Call Girls Delhi {Jodhpur} 9711199012 high profile service
Ā
Motion based security alarm
1.
2. GROUP MEMBERS
ļ AKSHATA MOHITE
ļ MANGESH NIKAM
ļ PRATIK NAIK
ļ KIRTI MADHAVI
UNDER THE GUIDANCE OF
Ms. SHOBHANA GAIKWAD
3. ļ¶ Existing System
ļ¶ Limitations of Existing System
ļ¶ Proposed System
ļ¶ Algorithm
ļ¶ Data Flow Diagram
ļ¶ Advantages of Proposed System
ļ¶ Real Time Applications
ļ¶ Soft. & Hardware Specification
ļ¶ References
4. CCTV
Now a Days CCTV (Closed circuit Television) Is
Most Popular System For Security Purpose.
5. It Gives Evidence After Incident.
Itās Difficult To Maintain Heavy Amount Of
Raw Video Data
Human Interaction.
Require Higher Bandwidth For Transmitting
The Visual Data.
6. We Propose a Robust Security Alarming
System Based On Detection Of Moving
Objects In Video Streams And An Efficient
Security System.
8. MODULE 1 :
Taking Snapshot Of Images.
MODULE 2 :
This Images Will Converted To Gray Images.
MODULE 3 :
Detect Edges Of Images By Using Canny Detector.
MODULE 4 :
Edges Of Images Will Compared With Default
Images.
MODULE 5 :
If Suspicious Image Is Detected Then Alert
Administrator.
9. CANNY EDGE DETECTOR
The Algorithm Runs In 5 Separate Steps
1. Smoothing
2. Finding Gradients
3. Non-Maximum Suppression
4. Double Thresholding
5. Edge Tracking By Hysteresis
10. EDGES COMPARISON
ļThis Module Will Extract The Moving Object
From The Edged Images And Give The
Coordinate And Area Acquired By The Object
ļThis object Will Be Compared With The
Previously Stored the Default Behavior Of The
Object In Restricted Area
ļIf Any Conflicting Behaviour Apart From
Default Stored Context Is Detected; It Will
Send To The Alarming Module
11. ALARMING AND REPORT
If Module 4 Sends Report Of Any Suspicious
Activity Then This Module Will Be Activated. It
Will Alert The Administrator
As The Alarm Rings The System Will Enter
New Record In Database Which Will Have
Information For Analysis Of Event
12.
13. Helpful In Identifying People In The Crime Scenes etc.
Donāt need to monitor videos manually by the person
Keep Track Of Information Video Data For Future Use
Reduce The Large Data Storage
Does Not Require Large Bandwidth
Provide a Robust Alarming System To Alert The
System Administrator
14. Indoor/Outdoor Security.
Real Time Crime Detection.
Traffic Monitoring.
High Security Area,
ļ¼ BANKS.
ļ¼ AIRPORTS.
ļ¼ ATM CENTERS.
ļ¼ MALLS.
15. SOFTWARE
SPECIFICATION
ā¢ Operating System
Windows XP,7
ā¢ Programming
language :
ā¢ Java(JDK 1.6)
SOFTWARE
TOOLS
ā¢ IBM RAD
,Rational Rose
ā¢ Backend
Microsoft
Access
HARDWARE
SPECIFICATION
ā¢PROCESSOR: Speed
minimum: PIII 800 MHz
ā¢RAM: Minimum: 128 MB,
256 MB
ā¢Web camera
16. PAPER REFERENCE
ā¢ ICCTAI'2011 paper on āMotion Based Security Alarming System for
Video surveillanceā by G. Raja Raman, M. Sarath Chandran, and S. R.
Vinothaā
WEB REFERENCES
ā¢ http://www.filestub.com
ā¢ http://www.ebookee.org
ā¢ http://www.google.com