Volume 3, Issue 6, June – 2018 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
Implementation of a Community Emergency Security
Alert System
Victor O. Matthews Uzairue Stanley Idiake
Department of Electrical and Information Engineering Department of Electrical and Information Engineering
Covenant University Covenant University
Ota, Ogun State, Nigeria Ota, Ogun State, Nigeria
Etinosa Noma-Osaghae Morgan Kubiat Enefiok
Department of Electrical and Information Engineering Department of Electrical and Information Engineering
Covenant University Covenant University
Ota, Ogun State, Nigeria Ota, Ogun State, Nigeria
Praise Jude Ogukah
Department of Electrical and Information Engineering
Covenant University
Ota, Ogun State, Nigeria
Abstract:- Emergency alert and response is carried various measures and methods to ensure the safety and
out in different ways around the world. survival of her citizens [2]. Urban areas have well-developed
Governments, corporate bodies and individuals take emergency response systems but very few rural, sub-urban and
emergencies very seriously and continue to develop community-like settlements have the luxury of even the
simplest emergency response system [3]. The most alarming
ingenious ways of responding to emergencies very
part of this glaring gap is the fact that in most developed and
swiftly. Most Urban areas have well-developed developing countries, rural, sub-urban and community-like
emergency response systems but this is not true of populations are growing at an exponential rate [4]. This has
rural and sub-urban settlements. Security risk keeps made security risk for community dwellers higher than it used
increasing by the day due to rapid population to be in the past [5].
growth. This is particularly true at the grassroots or
The time it takes to respond to security threats usually
community level. This paper proposes a very effective determines the gravity of the eventual lot of those who are
and economical way of alerting a community to all directly and indirectly affected [6]. However, the response of
kinds of security emergencies. It incorporates the use the police to just about any security threat situation is also
of a mobile application that was codenamed very dependent on how fast information about security threats
“CEMAS” (Community Emergency Alarm System). gets to the police [7]. The responsibility of reporting
The mobile application with a “Panic button” on it emergencies such as security threats lies with the inhabitants.
provides all inhabitants of the community with the Thus, an ineffective security alert system will increase
means of triggering two SMS-activated central response time and the severity of the aftermath of such
alarms. The first alarm is located at the community emergencies [8]. This paper addresses the challenge reporting
security threats at the grassroots or community level. The
center and the second at the community police
system functions as a panic alert system [9]. It uses a mobile
station. The central alarm system is activated by application that enables every inhabitant of the community to
pressing the “Panic Button” whenever there is a send security alerts as a broadcast via a “Panic button” [10].
security threat. The designed and implemented The broadcast will also trigger the alarm installed at the
system worked satisfactorily well. community centre and at the community police station.
Members of the community can respond to security alerts or
Keywords:- Alarm, anti-intruder, motion sensing, escalate it [11].
images, cloud, server, application programme interface, This paper proposes a collaborative security alert system
security, home. that can facilitate the reporting of security emergencies to all
dwellers in a community and to law enforcement agencies. It
I. INTRODUCTION is a mobile-based security alert system for reporting security
emergencies the instant they occur. This ensures that response
Security is a source of primary concern for individuals, time is reduced to a minimum. The CEMAS (Community
organizations and governments [1]. Nations have adopted Emergency Alert System) software application (containing the
IJISRT18JU373 [Link] 475
Volume 3, Issue 6, June – 2018 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
“Panic button”) was installed on the mobile devices of system for emergency management. The system had a focus
community members. The mobile application was developed on effective emergency management. The system created a
using a cross-platform mobile framework (Ionic Framework). distributed community-based virtual database based on a P2P
The Ionic framework is a software development kit for hybrid (Peer-to-Peer) architecture which links local resource database
mobile application development based on the JavaScript of suppliers that provide information to foster multi-criteria
language and uses several web technologies including CSS, decision making, thereby, enabling effective and timely
HTML and SASS to develop mobile applications that can be emergency response. The P2P architecture used to manage the
deployed across Android, iOS and Windows platforms by distributed datasets of the target community will allow a
leveraging on Cordova – a mobile application development dataset to easily join and leave the network as well as allow
framework that wraps web files into a native container for autonomous maintenance of each individual organization’s
accessible on several mobile platforms [12]. The mobile dataset. The system was implemented as a social networking
application implements geolocation to detect the victim’s site, providing end users with access to information, good
precise location which will be included in the panic broadcast situational awareness and also a possibility of sharing such
sent to all members of the community. The proposed alarm information with emergency partners at all levels.
system has a SMS module that can broadcast panic messages
Zhao and Liu [21] developed a decision support tool for
offline to all members of the community when a security
optimizing urban emergency rescue facility locations to
emergency occurs [13]. The system can also collect relevant
improve humanitarian logistics movement. The support tool
up-to-date contact information concerning all members of the
integrates a number of loosely-coupled components into a
community. Two SMS-triggered alarms deployed at the
uniform .NET application. These components include: a
community centre and at the community police station serve
desktop geospatial database for storing geospatial data which
as a form of verbose alert each time a panic alert is broadcast
also gives access to the stored datasets via an Application
[14].
Programming Interface (API); a decision optimization model
II. LITERATURE REVIEW and NSGA-II algorithm which are encapsulated as a software
component according to the Component Objective Model
One of the most crucial aspects of emergency (COM) standard; a series of open-source Geographical
management is emergency response. Information and Information System (GIS) APIs and a statically analysis
Communication Technology (ICT) have been used extensively module that is developed through third party data analysis
and innovatively to manage emergencies[15]. The integration applications. The developed software functioned to aid the
of ICT solutions into real-life emergency scenarios in the optimal selection of emergency rescue facility locations in
health sector has caused the birth of a now popular concept, large-scale urban areas in order to foster public safety. [17]
mHealth - which has been defined as “healthcare to anyone, developed a simulation modeler for comparing Emergency
anytime and anywhere by removing temporal and locational Medical Services (EMS) with smartphone-based samaritan
constraints while increasing both the coverage and the quality response. Their software compares the potential smartphone-
of healthcare” [16]. mHealth is a concept that has been initiated member response to traditional EMS response using
actualized via mobile applications that depend on user certain parameters inputted into the application for specific
behavior, geographic location and online community health conditions in a given geographical region. They
characteristics to offer medical emergency support and conducted experiments to establish adoption levels for certain
significantly reduce medical emergency response time [17]. Emergency Medical Services (EMS) as against smartphone-
based samaritan response using various factors. This helped
Amongst the vast array of ICT solutions available to the researchers to determine the effectiveness of samaritan-
combat security disparities in the world today, the short based emergency response communities. The authors also
message service (SMS) also known as text-message – “a emphasized the efficacy of deploying mHealth applications for
service component that uses standardized communication emergency response. [22] carried out a research to determine
protocols to enable mobile devices to exchange short text the various factors affecting end user acceptance of
messages” [18] - has been one of the commonly used. This is Emergency Operation Centre Information Systems (EOCISs).
because it is widely available for virtually every type of Based on the model they developed, they were able to
mobile device and 95% of the world population currently live determine that social impact has a positive influence on
in areas with cellular network coverage [19]. Palmieri et al technology uptake. They also determined that factors such as
[20] proposed a hybrid cloud-based architecture for managing age, sex, and user experience greatly affected the adoption of
computing and storage resources needed to control activities new technologies. The effect of these factors on adoption of
during emergency situations. The system also uses a novel new technologies varied depending on the profile and
positioning approach which utilizes signal data from physical behavioral differences of each user.
landmarks placed by first responders in an emergency attack
location as well as data from motion sensors. Their system Jain, et al. [23] proposed the Punya framework that
leveraged the practically unlimited computing and storage shortens the development time of android applications but still
resources provided by cloud architectures. Li et al [15] supports the communication and sensor features required to
proposed a community-based collaborative information collect data in crisis scenarios. Its improved sensor abilities
IJISRT18JU373 [Link] 476
Volume 3, Issue 6, June – 2018 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
and data collection components enable organizations build A. Hardware Architecture
applications within a short amount of time that can collect data The design specifications of the hardware architecture
and visualize results. [24] proposed the use of a discrete show the various components needed to move from the design
optimization model on social media for the dissemination of phase to the development phase.
emergency messages. The optimization model was aimed at
helping organizations achieve optimal dissemination of
information to targeted users. The model was implemented on
a small scale twitter network with a hundred nodes and it
proved successful.
Du and Zhu [25] proposed a public safety emergency
management early-warning system based on IoT. It was
realized that the system was capable of omni-directional
monitoring as well as adequate predictions based on the data
that it collects. This helped communities respond to
emergencies faster and more accurately. The exact location of Fig 2:- The Hardware Architecture
the emergency can be pin-pointed with IoT devices acting as
sensors. [26] carried out a research on the social acceptance of B. SMS Module
location-based mobile government based services for This module handles the reception of the panic trigger
emergency management. In their research they were able to SMS and serves this input into the microcontroller (Arduino
establish that people’s attitude to the application was highly UNO R3) which acts as the controller that activates the alarm
based on its perceived usefulness and that the only negative module. The devices involved in this module are:
impact on the system came as a result of people’s
apprehension towards the collection of personal data by the Microcontroller (Arduino UNO R3)
application. GSM module
Gomez, et al. [27] proposed an urban security system C. Microcontroller (Arduino Uno R3)
based on quadrants. This system was designed and developed The Arduino Uno can be programmed with the (Arduino
to improve the response time of the police force to criminal Software ,IDE-Integrated development environment). The
activities. The urban area was divided into quadrants and each ATmega328 on the Arduino Uno comes pre-programmed with
member of a quadrant had the system’s application installed
a bootloader that allows you to upload new code to it without
on their mobile device. It was tested out and found that the
the use of an external hardware programmer. The program
application improved the police respond time by 60%. was written in C programming language.
III. METHOD AND MATERIAL D. GSM Module
The selected GSM module for this project is SIM 900
CEMAS is a system that is made up of two (2) primary shield. This is a GSM/GPRS-compatible Quad-band cell
architectures. These architectures are the software and phone, which works on a frequency of
hardware architecture. The hardware architecture of CEMAS 850/900/1800/1900MHz. It can be used to access the internet
encompasses the design and specifications of the SMS- as well as a GSM network. The module requires a supply of
triggered smart alarm that will be deployed in two central continuous energy of (between 3.4 and 4.5 V) [23] of which
locations in the community. Also, the software architecture an AC adapter was bought to connect to a power outlet to
details the design, processes and modules of the hybrid mobile energize the module. With the aid of the GSM module it
application that the community members (client) will interact becomes possible to make calls, receive calls, send text
with in order to perform specific tasks. messages and receive text messages.
E. Alarm Module
This module is employed to alert the community of any
distress call by triggering a siren/alarm on receipt of a signal
from the microcontroller. The components involved in this
module are.
Relay
Siren
F. Software Architecture
Fig 1:- Overall System Architecture The software architecture of CEMAS was the Client-
Server architecture. The client was a hybrid mobile application
IJISRT18JU373 [Link] 477
Volume 3, Issue 6, June – 2018 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
written in Ionic (a JavaScript hybrid mobile development ID of the victim. The numbers are then queued. The
framework) that was used to perform variety of tasks component harnesses the native SMS application that resides
including initiating the panic broadcast. The client is the front- on the victim’s mobile phone to send out the panic
end while the server, a web server written in [Link] (a information to each contact fetched from the database. This
JavaScript runtime for building web services and applications) component finally returns a feedback to confirm the delivery
is referred to as the back end. of each of the panic messages.
K. The Server Side
G. Use Case Diagram
This software architecture includes all the business logic
The use case diagram of CEMAS is as shown in figure 2.
as well as data structure and storage. It also includes
It clearly outlines all the actors in the CEMAS system. It also
description of the server’s interaction with an external cloud
shows the activities that are performed by each of these
storage and SMS server. Generally, the server-side utilizes a
individuals (actors) as well as defining relationships and
Non-Relational database - MongoDB. This database mainly
dependencies between them.
uses collections to group data as opposed to the use of tables
H. Client Side _ Geolocation Component in Relational Databases such as MySQL Database. Also, data
This component consists of the geo-location component are stored as documents and can be of different types.
which utilizes the native mobile device’s geo-location Mongoose, a tool which provides an Object Data Model
capabilities to detect the victim’s current location in terms of (ODM) or Object Relational Model (ORM) for interacting
latitude and longitude. However, in order to make the interface with the Mongo Database is also employed in order to interact
user-friendly and the current location data more readable by with data using Models and Schema – a template in which
just about any user, the component employs a geocoding documents (data) in a collection (table) will be structured as
service. Geocoding is simply the process of converting a well as functions that will validate the type of data that is to be
human-readable address of a given location into a set of stored in the database. Mongoose provides a more flexible
coordinates (i.e. latitude and longitude). In the same vein, way of modeling data interaction between the application
Reverse Geocoding is the process of converting a set of (client) and the database as it maps the data as JavaScript
coordinates into a human-readable formatted address. Hence, Objects (i.e. data can be served in JavaScript Object Notation
the victim’s current location, obtained from the geolocation (JSON) format).
module in the victim’s mobile device, is reverse-geocoded into
a readable address to provide a better description of the user’s
location to other members of the community.
Fig 4:- Database Design_Model RelationshipThe Use Case
Diagram
L. User Management Service
Fig 3:- The Use Case Diagram
This component describes all functions and related
methods that perform basic management operations on the
I. The Panic Trigger Component
Users Model. The basic actions carried out by this component
The panic trigger is implemented as a button on the
include:
mobile application that can be touched (pressed down) by the
victim. In order to avoid accidental triggers of the panic Create – This action refers to the instantiation of a model
button, the panic trigger does not respond when it is quickly which in turn creates a new document using the
tapped but sends the panic broadcast when it is pressed and instantiated values, structured and validated by the
held for at least 400ms. schema of that object.
J. The SMS Broadcast Component Update – This is the act of modifying the value or data
This component compiles the panic message to be sent contained in the instance of a model or a database
via SMS, the current location that has been set by the document.
geolocation component and the phone numbers of everyone in
the community fetched from the server using the community
IJISRT18JU373 [Link] 478
Volume 3, Issue 6, June – 2018 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
Delete – This act simply refers to the removal or
destruction of an instance of a model or document in the
database.
Read – This action simply involves calling or invoking an
existing instance of a model or document in the database in
order to access data it contains or its properties.
Fig 7:- Flowchart Illustrating User Login Activity
Fig 5:- Flowchart for Creating User Activity
Fig 6:- Flowchart for Updating Users’ Information
Fig 8:- Flowchart Illustrating Password Reset Activity
IJISRT18JU373 [Link] 479
Volume 3, Issue 6, June – 2018 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
IV. RESULTS AND DISCUSSION Figure 12 and 13 shows a sample request and response
for the query for the list of members in the community.
A. Retrieving List of Community Members
Table 1 illustrates the process used to determine how FORMAT
well the designed system was able to retrieve the lists of all Endpoint /{uid}/password/update
the members of the community stored in the database. Method POST
URI Parameters User id (uid)
FORMAT
Body Parameters newPassword, oldPassword
Endpoint /community/{cid}/{uid}
Response An array of objects of all users in the
Method GET
specified community
URI Community id (cid), User id (uid) Table 2. Format for Updating Password
Parameters
Body None
Parameters
Response An array of objects of all users in the
specified community
Table 1. Format to Retrieve Lists of Community Members
Figure 10 and 11 shows a sample request and response
for the query for the list of members in the community
Fig 9:- A Test Request to Retrieve the List of Community
members
Fig 11:- A Test Request for Password Update Service
Fig 10:- The Response received for List of Community Fig 12:- Response from the Password Update Service
Members Test
C. Profile Update Service
B. Password Update Service False
Table 3 illustrates the process used to determine how
Table 2 illustrates the process used to determine how well well the designed system was able to update the profile of
the designed system was able to update the password of registered members of the community.
registered members of the community.
IJISRT18JU373 [Link] 480
Volume 3, Issue 6, June – 2018 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
FORMAT server to push a code via SMS to the alarm in order to trigger
Endpoint /{uid}/update/{action} it in the event of a security emergency.
Method POST
A case study was set up in a test community and the
URI User id (uid); Action (0-request update, 1-
time taken for the panic SMS to be delivered as well as the
Parameters approve update)
SMS command to trigger the alarm was recorded and the
Body Community ID, Update Data (action=0), Log
results of the test were as follows:
Parameters id (action =1)
Response An array of objects of all users in the
Community Name: Covenant University
specified community
Average Alarm trigger time: 4.28s
Table 3. Format for Updating Profiles Average SMS delivery time: 3.88s
Figure 12 and 13 shows a sample request and response This result is got from Table IV.
for the query for the list of members in the community.
No. of Iterations Alarm Trigger Time SMS Delivery
(s) Time (s)
1 6.78 4.99
2 2.33 6.13
3 4.81 2.11
4 2.47 3.81
5 3.82 6.99
6 6.22 1.98
7 3.80 1.17
Table 4. Showing SMS Delivery Times for Seven Panic
Broadcasts.
Fig 13:- A Test Request Sent to Profile Update Request
Service
Fig 15:- An android Tablet Running the CEMAS Mobile
Application and the Complete packaging of the SMS-triggered
Alarm
V. CONCLUSION
Fig 14:- Response Received from the Profile Update Approval A community security emergency alert system was
Service Test developed and the processes and features were explained in
this paper. The application which was built to serve this
D. System Tests purpose was named CEMAS which is short for Community
The system was integrated by enrolling the mobile number Emergency Alert System. The hardware developed was an
assigned to the alarm hardware into the database and SMS-triggered alarm system which activates on receipt of an
specifying authorized users of the system. This enabled the SMS indicating a security threat to any of the community
IJISRT18JU373 [Link] 481
Volume 3, Issue 6, June – 2018 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
members. The system provides an easy to use and efficient Verification," International Journal of Applied
Mobile User Interface (UI) for reporting emergency threat Engineering Research, vol. 13, pp. 6608-6612, 2018.
situations. The proposed system improves emergency response [8]. K. O. Okokpujie, E. Noma-Osaghae, G. Kalu-Anyah, and
time by reducing security emergency report time in rural, sub- I. P. Okokpujie, "A Face Recognition Attendance System
urban and grassroots community dwellers. This can go a long with GSM Notification," 2017.
way to mitigating bulk of the calamities experienced as a [9]. K. Okokpujie, E. Noma-Osaghae, S. John, and A. Ajulibe,
result of unreported or delayed reports of emergency threat
"An Improved Iris Segmentation Technique Using
situations prevalent in grassroots communities across the
Circular Hough Transform," in International Conference
world. on Information Theoretic Security, 2017, pp. 203-211.
[10]. K. O. Okokpujie, A. Orimogunje, E. Noma-Osaghae,
VI. FURTHER WORK
and O. Alashiri, "An Intelligent Online Diagnostic System
With Epidemic Alert," An Intelligent Online Diagnostic
The SMS-triggered alarm could be equipped with a
System With Epidemic Alert, vol. 2, 2017.
display that would monitor the exact location of the victim.
The SMS alarm hardware could be developed into portable [11]. K. O. Okokpujie, E. C. Chukwu, E. Noma-Osaghae,
sizes and installed in police patrol cars and not just central and I. P. Okokpujie, "Novel Active Queue Management
stations in the community. The application was deployed on Scheme for Routers in Wireless Networks," International
the iOS and Android platforms which are easily the most Journal on Communications Antenna and Propagation (I.
popular in the world today, but there is a percentage, small as Re. CAP), vol. 8, pp. 53-61, 2018
it may be, that adopt platforms like the Windows mobile, [12]. D. Caldwell and R. E. Williams, "Seeking Security in
Blackberry OS etc. The application can be made to cover all an Insecure World," in Seeking Security in an Insecure
platforms. World, ed, 2006, p. 241.
REFERENCES [13]. F. Vanderschueren. (2013, Febuary 2018). The
Evolution and Challenges of Security within Cities.
[1]. K. Okokpujie, E. Noma-Osaghae, S. John, and P. C. Available: [Link]
Jumbo, "Automatic home appliance switching using and-challenges-security-within-cities
speech recognition software and embedded system," in [14]. N. Adegoke, "THE NIGERIA POLICE AND THE
Computing Networking and Informatics (ICCNI), 2017 CHALLENGES OF SECURITY IN NIGERIA," Review
International Conference on, 2017, pp. 1-4. of Public Administration and Management, vol. 3,
[2]. C. Atuegwu, K. O. Okokpujie, and E. Noma-Osaghae, "A December 2014 2014.
Bimodal Biometric Student Attendance System," 2017. [15]. J. Li, Q. Li, C. Liu, S. Ullah Khan, and N. Ghani,
[3]. K. Okokpujie, N.-O. Etinosa, S. John, and E. Joy, "Community-based collaborative information system for
"Comparative Analysis of Fingerprint Preprocessing emergency management," Computers & Operations
Algorithms for Electronic Voting Processes," in Research, vol. 42, pp. 116-124, 2// 2014.
International Conference on Information Theoretic [16]. U. Varshney. (2009, January, 2018). Pervasive
Security, 2017, pp. 212-219. Healthcare Computing.
[4]. K. O. Okokpujie, N.-O. Etinosa, O. J. Okesola, J. N. [17]. M. Khalemsky and D. G. Schwartz, "Emergency
Samuel, and O. Robert, "Design and Implementation of a Response Community Effectiveness: A simulation
Student Attendance System Using Iris Biometric modeler for comparing Emergency Medical Services with
Recognition," in Computational Science and smartphone-based Samaritan response," Decision Support
Computational Intelligence (CSCI), 2017, Las Vegas, Systems, vol. 102, pp. 57-68, 10// 2017.
USA, 2017. [18]. Drj. (2001, January). Short Message Service (SMS)
[5]. N.-O. Etinosa, C. Okereke, O. Robert, O. J. Okesola, and (3446 ed.). Available: [Link]
K. O. Okokpujie, "Design and Implementation of an Iris [19]. S. J. Iribarren, W. Brown Iii, R. Giguere, P. Stone, R.
Biometric Door Access Control System," in Schnall, N. Staggers, et al., "Scoping review and
Computational Science and Computational Intelligence evaluation of SMS/text messaging platforms for mHealth
(CSCI), 2017, Las Vegas, USA, 2017. projects or clinical interventions," International Journal of
[6]. K. Okokpujie, E. Noma-Osaghae, S. John, and R. Oputa, Medical Informatics, vol. 101, pp. 28-40, 5// 2017.
"Development of a facial recognition system with email [20]. F. Palmieri, M. Ficco, S. Pardi, and A. Castiglione,
identification message relay mechanism," in Computing "A cloud-based architecture for emergency management
Networking and Informatics (ICCNI), 2017 International and first responders localization in smart city
Conference on, 2017, pp. 1-6. environments," 2016.
[7]. C. Atuegwu, S. Daramola, K. O. Okokpujie, and E. [21]. M. Zhao and X. Liu, "Development of decision
Noma-Osaghae, "Development of an Improved support tool for optimizing urban emergency rescue
Fingerprint Feature Extraction Algorithm for Personal facility locations to improve humanitarian logistics
IJISRT18JU373 [Link] 482
Volume 3, Issue 6, June – 2018 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
management," Safety Science, vol. 102, pp. 110-117, 2//
2018.
[22]. R. Prasanna and T. J. Huggins, "Factors affecting the
acceptance of information systems supporting emergency
operations centres," Computers in Human Behavior, vol.
57, pp. 168-181, 4// 2016.
[23]. A. Jain, J. Adebayo, E. de Leon, W. Li, L. Kagal, P.
Meier, et al., "Mobile Application Development for Crisis
Data," Procedia Engineering, vol. 107, pp. 255-262, //
2015.
[24]. X. Ma and J. Yates, "Multi-network multi-message
social media message dissemination problem for
emergency communication," Computers & Industrial
Engineering, vol. 113, pp. 256-268, 11// 2017.
[25]. C. Du and S. Zhu, "Research on Urban Public Safety
Emergency Management Early Warning System based on
Technologies for the Internet of Things," Procedia
Engineering, vol. 45, pp. 748-754, // 2012.
[26]. A. Aloudat, K. Michael, X. Chen, and M. M. Al-
Debei, "Social acceptance of location-based mobile
government services for emergency management,"
Telematics and Informatics, vol. 31, pp. 153-171, 2//
2014.
[27]. J. Gomez, H. Velssy, and L. Cobo, "Urban Security
System Based on Quadrants," 2015.
IJISRT18JU373 [Link] 483