Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

Search Results (3)

Search Parameters:
Keywords = Twilio SMS

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
30 pages, 4153 KB  
Article
Camera-Based Crime Behavior Detection and Classification
by Jerry Gao, Jingwen Shi, Priyanka Balla, Akshata Sheshgiri, Bocheng Zhang, Hailong Yu and Yunyun Yang
Smart Cities 2024, 7(3), 1169-1198; https://doi.org/10.3390/smartcities7030050 - 19 May 2024
Cited by 7 | Viewed by 6806
Abstract
Increasing numbers of public and private locations now have surveillance cameras installed to make those areas more secure. Even though many organizations still hire someone to monitor the cameras, the person hired is more likely to miss some unexpected events in the video [...] Read more.
Increasing numbers of public and private locations now have surveillance cameras installed to make those areas more secure. Even though many organizations still hire someone to monitor the cameras, the person hired is more likely to miss some unexpected events in the video feeds because of human error. Several researchers have worked on surveillance data and have presented a number of approaches for automatically detecting aberrant events. To keep track of all the video data that accumulate, a supervisor is often required. To analyze the video data automatically, we recommend using neural networks to identify the crimes happening in the real world. Through our approach, it will be easier for police agencies to discover and assess criminal activity more quickly using our method, which will reduce the burden on their staff. In this paper, we aim to provide anomaly detection using surveillance videos as input specifically for the crimes of arson, burglary, stealing, and vandalism. It will provide an efficient and adaptable crime-detection system if integrated across the smart city infrastructure. In our project, we trained multiple accurate deep learning models for object detection and crime classification for arson, burglary and vandalism. For arson, the videos were trained using YOLOv5. Similarly for burglary and vandalism, we trained using YOLOv7 and YOLOv6, respectively. When the models were compared, YOLOv7 performed better with the highest mAP of 87. In this, we could not compare the model’s performance based on crime type because all the datasets for each crime type varied. So, for arson YOLOv5 performed well with 80% mAP and for vandalism, YOLOv6 performed well with 86% mAP. This paper designed an automatic identification of crime types based on camera or surveillance video in the absence of a monitoring person, and alerts registered users about crimes such as arson, burglary, and vandalism through an SMS service. To detect the object of the crime in the video, we trained five different machine learning models: Improved YOLOv5 for arson, Faster RCNN and YOLOv7 for burglary, and SSD MobileNet and YOLOv6 for vandalism. Other than improved models, we innovated by building ensemble models of all three crime types. The main aim of the project is to provide security to the society without human involvement and make affordable surveillance cameras to detect and classify crimes. In addition, we implemented the Web system design using the built package in Python, which is Gradio. This helps the registered user of the Twilio communication tool to receive alert messages when any suspicious activity happens around their communities. Full article
Show Figures

Figure 1

8 pages, 1612 KB  
Proceeding Paper
Prototyping Bespoke Sensor Industrial Internet-of-Things (IIoT) Systems for Small and Medium Enterprises (SMEs)
by Nikolay G. Petrov, Tim J. Mulroy and Alexander N. Kalashnikov
Eng. Proc. 2023, 58(1), 111; https://doi.org/10.3390/ecsa-10-16000 - 15 Nov 2023
Viewed by 912
Abstract
This paper aims to share our experiences gained from working on multiple industrial–academic collaborative projects within the Digital Innovation for Growth (DIfG) regional programme. This initiative provided academic expertise to low-resource SMEs. The projects primarily revolved around measuring various process or structural health [...] Read more.
This paper aims to share our experiences gained from working on multiple industrial–academic collaborative projects within the Digital Innovation for Growth (DIfG) regional programme. This initiative provided academic expertise to low-resource SMEs. The projects primarily revolved around measuring various process or structural health variables. The subsequent wireless reporting of these results to an online dashboard and generating alert messages when variables exceeded predefined thresholds were central to our work. Due to the diverse nature of our partners’ requirements, there was no one-size-fits-all solution for the considered use cases. We will delve into our utilization and insights regarding various IoT-related tools and technologies. These include ESP32 WiFi-enabled microcontrollers, WiFi Manager, NTP time service, watchdog timers, Adafruit IO dashboards and the Twilio SMS gateway, as well as LoRa modules and networks such as TNT and Helium. By effectively combining these tools and technologies, we successfully completed prototypes that enabled testing of the devices on-site. Full article
Show Figures

Figure 1

31 pages, 9124 KB  
Article
A Secure and Efficient Multi-Factor Authentication Algorithm for Mobile Money Applications
by Guma Ali, Mussa Ally Dida and Anael Elikana Sam
Future Internet 2021, 13(12), 299; https://doi.org/10.3390/fi13120299 - 25 Nov 2021
Cited by 29 | Viewed by 11528
Abstract
With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor authentication (2FA) as the only means of verifying mobile money [...] Read more.
With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor authentication (2FA) as the only means of verifying mobile money users. These 2FA schemes are vulnerable to numerous security attacks because they only use a personal identification number (PIN) and subscriber identity module (SIM). This study aims to develop a secure and efficient multi-factor authentication algorithm for mobile money applications. It uses a novel approach combining PIN, a one-time password (OTP), and a biometric fingerprint to enforce extra security during mobile money authentication. It also uses a biometric fingerprint and quick response (QR) code to confirm mobile money withdrawal. The security of the PIN and OTP is enforced by using secure hashing algorithm-256 (SHA-256), a biometric fingerprint by Fast IDentity Online (FIDO) that uses a standard public key cryptography technique (RSA), and Fernet encryption to secure a QR code and the records in the databases. The evolutionary prototyping model was adopted when developing the native mobile money application prototypes to prove that the algorithm is feasible and provides a higher degree of security. The developed applications were tested, and a detailed security analysis was conducted. The results show that the proposed algorithm is secure, efficient, and highly effective against the various threat models. It also offers secure and efficient authentication and ensures data confidentiality, integrity, non-repudiation, user anonymity, and privacy. The performance analysis indicates that it achieves better overall performance compared with the existing mobile money systems. Full article
(This article belongs to the Collection Machine Learning Approaches for User Identity)
Show Figures

Figure 1

Back to TopTop