SlideShare a Scribd company logo
1 of 15
Download to read offline
Institute of Engineering and Technology, Lucknow
Department of Computer Science and Engineering
INTRUSION DETECTION SYSTEM
PROJECT REPORT
B. Tech IT (VI Sem)
Session 2017 - 2018
Software Engineering Lab CS 652
Submitted By :  Submitted To : 
Shreyas Singh (1505213044) Mr. Mahima Shankar Pandey
Shubham Jaiswal (1505213045)
Shubhranshu Maurya (1505213046)
Vishal Polley (1505213053)
SOFTWARE REQUIREMENT
SPECIFICATION
FOR
Intrusion Detection System based on  
Python and OpenCV  
 
 
Shreyas Singh (1505213044)
Shubham Jaiswal (1505213045)
Shubhranshu Maurya (1505213046)
Vishal Polley (1505213053)
TABLE OF CONTENT
1
ACKNOWLEDGMENTS 2
ABSTRACT 3
1. INTRODUCTION 4
1.1 PURPOSE 4
1.2 SCOPE 4
1.3 OVERVIEW 4
2. FUNCTIONAL REQUIREMENTS 5
2.1 SYSTEM REQUIREMENT PHASE 5
2.1.1 ANALYSIS PHASE 5
2.1.2 DESIGN PHASE 5
2.1.3 IMPLEMENTATION AND UNIT TESTING PHASE 6
2.1.4 TESTING PHASE 6
2.1.5 MAINTENANCE / OPERATION PHASE 8
2.2 DATA FLOW DIAGRAM 8
3. INTERFACE REQUIREMENT 11
3.1 HARDWARE REQUIREMENT 11
3.2 SOFTWARE REQUIREMENT 11
4. SYSTEM IMPLEMENTATION 11
5. PERFORMANCE REQUIREMENT 13
REFERENCES 14
2
ACKNOWLEDGEMENTS
I have taken efforts in this project. However, it would not have been
possible without the kind support and help of many individuals and
organizations. I would like to extend my sincere thanks to all of them.
I am highly indebted to my faculty members for their guidance and constant
supervision as well as for providing necessary information regarding the
project & also for their support in completing the project.
I would like to express my gratitude towards my parents & team members
for their kind cooperation and encouragement which help me in completion
of this project.
I would like to express my special gratitude and thanks to industry persons
for giving me such attention and time.
My thanks and appreciations also go to my colleague in developing the
project and people who have willingly helped me out with their abilities.
3
ABSTRACT
A face recognition system is one of the biometric information processes, its
applicability is easier and working range is larger than others, i.e.
fingerprint, iris scanning, signature, etc. The system uses a combination of
techniques in two topics; face detection and recognition.
The face detection is performed on live acquired images without any
application field in mind. Processes utilized in the system are facial feature
extraction and face image extraction on a face candidate using dlib's
state-of-the-art face recognition built with deep learning.
The system is able to recognize and identify any person and give prompt
alerts if the face is not recognised.
System is also capable of detecting and recognizing multiple faces in live
acquired images.
4
1. INTRODUCTION
1.1 Purpose
The aim of the project is to:
i. To implement Intrusion Detection System with the help of Face
recognition (in terms of motion).
ii. To develop an application for Face Recognition for detection of any
intrusions in the system.
1.2 Scope
A face recognition system is one of the biometric information processes, it’s
applicability is easier and working range is larger than others, i.e.; fingerprint,
iris scanning, signature, etc. The system uses a combination of techniques in
two topics; face detection and recognition. The face detection is performed on
live acquired images without any application field in mind. System is also
capable of detecting and recognizing multiple faces in live acquired images.
This project is aimed to design an intelligent intrusion detection system that
will be able to recognize and identify any person and give prompt alerts if
the face is not recognised.
1.3 Overview
Reading human facial expressions can help us in our day-to-day activities
such as in security issues, gaming technology, marketing and advertising
and expert system.
It is found that most surveillance facial recognition systems only
automatically check every person against a database of known suspects.
5
This makes it hard for securities to catch someone who has the intentions
of stealing or about to do any forbidden act.
2. FUNCTIONAL REQUIREMENT
2.1 System Requirement Phase
The purpose of this phase is to determine project’s main goal and how the
system will function. All possible requirements of the system to be
developed are captured in this phase.
2.1.1 Analysis Phase
In this phase analysis of the user's requirement is carried out. This is to
determine the scope of the users.
Thing to be cogitated are:
● Scope of users
● Purpose of the system
● Suitable equipment’s (camera, laptop etc.)
The overall purpose of the analysis phase is to define the project goals that
have been determined in the requirements phase into defined functions
and operation of the intended system.
2.1.2 Design Phase
This is the plan of how the system will look like and how it works. It
describes the desired features and operations in detail and may include
screen layouts, process diagrams, pseudocode and other documentation.
A sample of the project is developed in this phase. Design focuses on high
level design like, what programs are needed and how are they going to
interact, low-level design (how the individual programs are going to work),
interface design (what are the interfaces going to look like) and data design
6
(what data will be required). During these phases, the software's overall
structure is defined and the logical system of the product is developed in
this phase. It also helps in specifying hardware and system requirements
and also helps in defining overall system architecture.
2.1.3 Implementation and Unit Testing Phase
This phase is considered to be the longest phase of the software
development life cycle. This is so because this is where the code is created
and work is divided into small programs that are referred to as units. This
phase include unit testing whereby units will be tested individually for their
functionality before the whole system. Unit testing mainly verifies if the
modules also known as units meet project specifications.
2.1.4 Testing Phase
This is the main testing phase in the SDLC, as the project is divided in
small modules in the previous phase then the modules will be integrated
together to test the system as whole. This is to make sure that the modules
work together as intended by the developer (as in the specifications) and
7
required by users. It also checks for bugs, errors and ensure the system is
able to work in the intended platform. After ensuring that the product had
solved the problem the system is then delivered to the customers
2.1.5 Maintenance / Operation Phase
Not all problems can be seen directly, but they occur with time and as other
problems they needs to be solved. Usually these kinds of problems come in
picture after the practical use of the system they are never found
throughout the development life cycle. This phase of the Waterfall Model is
considered to be very long, it never ends. The changes that occur after the
product is handed to the users must not affect the main operation of the
system, so a system must be developed in a way that it will adapt to
change.
2.2 Data Flow Diagram
A data flow diagram (DFD) is a graphical representation of the "flow" of
data through an information system, modeling its process aspects. Often
they are a preliminary step used to create an overview of the system which
can later be elaborated.
DFDs represent the following:
1. External devices sending and receiving data
2. Processes that change that data
3. Data flows themselves
4. Data storage locations
DFDs are the method of choice over technical descriptions for three
principal reasons:
● DFDs are easier to understand by technical and nontechnical audiences.
8
● DFDs can provide a high level system overview, complete with boundaries
and connections to other systems.
● DFDs can provide a detailed representation of system components.
LEVEL 0
9
LEVEL 1
LEVEL 2
10
3. INTERFACE REQUIREMENT
3.1 Hardware Requirement
i. 32/64 bit system with minimum 2GB of RAM
ii. Webcam with minimum resolution of 2MP.
3.2 Software Requirement
i. cmake
ii. dlib
iii. Python 3
iv. OpenCV (Python Module)
4. SYSTEM IMPLEMENTATION
Face Detection and Extraction of Image
11
Saving and Training of Image
Detection of Pre Trained Image (Permission Granted)
12
Detection of Intrusion (Permission Denied)
5. Performance Requirement
The architectural diagram shows the flow of events for the facial expression
recognition intelligent system for intrusion detection. The camera captures
the movements concentrating on the head and in the motion detection
module the face will be detected together with the head pose estimation.
13
REFERENCES
[1]. Design of a Face Recognition System
(https://www.researchgate.net/publication/262875649_Design_of_a_Face_Recognition_System)
[2]: Face Recognition Module
(https://github.com/ageitgey/face_recognition)
[3]. OpenCV Library
(https://opencv.org/)
14

More Related Content

What's hot

Machine learning of structured outputs
Machine learning of structured outputsMachine learning of structured outputs
Machine learning of structured outputs
zukun
 

What's hot (20)

Human activity recognition
Human activity recognitionHuman activity recognition
Human activity recognition
 
Snmpv3
Snmpv3Snmpv3
Snmpv3
 
Operating systems galvin-ch1
Operating systems galvin-ch1Operating systems galvin-ch1
Operating systems galvin-ch1
 
Unit 1 ppt
Unit 1 pptUnit 1 ppt
Unit 1 ppt
 
ASP.NET Page Life Cycle
ASP.NET Page Life CycleASP.NET Page Life Cycle
ASP.NET Page Life Cycle
 
Difference Program vs Process vs Thread
Difference Program vs Process vs ThreadDifference Program vs Process vs Thread
Difference Program vs Process vs Thread
 
Mini project title prime number generator
Mini project title prime number generatorMini project title prime number generator
Mini project title prime number generator
 
Windows process-scheduling
Windows process-schedulingWindows process-scheduling
Windows process-scheduling
 
Facial Emotion Recognition: A Deep Learning approach
Facial Emotion Recognition: A Deep Learning approachFacial Emotion Recognition: A Deep Learning approach
Facial Emotion Recognition: A Deep Learning approach
 
Elements of dynamic programming
Elements of dynamic programmingElements of dynamic programming
Elements of dynamic programming
 
Symbol table management and error handling in compiler design
Symbol table management and error handling in compiler designSymbol table management and error handling in compiler design
Symbol table management and error handling in compiler design
 
Ai lecture 07 inference engine
Ai lecture 07 inference engineAi lecture 07 inference engine
Ai lecture 07 inference engine
 
Machine learning of structured outputs
Machine learning of structured outputsMachine learning of structured outputs
Machine learning of structured outputs
 
ER diagram for Shopping Mall Management System
ER diagram for Shopping Mall Management SystemER diagram for Shopping Mall Management System
ER diagram for Shopping Mall Management System
 
Code optimization in compiler design
Code optimization in compiler designCode optimization in compiler design
Code optimization in compiler design
 
Cd lab manual
Cd lab manualCd lab manual
Cd lab manual
 
Parallel searching
Parallel searchingParallel searching
Parallel searching
 
Seminar On Naive Bayes for Spam Filtering
Seminar On Naive Bayes for Spam Filtering Seminar On Naive Bayes for Spam Filtering
Seminar On Naive Bayes for Spam Filtering
 
Human age and gender Detection
Human age and gender DetectionHuman age and gender Detection
Human age and gender Detection
 
Compiler Optimization Presentation
Compiler Optimization PresentationCompiler Optimization Presentation
Compiler Optimization Presentation
 

Similar to Project Report on Intrusion Detection System

Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
Raghu Vamsy Sirasala
 
Cis 2303 lo1 part 1_weeks_1_2 - student ver
Cis 2303 lo1 part 1_weeks_1_2 - student verCis 2303 lo1 part 1_weeks_1_2 - student ver
Cis 2303 lo1 part 1_weeks_1_2 - student ver
Ahmad Ammari
 
Slide set 1 (Traditional Software Development) (1).pptx
Slide set 1 (Traditional Software Development) (1).pptxSlide set 1 (Traditional Software Development) (1).pptx
Slide set 1 (Traditional Software Development) (1).pptx
UTKARSHBHARDWAJ71
 
departmental store
departmental storedepartmental store
departmental store
Freelancer
 

Similar to Project Report on Intrusion Detection System (20)

Cake shop billing system
Cake shop billing systemCake shop billing system
Cake shop billing system
 
Srs
SrsSrs
Srs
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
 
System developement methods
System developement methodsSystem developement methods
System developement methods
 
lake city institute of technology
lake city institute of technology lake city institute of technology
lake city institute of technology
 
Public voice
Public voicePublic voice
Public voice
 
Report on SOFTWARE DEVELOPMENT LIFE CYCLE SDLC
Report on SOFTWARE DEVELOPMENT LIFE CYCLE SDLC Report on SOFTWARE DEVELOPMENT LIFE CYCLE SDLC
Report on SOFTWARE DEVELOPMENT LIFE CYCLE SDLC
 
Cis 2303 lo1 part 1_weeks_1_2 - student ver
Cis 2303 lo1 part 1_weeks_1_2 - student verCis 2303 lo1 part 1_weeks_1_2 - student ver
Cis 2303 lo1 part 1_weeks_1_2 - student ver
 
Online Voting System Project management system.doc
Online Voting System Project management system.docOnline Voting System Project management system.doc
Online Voting System Project management system.doc
 
Bug Tracking System (BTS)
Bug Tracking System (BTS)Bug Tracking System (BTS)
Bug Tracking System (BTS)
 
Bt0081 software engineering
Bt0081 software engineeringBt0081 software engineering
Bt0081 software engineering
 
Sofware Engineering Important Past Paper 2019
Sofware Engineering Important Past Paper 2019Sofware Engineering Important Past Paper 2019
Sofware Engineering Important Past Paper 2019
 
Analysis Of Process Structure In Windows Operating System
Analysis Of Process Structure In Windows Operating SystemAnalysis Of Process Structure In Windows Operating System
Analysis Of Process Structure In Windows Operating System
 
Mingle box - Online Job seeking System
Mingle box - Online Job seeking SystemMingle box - Online Job seeking System
Mingle box - Online Job seeking System
 
Slide set 1 (Traditional Software Development) (1).pptx
Slide set 1 (Traditional Software Development) (1).pptxSlide set 1 (Traditional Software Development) (1).pptx
Slide set 1 (Traditional Software Development) (1).pptx
 
departmental store
departmental storedepartmental store
departmental store
 
Documentation
DocumentationDocumentation
Documentation
 
System development life cycle
System development life cycleSystem development life cycle
System development life cycle
 
Week 10
Week 10Week 10
Week 10
 
Week 10
Week 10Week 10
Week 10
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 

Project Report on Intrusion Detection System

  • 1. Institute of Engineering and Technology, Lucknow Department of Computer Science and Engineering INTRUSION DETECTION SYSTEM PROJECT REPORT B. Tech IT (VI Sem) Session 2017 - 2018 Software Engineering Lab CS 652 Submitted By :  Submitted To :  Shreyas Singh (1505213044) Mr. Mahima Shankar Pandey Shubham Jaiswal (1505213045) Shubhranshu Maurya (1505213046) Vishal Polley (1505213053)
  • 2. SOFTWARE REQUIREMENT SPECIFICATION FOR Intrusion Detection System based on   Python and OpenCV       Shreyas Singh (1505213044) Shubham Jaiswal (1505213045) Shubhranshu Maurya (1505213046) Vishal Polley (1505213053) TABLE OF CONTENT 1
  • 3. ACKNOWLEDGMENTS 2 ABSTRACT 3 1. INTRODUCTION 4 1.1 PURPOSE 4 1.2 SCOPE 4 1.3 OVERVIEW 4 2. FUNCTIONAL REQUIREMENTS 5 2.1 SYSTEM REQUIREMENT PHASE 5 2.1.1 ANALYSIS PHASE 5 2.1.2 DESIGN PHASE 5 2.1.3 IMPLEMENTATION AND UNIT TESTING PHASE 6 2.1.4 TESTING PHASE 6 2.1.5 MAINTENANCE / OPERATION PHASE 8 2.2 DATA FLOW DIAGRAM 8 3. INTERFACE REQUIREMENT 11 3.1 HARDWARE REQUIREMENT 11 3.2 SOFTWARE REQUIREMENT 11 4. SYSTEM IMPLEMENTATION 11 5. PERFORMANCE REQUIREMENT 13 REFERENCES 14 2
  • 4. ACKNOWLEDGEMENTS I have taken efforts in this project. However, it would not have been possible without the kind support and help of many individuals and organizations. I would like to extend my sincere thanks to all of them. I am highly indebted to my faculty members for their guidance and constant supervision as well as for providing necessary information regarding the project & also for their support in completing the project. I would like to express my gratitude towards my parents & team members for their kind cooperation and encouragement which help me in completion of this project. I would like to express my special gratitude and thanks to industry persons for giving me such attention and time. My thanks and appreciations also go to my colleague in developing the project and people who have willingly helped me out with their abilities. 3
  • 5. ABSTRACT A face recognition system is one of the biometric information processes, its applicability is easier and working range is larger than others, i.e. fingerprint, iris scanning, signature, etc. The system uses a combination of techniques in two topics; face detection and recognition. The face detection is performed on live acquired images without any application field in mind. Processes utilized in the system are facial feature extraction and face image extraction on a face candidate using dlib's state-of-the-art face recognition built with deep learning. The system is able to recognize and identify any person and give prompt alerts if the face is not recognised. System is also capable of detecting and recognizing multiple faces in live acquired images. 4
  • 6. 1. INTRODUCTION 1.1 Purpose The aim of the project is to: i. To implement Intrusion Detection System with the help of Face recognition (in terms of motion). ii. To develop an application for Face Recognition for detection of any intrusions in the system. 1.2 Scope A face recognition system is one of the biometric information processes, it’s applicability is easier and working range is larger than others, i.e.; fingerprint, iris scanning, signature, etc. The system uses a combination of techniques in two topics; face detection and recognition. The face detection is performed on live acquired images without any application field in mind. System is also capable of detecting and recognizing multiple faces in live acquired images. This project is aimed to design an intelligent intrusion detection system that will be able to recognize and identify any person and give prompt alerts if the face is not recognised. 1.3 Overview Reading human facial expressions can help us in our day-to-day activities such as in security issues, gaming technology, marketing and advertising and expert system. It is found that most surveillance facial recognition systems only automatically check every person against a database of known suspects. 5
  • 7. This makes it hard for securities to catch someone who has the intentions of stealing or about to do any forbidden act. 2. FUNCTIONAL REQUIREMENT 2.1 System Requirement Phase The purpose of this phase is to determine project’s main goal and how the system will function. All possible requirements of the system to be developed are captured in this phase. 2.1.1 Analysis Phase In this phase analysis of the user's requirement is carried out. This is to determine the scope of the users. Thing to be cogitated are: ● Scope of users ● Purpose of the system ● Suitable equipment’s (camera, laptop etc.) The overall purpose of the analysis phase is to define the project goals that have been determined in the requirements phase into defined functions and operation of the intended system. 2.1.2 Design Phase This is the plan of how the system will look like and how it works. It describes the desired features and operations in detail and may include screen layouts, process diagrams, pseudocode and other documentation. A sample of the project is developed in this phase. Design focuses on high level design like, what programs are needed and how are they going to interact, low-level design (how the individual programs are going to work), interface design (what are the interfaces going to look like) and data design 6
  • 8. (what data will be required). During these phases, the software's overall structure is defined and the logical system of the product is developed in this phase. It also helps in specifying hardware and system requirements and also helps in defining overall system architecture. 2.1.3 Implementation and Unit Testing Phase This phase is considered to be the longest phase of the software development life cycle. This is so because this is where the code is created and work is divided into small programs that are referred to as units. This phase include unit testing whereby units will be tested individually for their functionality before the whole system. Unit testing mainly verifies if the modules also known as units meet project specifications. 2.1.4 Testing Phase This is the main testing phase in the SDLC, as the project is divided in small modules in the previous phase then the modules will be integrated together to test the system as whole. This is to make sure that the modules work together as intended by the developer (as in the specifications) and 7
  • 9. required by users. It also checks for bugs, errors and ensure the system is able to work in the intended platform. After ensuring that the product had solved the problem the system is then delivered to the customers 2.1.5 Maintenance / Operation Phase Not all problems can be seen directly, but they occur with time and as other problems they needs to be solved. Usually these kinds of problems come in picture after the practical use of the system they are never found throughout the development life cycle. This phase of the Waterfall Model is considered to be very long, it never ends. The changes that occur after the product is handed to the users must not affect the main operation of the system, so a system must be developed in a way that it will adapt to change. 2.2 Data Flow Diagram A data flow diagram (DFD) is a graphical representation of the "flow" of data through an information system, modeling its process aspects. Often they are a preliminary step used to create an overview of the system which can later be elaborated. DFDs represent the following: 1. External devices sending and receiving data 2. Processes that change that data 3. Data flows themselves 4. Data storage locations DFDs are the method of choice over technical descriptions for three principal reasons: ● DFDs are easier to understand by technical and nontechnical audiences. 8
  • 10. ● DFDs can provide a high level system overview, complete with boundaries and connections to other systems. ● DFDs can provide a detailed representation of system components. LEVEL 0 9
  • 12. 3. INTERFACE REQUIREMENT 3.1 Hardware Requirement i. 32/64 bit system with minimum 2GB of RAM ii. Webcam with minimum resolution of 2MP. 3.2 Software Requirement i. cmake ii. dlib iii. Python 3 iv. OpenCV (Python Module) 4. SYSTEM IMPLEMENTATION Face Detection and Extraction of Image 11
  • 13. Saving and Training of Image Detection of Pre Trained Image (Permission Granted) 12
  • 14. Detection of Intrusion (Permission Denied) 5. Performance Requirement The architectural diagram shows the flow of events for the facial expression recognition intelligent system for intrusion detection. The camera captures the movements concentrating on the head and in the motion detection module the face will be detected together with the head pose estimation. 13
  • 15. REFERENCES [1]. Design of a Face Recognition System (https://www.researchgate.net/publication/262875649_Design_of_a_Face_Recognition_System) [2]: Face Recognition Module (https://github.com/ageitgey/face_recognition) [3]. OpenCV Library (https://opencv.org/) 14