SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 737
Customized campus surveillance system
Sarikonda Poojitha1, Dr. Sunil Bhutada2
1M.Tech Student, Information Technology Department, Srinidhi college of science and technology, Hyderabad,
Telangana, India
2Professor, Information Technology Department, Srinidhi college of science and technology, Hyderabad,
Telangana, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Colleges these days are trying to augment the
quality of being in the campus by integrating the finest
practices of safety along with security with the help of
technology. A significant element of a comprehensive security
system is the deployment of a surveillance camera scheme.
This surveillance in the college is intended to identify the
authorization of the people who try to enter into the college
and aid in protecting the property of the College in
conjunction with student`s safety. These guidelines
concentrate on the College’s safety and security needs while
respecting individual privacy of those attending, working or
visiting the College. This ensures monitoring the presence of
the student in the campus by the parents and the college.
Key Words: surveillance camera scheme, authorization,
monitoring, privacy.
1. INTRODUCTION
Surveillance system is generally significant in the
field of security. Presetdays,videosurveillanceframework is
a significant security resource for business, law
implementation and military applications. Straightforward
frameworks recognize movement in a camera's field of
view. Surveillance cameras are camcordersutilizedtowatch
a region. They are regularly associated with a chronicle
gadget or IP organize, and might be viewed by a security
gatekeeper or law authorization official. Cameras and
recording gear used to be moderately costly and required
human faculty to screen camera film.
Identification and authorization has become an
important subject. This framework provides the identifying
and authorizing a person fromhisentryintothecampus. The
visual Surveillance captures the images of the persons and
identifies them to the already existing database. This
includes installation of a cctv camera to capture the images
of the persons. The fundamental issues when structuring an
insightful CCTV framework are identified with the choice of
the correct focal points and sensors for camcorders utilized,
as these cameras ought to have the option to give 100%
inclusion to the zone being under observation. It plans to
consequently distinguish, perceiveandtrack individualsand
items from picture arrangements so as to comprehend and
portray elements and cooperation among them.
Entryway security or passage entryway security is
important to anticipate the authorization in the controlled
region. A customary checking gadget makes utilization of
costly hardware, includes high power utilization and
requires consistent plate get to which clearly requires
colossal space. The installed arrangements beat these
deficiencies and give live encourages from webcamworking
on cloud without the requirement of the PC. Calculationsare
added to the inserted frameworks to increase their
effectiveness, by making utilization of the open source
libraries, the development location calculations permit
Aurdino Uno to distinguish development, the protest
discovery calculations identify true elements like face of a
person.
The new TensorCam is the security camera with
built-in Artificial Intelligence that has been specifically
designed for capturing images of livingand nonlivingthings.
Here the AI is built on Google’s TensorFlow, Keras, and
Caffe2, and one can setup their own recognition tasks using
the Deep Cognition Deep Learning Studio. We can use the
deep learning capabilities to setup specific tasks, like
detecting certain objects, specific faces, or even particular
kinds of actions. The camera itself has full HD 1080p
resolution and night vision, and will live stream the feed so
one can check it whenever required.
Facial acknowledgment CCTV innovation yields
phenomenal execution in spite of halfway impediments of
the face, the utilization of glasses, scarves or tops,changesof
outward appearance, and moderatepivotsoftheface.Also,it
doesn't enable clients to be imitated utilizing photos.Tensor
biometric innovation is the ideal answer for control the
entrance of staff to confined security zones.
2. LITERATURE SURVEY:
Ching-Kai Huang and Tsuhan Chen [1] proposed a
technique by recording just video that has significant data,
i.e., video that has movement in the scene. This can be
accomplished with a computerized camcorder furthermore,
a DSP calculation that identifies movement.
Wijnhoven et al [2] considered model-based
element location for traffic reconnaissance, going for object
arrangement. Inside distinguished locales of-intrigue(ROIs)
of moving articles in the scene, the direction of the item is
detected utilizing an angle bearing histogram. For the
purposeful direction,a 3Dwire-outlinemodel isappliedonto
the picture information and the best coordinating pixel-
position is determined inside the item's districts of-intrigue.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 738
Stauffer, C et al [3] examined about demonstrating
each pixel as a gathering of Gaussians and utilizations anon-
line estimate to restore the model. The Gaussian
appropriations of the versatile blend model are evaluatedto
figure out which are probably to result from a foundation
process. Every pixel is sorted dependent on the Gaussian
dispersion which speaks to it most productivelyisviewedas
a component of the foundation model..
Rama et al [4] tended to the issue of how to pick the
most good number of sensors and how to choose their area
in a given observed region for MSS.
Pradeep et al [5] suggested a novel strategy which
energetically processes the certainty level of new streams in
view of the reality whether it gives proof which agrees or
repudiates with the effectively confided in streams
Atrey et al [6] displayed a top-down occasion
discovery approach forsoundbasedoccasionrecognition for
reconnaissance. The proposed approachatfirstsortsa given
sound edge into non-vocal and vocal occasions, and next
convey outs advance grouping into energized and typical
occasions.
An ensuing system,W4S [7], incorporated ongoing
sound system to survive the complexities that W4 met with
unexpected brightening changes, shadow and impediment
which make following a lot harder in force pictures.
Wren et al. [8] built up The Pfinder framework
which is utilized to recover a 3-dimensional portrayal of an
individual in a tremendous zone.
Axel Baumann et al [9] gave a precise survey of
quantifies and assesses their adequacyfor explicithighlights
like division, occasion recognition and following.
Ismail Haritaoglu et al [10] proposed a minimal
effort PC based constant visual observation framework,
called W4, for following individuals and their pieces of the
body, and administering their exercises in surround sound
and monochromatic symbolism.Itworksongrayscalejustas
infrared video symbolism
3. PROPOSED SYSTEM:
The system`s architecture propounds the installation of
TensorCam at each entry level. The objective of this system
is the availability of the TensorCam is to capturing and the
comparing for the identification of the authorized and the
unauthorized persons upon the entry into the campus. A
database is connected to the TensorCam in which thedetails
of the persons (studying, working ,visiting the campus )
along with the photographs are stored. Tensorcam captures
each person`s face upon the entry and compares it with the
data present in the database. The architecture includes the
installation of end-end surveillance i.e., upon entering and
leaving the college. And also intermediate cameras are
installed at different levels to check the presence and
location of the respective person. Uponenteringthecampus,
each time the person has to be identified by the Cam i.e.,
whether he is already registered or not. If the person`s data
is already available at the database, he is allowed to enter. If
the person`s data is not available in the database the
computer that is connected to the cam asks for the
registration or creation of the new table. The person who is
identified is highlighted in the green color and the person
who is unidentified is highlighted in red color. Upon the
indication of the person`s face in red highlighted box, they
are entitled to register. It is easy to monitor who is entering
into the campus. Basically there are two main categories in
the database with the person`s details. They are PRIVATE
(Pr) and PUBLIC (Pu). Private consists of students,
employees (working and non- workingstaff).Publicisfor the
people who are visitors of the college. Each data sheet of the
student contains the name, roll no, admission no, class,
department, entry and exit data. Each data sheet of the
employee contains the name, employee id, designation and
the department entry and exit. Visitor`s data sheet contains
the details as name, person to be visited, mobile number,
entry and exit details. A log entry is enlarged upon
requirement. This also includesthefacilityoflogginginto the
website for monitoring the presence of the students by their
parents.
Figure: Architecture of the proposed system.
RESULTS:
Using the proposed system a databasehasbeencreated with
the enrolled students. Appropriate images of the students
have been taken. The camera has to be setup in such a way
that faces can be captured via camera .
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 739
Figure: Camera identifying the students while entry into
the college.
Figure: Camera identifing students in side the campus.
CONCLUSION & FUTURE WORK:
In current generation security has been a major concern in
most of the sectors especially in Educational institutions
where it constitutes large numberofpeople.Sotheproposed
setup enables the Institution managementaswell asparents
to have surveillance without interrupting one’s privacy. By
utilizing this setup, it emphasizes the identification of
persons very efficiently. The capability of enhancing
situational awareness across multiple scales of time and
space is the significant feature of this system. Addition of an
alarm to the system adds an advanced security when
prohibited persons try to enter the campus. A videotracking
be added to monitor any suspicious activities.
REFERENCES
[1] Ching-Kai Huang and Tsuhan Chen, “Motion Activated
Video Surveillance Using TI DSP”, DSPS FEST '99, Houston,
Texas, August 4-6, 1999.
[2] Wijnhoven, R., de With, P, “3D wire-frame object-
modeling experiments for video surveillance”, Proc. of 27th
Symposium on Information Theory in the Benelux,2006, pp.
101–108.
[3] Stauffer. C, Grimson W.E.L, “Adaptive background
mixture models for real-time tracking”, IEEE Computer
Society Conference on Computer Vision and Pattern
Recognition. Volume 2., Ft. 1999, pp. 252–258.
[4] Rama, K.G.S., Atrey, P.K., Singh, V.K., Ramakrishnan, K.,
Kankanhalli, M.S., “A Design Methodology For Selection and
Placement of Sensors in Multimedia Surveillance Systems”,
The 4th ACM International Workshop on Video Surveillance
and Sensor Networks, Santa Barbara, CA, USA 2006.
[5] P. K. Atrey, Mohan S. Kankanhalli, Abdulmotaleb El
Saddik, “Confidence Building Among Correlated Streams in
Multimedia Surveillance Systems”, MMM 2007, LNCS 4352,
Part II, 2007, pp. 155–164.
[6] Atrey, P.K., Maddage,N.C., Kankanhalli,M.S.,“Audiobased
event detection for multimedia surveillance”, IEEE
International Conference on Acoustics, Speech and Signal
Processing, 2006, pp 813–816.
[7] Ismail Haritaoglu, David Harwood, Larry S. Davis, “W4S:
A Real-Time System for Detecting and Tracking People in 2
½ D”.
[8] Wren, C. R., Azarbayejani, A., Darrell, T., Pentland, A. P.:
Pfinder:real-time tracking of the human body. IEEE
Transactions Pattern Analysis Machine Intelligence, Vol. 19,
No.7,780–785.(1997)
[9] Axel Baumann, MarcoBoltz,Julia Ebling,MatthiasKoenig,
Hartmut S. Loos, Marcel Merkel, Wolfgang Niem, Jan
KarlWarzelhan, Jie Yu “A Review and Comparison of
Measures for Automatic Video Surveillance Systems”,
Hindawi Publishing Corporation EURASIP Journal on Image
and Video Processing Volume 2008, Article ID 824726, 30
pages doi:10.1155/2008/824726.
[10] Ismail Haritaoglu, Harwood, D., Davis,L,“W4:real-time
surveillance of people and their activities”, IEEE
Transactions on Pattern Analysis and Machine Intelligence
(PAMI), vol. 22, 2000, pp. 809–830.

More Related Content

What's hot

IRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric AuthenticationIRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric AuthenticationIRJET Journal
 
Fingerprint identification technique
Fingerprint identification techniqueFingerprint identification technique
Fingerprint identification techniqueIAEME Publication
 
Face Recognition Techniques - An evaluation Study
Face Recognition Techniques - An evaluation StudyFace Recognition Techniques - An evaluation Study
Face Recognition Techniques - An evaluation StudyEswar Publications
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...IRJET Journal
 
M phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsM phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsVijay Karan
 
An Improved Tracking Using IMU and Vision Fusion for Mobile Augmented Reality...
An Improved Tracking Using IMU and Vision Fusion for Mobile Augmented Reality...An Improved Tracking Using IMU and Vision Fusion for Mobile Augmented Reality...
An Improved Tracking Using IMU and Vision Fusion for Mobile Augmented Reality...ijma
 
A Proposed Framework for Robust Face Identification System
A Proposed Framework for Robust Face Identification SystemA Proposed Framework for Robust Face Identification System
A Proposed Framework for Robust Face Identification SystemAhmed Gad
 
Real Time Implementation Of Face Recognition System
Real Time Implementation Of Face Recognition SystemReal Time Implementation Of Face Recognition System
Real Time Implementation Of Face Recognition SystemIJERA Editor
 
(2005) Implementation of Hand Geometry at Purdue University's Recreational Ce...
(2005) Implementation of Hand Geometry at Purdue University's Recreational Ce...(2005) Implementation of Hand Geometry at Purdue University's Recreational Ce...
(2005) Implementation of Hand Geometry at Purdue University's Recreational Ce...International Center for Biometric Research
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationIJERA Editor
 
Face Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance SystemFace Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance Systemijtsrd
 
IRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET- Vehicle Seat Vacancy Identification using Image Processing TechniqueIRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET- Vehicle Seat Vacancy Identification using Image Processing TechniqueIRJET Journal
 
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...IRJET Journal
 
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...SubmissionResearchpa
 
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...cscpconf
 
Local Descriptor based Face Recognition System
Local Descriptor based Face Recognition SystemLocal Descriptor based Face Recognition System
Local Descriptor based Face Recognition SystemIRJET Journal
 
An interactive image segmentation using multiple user input’s
An interactive image segmentation using multiple user input’sAn interactive image segmentation using multiple user input’s
An interactive image segmentation using multiple user input’seSAT Publishing House
 
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
Ieeepro techno solutions   ieee embedded project secure and robust iris recog...Ieeepro techno solutions   ieee embedded project secure and robust iris recog...
Ieeepro techno solutions ieee embedded project secure and robust iris recog...srinivasanece7
 

What's hot (20)

IRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric AuthenticationIRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric Authentication
 
Fingerprint identification technique
Fingerprint identification techniqueFingerprint identification technique
Fingerprint identification technique
 
Face Recognition Techniques - An evaluation Study
Face Recognition Techniques - An evaluation StudyFace Recognition Techniques - An evaluation Study
Face Recognition Techniques - An evaluation Study
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
 
M phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsM phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projects
 
An Improved Tracking Using IMU and Vision Fusion for Mobile Augmented Reality...
An Improved Tracking Using IMU and Vision Fusion for Mobile Augmented Reality...An Improved Tracking Using IMU and Vision Fusion for Mobile Augmented Reality...
An Improved Tracking Using IMU and Vision Fusion for Mobile Augmented Reality...
 
A Proposed Framework for Robust Face Identification System
A Proposed Framework for Robust Face Identification SystemA Proposed Framework for Robust Face Identification System
A Proposed Framework for Robust Face Identification System
 
Real Time Implementation Of Face Recognition System
Real Time Implementation Of Face Recognition SystemReal Time Implementation Of Face Recognition System
Real Time Implementation Of Face Recognition System
 
(2005) Implementation of Hand Geometry at Purdue University's Recreational Ce...
(2005) Implementation of Hand Geometry at Purdue University's Recreational Ce...(2005) Implementation of Hand Geometry at Purdue University's Recreational Ce...
(2005) Implementation of Hand Geometry at Purdue University's Recreational Ce...
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
 
Face Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance SystemFace Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance System
 
IRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET- Vehicle Seat Vacancy Identification using Image Processing TechniqueIRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
 
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
 
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
 
184
184184
184
 
An optimal face recoginition tool
An optimal face recoginition toolAn optimal face recoginition tool
An optimal face recoginition tool
 
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
 
Local Descriptor based Face Recognition System
Local Descriptor based Face Recognition SystemLocal Descriptor based Face Recognition System
Local Descriptor based Face Recognition System
 
An interactive image segmentation using multiple user input’s
An interactive image segmentation using multiple user input’sAn interactive image segmentation using multiple user input’s
An interactive image segmentation using multiple user input’s
 
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
Ieeepro techno solutions   ieee embedded project secure and robust iris recog...Ieeepro techno solutions   ieee embedded project secure and robust iris recog...
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
 

Similar to IRJET- Customized Campus Surveillance System

Sanjaya: A Blind Assistance System
Sanjaya: A Blind Assistance SystemSanjaya: A Blind Assistance System
Sanjaya: A Blind Assistance SystemIRJET Journal
 
Face Recognition System using OpenCV
Face Recognition System using OpenCVFace Recognition System using OpenCV
Face Recognition System using OpenCVIRJET Journal
 
Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...
Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...
Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...IRJET Journal
 
Object Detection and Localization for Visually Impaired People using CNN
Object Detection and Localization for Visually Impaired People using CNNObject Detection and Localization for Visually Impaired People using CNN
Object Detection and Localization for Visually Impaired People using CNNIRJET Journal
 
IRJET - Face Detection and Recognition System
IRJET -  	  Face Detection and Recognition SystemIRJET -  	  Face Detection and Recognition System
IRJET - Face Detection and Recognition SystemIRJET Journal
 
Person Acquisition and Identification Tool
Person Acquisition and Identification ToolPerson Acquisition and Identification Tool
Person Acquisition and Identification ToolIRJET Journal
 
Real Time Social Distance Detector using Deep learning
Real Time Social Distance Detector using Deep learningReal Time Social Distance Detector using Deep learning
Real Time Social Distance Detector using Deep learningIRJET Journal
 
Person Detection in Maritime Search And Rescue Operations
Person Detection in Maritime Search And Rescue OperationsPerson Detection in Maritime Search And Rescue Operations
Person Detection in Maritime Search And Rescue OperationsIRJET Journal
 
Person Detection in Maritime Search And Rescue Operations
Person Detection in Maritime Search And Rescue OperationsPerson Detection in Maritime Search And Rescue Operations
Person Detection in Maritime Search And Rescue OperationsIRJET Journal
 
IRJET- A Review Analysis to Detect an Object in Video Surveillance System
IRJET- A Review Analysis to Detect an Object in Video Surveillance SystemIRJET- A Review Analysis to Detect an Object in Video Surveillance System
IRJET- A Review Analysis to Detect an Object in Video Surveillance SystemIRJET Journal
 
Human Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision TechniqueHuman Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision TechniqueIRJET Journal
 
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET Journal
 
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET-  	  Criminal Recognization in CCTV Surveillance VideoIRJET-  	  Criminal Recognization in CCTV Surveillance Video
IRJET- Criminal Recognization in CCTV Surveillance VideoIRJET Journal
 
FACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMFACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMIRJET Journal
 
FACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMFACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMIRJET Journal
 
A Crowd Sourcing to Track Individuals in Highly Active Industries
A Crowd Sourcing to Track Individuals in Highly Active IndustriesA Crowd Sourcing to Track Individuals in Highly Active Industries
A Crowd Sourcing to Track Individuals in Highly Active Industriesijtsrd
 
HUMAN IDENTIFIER WITH MANNERISM USING DEEP LEARNING
HUMAN IDENTIFIER WITH MANNERISM USING DEEP LEARNINGHUMAN IDENTIFIER WITH MANNERISM USING DEEP LEARNING
HUMAN IDENTIFIER WITH MANNERISM USING DEEP LEARNINGIRJET Journal
 
Human Action Recognition Using Deep Learning
Human Action Recognition Using Deep LearningHuman Action Recognition Using Deep Learning
Human Action Recognition Using Deep LearningIRJET Journal
 
Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...IJECEIAES
 
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITIONA VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITIONIRJET Journal
 

Similar to IRJET- Customized Campus Surveillance System (20)

Sanjaya: A Blind Assistance System
Sanjaya: A Blind Assistance SystemSanjaya: A Blind Assistance System
Sanjaya: A Blind Assistance System
 
Face Recognition System using OpenCV
Face Recognition System using OpenCVFace Recognition System using OpenCV
Face Recognition System using OpenCV
 
Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...
Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...
Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...
 
Object Detection and Localization for Visually Impaired People using CNN
Object Detection and Localization for Visually Impaired People using CNNObject Detection and Localization for Visually Impaired People using CNN
Object Detection and Localization for Visually Impaired People using CNN
 
IRJET - Face Detection and Recognition System
IRJET -  	  Face Detection and Recognition SystemIRJET -  	  Face Detection and Recognition System
IRJET - Face Detection and Recognition System
 
Person Acquisition and Identification Tool
Person Acquisition and Identification ToolPerson Acquisition and Identification Tool
Person Acquisition and Identification Tool
 
Real Time Social Distance Detector using Deep learning
Real Time Social Distance Detector using Deep learningReal Time Social Distance Detector using Deep learning
Real Time Social Distance Detector using Deep learning
 
Person Detection in Maritime Search And Rescue Operations
Person Detection in Maritime Search And Rescue OperationsPerson Detection in Maritime Search And Rescue Operations
Person Detection in Maritime Search And Rescue Operations
 
Person Detection in Maritime Search And Rescue Operations
Person Detection in Maritime Search And Rescue OperationsPerson Detection in Maritime Search And Rescue Operations
Person Detection in Maritime Search And Rescue Operations
 
IRJET- A Review Analysis to Detect an Object in Video Surveillance System
IRJET- A Review Analysis to Detect an Object in Video Surveillance SystemIRJET- A Review Analysis to Detect an Object in Video Surveillance System
IRJET- A Review Analysis to Detect an Object in Video Surveillance System
 
Human Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision TechniqueHuman Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision Technique
 
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
 
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET-  	  Criminal Recognization in CCTV Surveillance VideoIRJET-  	  Criminal Recognization in CCTV Surveillance Video
IRJET- Criminal Recognization in CCTV Surveillance Video
 
FACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMFACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEM
 
FACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMFACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEM
 
A Crowd Sourcing to Track Individuals in Highly Active Industries
A Crowd Sourcing to Track Individuals in Highly Active IndustriesA Crowd Sourcing to Track Individuals in Highly Active Industries
A Crowd Sourcing to Track Individuals in Highly Active Industries
 
HUMAN IDENTIFIER WITH MANNERISM USING DEEP LEARNING
HUMAN IDENTIFIER WITH MANNERISM USING DEEP LEARNINGHUMAN IDENTIFIER WITH MANNERISM USING DEEP LEARNING
HUMAN IDENTIFIER WITH MANNERISM USING DEEP LEARNING
 
Human Action Recognition Using Deep Learning
Human Action Recognition Using Deep LearningHuman Action Recognition Using Deep Learning
Human Action Recognition Using Deep Learning
 
Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...
 
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITIONA VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 

Recently uploaded (20)

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 

IRJET- Customized Campus Surveillance System

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 737 Customized campus surveillance system Sarikonda Poojitha1, Dr. Sunil Bhutada2 1M.Tech Student, Information Technology Department, Srinidhi college of science and technology, Hyderabad, Telangana, India 2Professor, Information Technology Department, Srinidhi college of science and technology, Hyderabad, Telangana, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Colleges these days are trying to augment the quality of being in the campus by integrating the finest practices of safety along with security with the help of technology. A significant element of a comprehensive security system is the deployment of a surveillance camera scheme. This surveillance in the college is intended to identify the authorization of the people who try to enter into the college and aid in protecting the property of the College in conjunction with student`s safety. These guidelines concentrate on the College’s safety and security needs while respecting individual privacy of those attending, working or visiting the College. This ensures monitoring the presence of the student in the campus by the parents and the college. Key Words: surveillance camera scheme, authorization, monitoring, privacy. 1. INTRODUCTION Surveillance system is generally significant in the field of security. Presetdays,videosurveillanceframework is a significant security resource for business, law implementation and military applications. Straightforward frameworks recognize movement in a camera's field of view. Surveillance cameras are camcordersutilizedtowatch a region. They are regularly associated with a chronicle gadget or IP organize, and might be viewed by a security gatekeeper or law authorization official. Cameras and recording gear used to be moderately costly and required human faculty to screen camera film. Identification and authorization has become an important subject. This framework provides the identifying and authorizing a person fromhisentryintothecampus. The visual Surveillance captures the images of the persons and identifies them to the already existing database. This includes installation of a cctv camera to capture the images of the persons. The fundamental issues when structuring an insightful CCTV framework are identified with the choice of the correct focal points and sensors for camcorders utilized, as these cameras ought to have the option to give 100% inclusion to the zone being under observation. It plans to consequently distinguish, perceiveandtrack individualsand items from picture arrangements so as to comprehend and portray elements and cooperation among them. Entryway security or passage entryway security is important to anticipate the authorization in the controlled region. A customary checking gadget makes utilization of costly hardware, includes high power utilization and requires consistent plate get to which clearly requires colossal space. The installed arrangements beat these deficiencies and give live encourages from webcamworking on cloud without the requirement of the PC. Calculationsare added to the inserted frameworks to increase their effectiveness, by making utilization of the open source libraries, the development location calculations permit Aurdino Uno to distinguish development, the protest discovery calculations identify true elements like face of a person. The new TensorCam is the security camera with built-in Artificial Intelligence that has been specifically designed for capturing images of livingand nonlivingthings. Here the AI is built on Google’s TensorFlow, Keras, and Caffe2, and one can setup their own recognition tasks using the Deep Cognition Deep Learning Studio. We can use the deep learning capabilities to setup specific tasks, like detecting certain objects, specific faces, or even particular kinds of actions. The camera itself has full HD 1080p resolution and night vision, and will live stream the feed so one can check it whenever required. Facial acknowledgment CCTV innovation yields phenomenal execution in spite of halfway impediments of the face, the utilization of glasses, scarves or tops,changesof outward appearance, and moderatepivotsoftheface.Also,it doesn't enable clients to be imitated utilizing photos.Tensor biometric innovation is the ideal answer for control the entrance of staff to confined security zones. 2. LITERATURE SURVEY: Ching-Kai Huang and Tsuhan Chen [1] proposed a technique by recording just video that has significant data, i.e., video that has movement in the scene. This can be accomplished with a computerized camcorder furthermore, a DSP calculation that identifies movement. Wijnhoven et al [2] considered model-based element location for traffic reconnaissance, going for object arrangement. Inside distinguished locales of-intrigue(ROIs) of moving articles in the scene, the direction of the item is detected utilizing an angle bearing histogram. For the purposeful direction,a 3Dwire-outlinemodel isappliedonto the picture information and the best coordinating pixel- position is determined inside the item's districts of-intrigue.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 738 Stauffer, C et al [3] examined about demonstrating each pixel as a gathering of Gaussians and utilizations anon- line estimate to restore the model. The Gaussian appropriations of the versatile blend model are evaluatedto figure out which are probably to result from a foundation process. Every pixel is sorted dependent on the Gaussian dispersion which speaks to it most productivelyisviewedas a component of the foundation model.. Rama et al [4] tended to the issue of how to pick the most good number of sensors and how to choose their area in a given observed region for MSS. Pradeep et al [5] suggested a novel strategy which energetically processes the certainty level of new streams in view of the reality whether it gives proof which agrees or repudiates with the effectively confided in streams Atrey et al [6] displayed a top-down occasion discovery approach forsoundbasedoccasionrecognition for reconnaissance. The proposed approachatfirstsortsa given sound edge into non-vocal and vocal occasions, and next convey outs advance grouping into energized and typical occasions. An ensuing system,W4S [7], incorporated ongoing sound system to survive the complexities that W4 met with unexpected brightening changes, shadow and impediment which make following a lot harder in force pictures. Wren et al. [8] built up The Pfinder framework which is utilized to recover a 3-dimensional portrayal of an individual in a tremendous zone. Axel Baumann et al [9] gave a precise survey of quantifies and assesses their adequacyfor explicithighlights like division, occasion recognition and following. Ismail Haritaoglu et al [10] proposed a minimal effort PC based constant visual observation framework, called W4, for following individuals and their pieces of the body, and administering their exercises in surround sound and monochromatic symbolism.Itworksongrayscalejustas infrared video symbolism 3. PROPOSED SYSTEM: The system`s architecture propounds the installation of TensorCam at each entry level. The objective of this system is the availability of the TensorCam is to capturing and the comparing for the identification of the authorized and the unauthorized persons upon the entry into the campus. A database is connected to the TensorCam in which thedetails of the persons (studying, working ,visiting the campus ) along with the photographs are stored. Tensorcam captures each person`s face upon the entry and compares it with the data present in the database. The architecture includes the installation of end-end surveillance i.e., upon entering and leaving the college. And also intermediate cameras are installed at different levels to check the presence and location of the respective person. Uponenteringthecampus, each time the person has to be identified by the Cam i.e., whether he is already registered or not. If the person`s data is already available at the database, he is allowed to enter. If the person`s data is not available in the database the computer that is connected to the cam asks for the registration or creation of the new table. The person who is identified is highlighted in the green color and the person who is unidentified is highlighted in red color. Upon the indication of the person`s face in red highlighted box, they are entitled to register. It is easy to monitor who is entering into the campus. Basically there are two main categories in the database with the person`s details. They are PRIVATE (Pr) and PUBLIC (Pu). Private consists of students, employees (working and non- workingstaff).Publicisfor the people who are visitors of the college. Each data sheet of the student contains the name, roll no, admission no, class, department, entry and exit data. Each data sheet of the employee contains the name, employee id, designation and the department entry and exit. Visitor`s data sheet contains the details as name, person to be visited, mobile number, entry and exit details. A log entry is enlarged upon requirement. This also includesthefacilityoflogginginto the website for monitoring the presence of the students by their parents. Figure: Architecture of the proposed system. RESULTS: Using the proposed system a databasehasbeencreated with the enrolled students. Appropriate images of the students have been taken. The camera has to be setup in such a way that faces can be captured via camera .
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 739 Figure: Camera identifying the students while entry into the college. Figure: Camera identifing students in side the campus. CONCLUSION & FUTURE WORK: In current generation security has been a major concern in most of the sectors especially in Educational institutions where it constitutes large numberofpeople.Sotheproposed setup enables the Institution managementaswell asparents to have surveillance without interrupting one’s privacy. By utilizing this setup, it emphasizes the identification of persons very efficiently. The capability of enhancing situational awareness across multiple scales of time and space is the significant feature of this system. Addition of an alarm to the system adds an advanced security when prohibited persons try to enter the campus. A videotracking be added to monitor any suspicious activities. REFERENCES [1] Ching-Kai Huang and Tsuhan Chen, “Motion Activated Video Surveillance Using TI DSP”, DSPS FEST '99, Houston, Texas, August 4-6, 1999. [2] Wijnhoven, R., de With, P, “3D wire-frame object- modeling experiments for video surveillance”, Proc. of 27th Symposium on Information Theory in the Benelux,2006, pp. 101–108. [3] Stauffer. C, Grimson W.E.L, “Adaptive background mixture models for real-time tracking”, IEEE Computer Society Conference on Computer Vision and Pattern Recognition. Volume 2., Ft. 1999, pp. 252–258. [4] Rama, K.G.S., Atrey, P.K., Singh, V.K., Ramakrishnan, K., Kankanhalli, M.S., “A Design Methodology For Selection and Placement of Sensors in Multimedia Surveillance Systems”, The 4th ACM International Workshop on Video Surveillance and Sensor Networks, Santa Barbara, CA, USA 2006. [5] P. K. Atrey, Mohan S. Kankanhalli, Abdulmotaleb El Saddik, “Confidence Building Among Correlated Streams in Multimedia Surveillance Systems”, MMM 2007, LNCS 4352, Part II, 2007, pp. 155–164. [6] Atrey, P.K., Maddage,N.C., Kankanhalli,M.S.,“Audiobased event detection for multimedia surveillance”, IEEE International Conference on Acoustics, Speech and Signal Processing, 2006, pp 813–816. [7] Ismail Haritaoglu, David Harwood, Larry S. Davis, “W4S: A Real-Time System for Detecting and Tracking People in 2 ½ D”. [8] Wren, C. R., Azarbayejani, A., Darrell, T., Pentland, A. P.: Pfinder:real-time tracking of the human body. IEEE Transactions Pattern Analysis Machine Intelligence, Vol. 19, No.7,780–785.(1997) [9] Axel Baumann, MarcoBoltz,Julia Ebling,MatthiasKoenig, Hartmut S. Loos, Marcel Merkel, Wolfgang Niem, Jan KarlWarzelhan, Jie Yu “A Review and Comparison of Measures for Automatic Video Surveillance Systems”, Hindawi Publishing Corporation EURASIP Journal on Image and Video Processing Volume 2008, Article ID 824726, 30 pages doi:10.1155/2008/824726. [10] Ismail Haritaoglu, Harwood, D., Davis,L,“W4:real-time surveillance of people and their activities”, IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI), vol. 22, 2000, pp. 809–830.