. G. Wismans,. "Identification and registration of animals in the European Union," Computers and Electronics in Agriculture, vol. 24, issue 1-2,pp. 99-108,1999.
  7. G. Adams, "Pharmaceutical manufacturing: RFID - reducing errors and effort," Filtration & Separation, vol. 44, issue 6, pp17-19,July-August 07.
  8. M. Venkatesan, Z. Grauer, "Leveraging radio frequency identification (RFID) technology to improve laboratory information management," American Laboratory, vol. 36, issue 18, pp. 11-14, 2004.
  9. M. Lu, W. Chen, X. Shen, H. C. Lam and J. Liu, "Positioning and tracking construction vehicles in highly dense urban areas and building construction sites," Automation in Construction, vol. 16, issue 5, pp. 647-656,August2007.
Index Terms

Computer Science
Information Sciences

Keywords

RF Transmitter RF Receiver Bracelet Security Tracking.