+ All Categories
Home > Documents > Intruder Surveillance Final Document

Intruder Surveillance Final Document

Date post: 28-Feb-2018
Category:
Upload: sampathkumar
View: 228 times
Download: 0 times
Share this document with a friend

of 36

Transcript
  • 7/25/2019 Intruder Surveillance Final Document

    1/36

    1. INTRODUCTION

    1.1. ORGANIZATION PROFILE

    Timeless Info Technologies India (P) Ltd is the company that offered me the

    opportunity to do this project. From a small beginning, it has grown into enormous ulti

    !nit "nterprise with #oftware de$elopment units at #anta %lara and Infantry &oad in

    'angalore ( arnata a), %hennai.

    In addition to these units, the company has an Installation and aintenance !nit

    located at 'areli for underta ing installation and maintenance of telecommunication

    e*uipments throughout the company, which is now renamed as +etwor #ystem 'usinessroup

    The company has a networ of sales and ser$ice offices comprising &egional offices

    located %hennai and 'angalore and a number of sub offices under each region, to represent

    the company in e$ery significant town.

    The company has a strong &- infrastructure /ttached to the Independent 'usiness

    roups. The main &- di$isions are at 'angalore and 'areli. Loo ing forward to

    technology, the &- is engaged in continuous de$elopment and absorption of technology.

    The company lays strong emphasis on 0uality, 1hich is ta en as a irector, &eporting to

    %hairman and

    anaging irector. 2T and International 0uality anagement #ystem co$er a large

    number of the company3s products under the 4#elf5%ertification #cheme6. The company has

    adopted I#2 7888, ta ing it as a 4Tool for 2rgani9ational %hange and 1ord &edesign6.

    :uman &esource e$elopment is another thrust in the company in$ol$ing Professional and

    2rgani9ational de$elopment acti$ities.

  • 7/25/2019 Intruder Surveillance Final Document

    2/36

    2. SYSTEM STUDY

    2.1 EXISTING SYSTEM

    The current sur$eillance systems are able to capture the motion detected and it will be

    stored in the local or networ dis s. The administrator or security professionals will be able

    to ta e the detected footages from the networ locations.

    2.2. DRAWBACK OF EXISTING SYSTEM

    The e;isting sur$eillance system re*uires the administration team to be present in the

    sur$eillance location.&emote management will be done only by accessing the file location in the networIt re*uires bul upload where it will in$ol$e more data transfers ma ing the networ

    to become slow

    2.3. PROPOSED SYSTEM

    The proposed system aims in de$eloping the solution to remotely manage the

    sur$eillance systems by integrating them with email client so that the captured images are

    sent to the mail accounts. This would enable remotely manage the sur$eillance systems

    through configured mail address from any location.

    2.4. ADVANTAGES FOR PROPOSED SYSTEM

    Intrusion sur$eillance alert systems start with motion detection, and the motion and

    object detection process usually in$ol$es en$ironment (bac ground) modelling and

    motion segmentation.2bject classification can be considered as a standard pattern recognition tas .The object trac ing module is responsible for the detection and trac ing of mo$ing

    objects.'oth e$ent recognition and person identification helps to analysis the detected images.The sur$eillance tas s will become easier where we manage the files from the

    configured mail address

  • 7/25/2019 Intruder Surveillance Final Document

    3/36

    3. SYSTEM SPECIFICATION

    3.1. HARDWARE SPECIFICATION

    Processor < I= processor

    :ard is < >88 '

    &/ < ? '

    onitor < #amsung @A3Inch %olor

    ouse < ultimedia ouse

    3.2. SOFTWARE SPECIFICATION

    2perating #ystem < 1indows A.

    Front "nd < Ba$a,ja$a #cript,;amp.

    'ac "nd < y #*l

    "*uipments < orgem web cam,1eb camera,%%TC camera

  • 7/25/2019 Intruder Surveillance Final Document

    4/36

    5.PRO ECT DESCRIPTION

    5.1 OVERVIEW OF THE PRO ECT

    The Intrusion #ur$eillance /lert #ystem starts with motion and object detection.

    otion detection aims at segmenting regions corresponding to mo$ing objects from the rest

    of an image. The process of motionDobject detection usually in$ol$es

    bac groundDen$ironment modeling and motion segmentation, which intersect each other

    during the processing. otion segmentation in image se*uences aims at detecting regions

    corresponding to mo$ing objects such as humans. /fter motion and object detection,

    sur$eillance systems generally trac mo$ing objects from one frame to another in an image

    se*uence.

    This sur$eillance system should ha$e the capacity to obser$e the surrounding

    en$ironment and e;tract useful information for subse*uent reasoning, li e detecting and

    analy9ing the acti$ity (motion), or identifying the objects entering the scene. 'esides,

    monitoring should be done E?5hours5a5day, without any interruption. This sort of a system

    will achie$e the sur$eillance tas more accurately and effecti$ely, sa$ing a great amount of

    human effort.

    #ur$eillance and monitoring systems often re*uire on line segmentation of all mo$ing

    objects in a $ideo se*uence. #egmentation is a ey step since it in uences the performance of

    the other modules, e.g., object trac ing, classiGcation or recognition. For instance, if object

    classiGcation is re*uired, an accurate detection is needed to obtain a correct classiGcation of

    the object. For these project use specific algorithms for segmentation and Identification of

    the mo$ing objects .

    5.2 MODULE DESCRIPTION

    #ur$eillance camera integrator.

    otion and object detection.

    2bject classification and Trac ing.

    "$ent &ecognition.

  • 7/25/2019 Intruder Surveillance Final Document

    5/36

    Person Identification.

    &eport generator.

    SURVEILLANCE CAMERA INTEGRATOR

    This dri$er enables integration between the camera and P%. It enables the

    configuration of the location where the camera images are to be stored and managed. This

    also enables the motion detection and the detected motion will be captured, stored and

    managed in the configured file location. The scheduler runs and chec s the recent captured

    images. If it finds the recent images captured then they will be send mails to the configured

    mail address.

    MOTION AND OB ECT DETECTION

    ost intrusion sur$eillance alert systems start with motion detection. otion

    detection methods attempt to locate connected regions of pi;els that represent the mo$ing

    objects within the sceneH different approaches include frame5to5frame difference, bac ground

    subtraction and motion analysis using optical flow techni*ues. otion detection aims at

    segmenting regions corresponding to mo$ing objects from the rest of an image. The motion

    and object detection process usually in$ol$es en$ironment (bac ground) modeling and

    motion segmentation.

    OB ECT CLASSIFICATION AND TRACKING

    2bject classification can be considered as a standard pattern recognition tas . There

    are two main categories of approaches for classifying mo$ing objects< shape5based

    classification and motion5based classification ifferent descriptions of shape information of

    motion regions such as points, bo;es, etc., are a$ailable for classifying mo$ing objects.

    The object trac ing module is responsible for the detection and trac ing of mo$ing

    objects from indi$idual camerasH object locations are subse*uently transformed into = world

    coordinates.

  • 7/25/2019 Intruder Surveillance Final Document

    6/36

    a) &egion5based Trac ing 5 according to $ariation of the image regions corresponding

    to the mo$ing objects b) %ontour5based Trac ing 5 the whole set of pi;els comprising an objectc) Feature5based Trac ing 5 use features of a $ideo subject to trac parts of the objectd) odel5based Trac ing 5 objects by matching projected object modele) :ybrid Trac ing 5 designed as a hybrid between region5based and feature5based

    techni*ues

    EVENT RECOGNITION

    "$ent recognition is probably the ultimate purpose of a fully automated sur$eillance

    system. "$en though it is *uite important and useful to recogni9e an acti$ity, it is not easy to

    define the type of motion that is interesting and meaningful within sur$eillance conte;t.

    /cti$ities are classified by using the nearest neighbor algorithm. The objects are detected by

    using bac ground subtraction, then their boundaries are e;tracted and a s eleton is produced.

    PERSON IDENTIFICATION

    !nderstanding the identity of persons entering the scene is another important part of a

    sur$eillance system. Face and gait are the main biometric features that can be obser$edwithin passi$e sur$eillance conte;t. In model5based methods, parameters for gait, gesture,

    andDor posture, such as joint trajectories, limb lengths, and angular speeds are measured.

    #tatistical recognition techni*ues usually characteri9e the statistical description of motion

    image sets and ha$e been well de$eloped in automatic gait recognition. Physical5parameter5

    based methods ma e use of geometric structural properties of a human body to characteri9e a

    person3s gait pattern.

    REPORT GENERATOR

    This creates the report of suspected acti$ities history through sending the mails from

    the captured images, the acti$ity inter$al can be configured and there can be more fre*uent

    sur$eillance chec s for the motion detection.

  • 7/25/2019 Intruder Surveillance Final Document

    7/36

    2.3. INTRODUCTION TO OPERATING SYSTEM

    W!"#$%& ' is the current release of icrosoft 1indows, a series of operating systems

    produced by icrosoft for use on personal computers, including home and business des tops,

    laptops, netboo s, tablet P%s, and media center P%s. 1indows A was released to

    manufacturing on Buly EE, E887, and reached general retail a$ailability worldwide on 2ctober

    EE, E887, less than three years after the release of its predecessor, 1indows Cista. 1indows

    A s ser$er counterpart, 1indows #er$er E88J &E, was released at the same time.!nli e 1indows Cista, which introduced a large number of new features, 1indows A

    was intended to be a more focused, incremental upgrade to the 1indows line, with the goal of

    being compatible with applications and hardware with which 1indows Cista was already

    compatible. Presentations gi$en by icrosoft in E88J focused on multi5touch support, a

    redesigned 1indows shell with a new tas bar, referred to as the #uperbar, a home networ ing

    system called :ome roup, and performance impro$ements. #ome standard applications that

    ha$e been included with prior releases of icrosoft 1indows, including 1indows %alendar,1indows ail, 1indows o$ie a er, and 1indows Photo allery, are not included in

    1indows AH most are instead offered separately at no charge as part of the 1indows Li$e

    "ssentials suite.

    1indows A includes a number of new features, such as ad$ances in touch and

    handwriting recognition, support for $irtual hard dis s, impro$ed performance on multi5core

    processors, impro$ed boot performance, irect/ccess, and ernel impro$ements. 1indows A

    adds support for systems using multiple heterogeneous graphics cards from different $endors

    (:eterogeneous ulti5adapter), a new $ersion of 1indows edia %enter, a adget for

    http://en.wikipedia.org/wiki/Microsoft_Gadgets#Desktop_gadgetshttp://en.wikipedia.org/wiki/Microsoft_Gadgets#Desktop_gadgets
  • 7/25/2019 Intruder Surveillance Final Document

    8/36

    1indows edia %enter, impro$ed media features, the KP# "ssentials Pac and 1indows

    Power#hell being included, and a redesigned %alculator with multiline capabilities including

    Programmer and #tatistics modes along with unit con$ersion for length, weight, temperature,

    and se$eral others. any new items ha$e been added to the %ontrol Panel , including

    %learType Te;t Tuner, isplay %olor %alibration 1i9ard, adgets, &eco$ery,

    Troubleshooting, 1or spaces %enter, Location and 2ther #ensors, %redential anager,

    'iometric e$ices, #ystem Icons, and isplay. 1indows #ecurity %enter has been renamed

    to 1indows /ction %enter (1indows :ealth %enter and 1indows #olution %enter in earlier

    builds), which encompasses both security and maintenance of the computer.

    2.4. INTRODUCTION TO FRONT END

    OVERVIEW OF AVA

    Ba$a is the technology that ma es it easy to build distributed applications, which are

    programs e;ecuted by multiple computers across a networ s. The state of art in networ

    programming, Ba$a promises to e;pand the Internet3s role from an arena communication to a

    networ on which full5fledged applications can be run. It brea through technology will allow

    business to deploy full5scale transaction ser$ices and real5time, interacti$e information on the

    Internet. /fter the de$elopment in ja$a there is a remar able change in the field of Internet.

    any programmers choose ja$a to be the best language to write software and to implement it.

    It also supports the electronic programming which is an added ad$antage. It does not refer the

    directly the system resource such as c .

    'efore, Ba$a the Internet was primarily used for information sharing. Though the

    internet was created in @7M83s, it only started to reali9e its business potential in the @7783s,

    than s to the 1orld 1ide 1eb. The web is a technology that treats Internet resources as

    lin ed documents, and it has re$olutioni9ed the way we access information. The web is a

    technology that treats internet resources as lin ed documents, and it has re$olutioni9ed the

    way we access information. The reasons so much attention has been paid to Ba$a are

    summari9ed in the following list.

    1rite robust and reliable programs.

    'uild an application on almost any platform, and run that application on any other supported platform without recompiling the code.

    http://en.wikipedia.org/wiki/XML_Paper_Specificationhttp://en.wikipedia.org/wiki/Calculator_(Windows)http://en.wikipedia.org/wiki/Control_Panel_(Windows)http://en.wikipedia.org/wiki/ClearTypehttp://en.wikipedia.org/wiki/Microsoft_Gadgets#Desktop_gadgetshttp://en.wikipedia.org/wiki/Windows_Security_Centerhttp://en.wikipedia.org/wiki/Computer_securityhttp://en.wikipedia.org/wiki/XML_Paper_Specificationhttp://en.wikipedia.org/wiki/Calculator_(Windows)http://en.wikipedia.org/wiki/Control_Panel_(Windows)http://en.wikipedia.org/wiki/ClearTypehttp://en.wikipedia.org/wiki/Microsoft_Gadgets#Desktop_gadgetshttp://en.wikipedia.org/wiki/Windows_Security_Centerhttp://en.wikipedia.org/wiki/Computer_security
  • 7/25/2019 Intruder Surveillance Final Document

    9/36

    istribute applications o$er a networ in a secure fashion.

    Ba$a programs can be embedded into web documents turning static pages into

    applications that run on the user3s computer.

    H$% ()( W$*+&

    /s with many other programming languages, Ba$a uses a compiler to con$ert human5

    readable source code into e;ecutable programs. Traditional compilers produce code that can

    be e;ecuted by specific hardware. Ba$a compiler generates architecture5independent byte

    codes. 2nly Ba$a Cirtual achine (C ) can e;ecute the byte codes.

    To e;ecute Ba$a byte codes, the C uses a class loader to fetch the byte codes from a

    dis or from the networ . "ach class file is fed to a byte code $erifier that ensures that the

    class is formatted correctly and that the class will not corrupt memory when it is e;ecuted.

    The e;ecution unit of the C carries out the instructions specified in the byte codes. The byte

    codes are in the class file of the particular program.

    ()( F,(- *,&

    Ba$a has many features such as security, /PI ,open standards, dynamic, object5

    oriented, multithreaded, memory management and garbage.

    S,/ *!-0 F,(- *,&

    #ecurity is probably the number one problem facing internet de$elopers. !sers are

    typically afraid of two things< that confidential information will be compromised, and that

    their computer systems are $ulnerable to corruption or destruction by hac ers. Ba$a3s built5in

    security addresses both of these concerns.

    T , C$*, API

    Ba$a3s %ore /PI (formerly nown as the Ba$a /pplet /PI) pro$ides a common set of

    functions on all platforms. The /PI is di$ided into pac ages, which groups of classes that

    perform related functions 2ne of these pac ages includes some core language related

    functions. 2ne of these pac ages includes some core language functionality, such as te;t

    handling and error processing. It is almost impossible to write a Ba$a program without using

  • 7/25/2019 Intruder Surveillance Final Document

    10/36

    this library. The other pac ages contain utilities, networ ing, ID2, graphical user interface

    tools, and interaction with web browsers.

    O ," S-("#(*#&

    Ba$a C s are a$ailable for more than a do9en different operating system

    combinations. The most e;iting aspect of ja$a3s cross5platform capability is that ja$a class

    files do not need to be compiled for each platform in ad$ance. The same compiled ja$a

    program will wor on the P%, acintosh, and e$ery other platform that runs a Ba$a C . /

    ja$a application you write on your system should run on e$ery supported platform.

    D!&-*! -,# ("# #0"( !/

    In the windows operating system, parts of programs can be placed into dynamic lin

    libraries ( LLs) so they can be shared and loaded dynamicallyH that is when the program is

    running. The operating system does the final stage of lin ing at e;ecution time. !sing shared

    LL3s sa$es memory and impro$es the modularity of the software. Ba$a ta es dynamic

    libraries a step further. The C class loader fetches class files from the networ , as well as

    from the dis , ma ing Ba$a applications distributed as well as dynamic.

    O ,/-6O*!,"-,#

    2bject52riented programming (22P) is a way to write software that is reusable,

    e;tensible, and maintainable. Ba$a is an object5oriented languageH that is, it has facilities for

    22P incorporated into the language. The %ore /PI is actually a collection of prefabricated

    22P components, nown to object oriented programmers as a class library. %lass Libraries

    gi$e programmers a big head start when as a class library. %lass libraries gi$e programmers a

    beg head start when it comes to de$eloping new projects

    M 7-!- *,(#,#

    / single5Threaded application has one thread of e;ecution running at all times, and

    such programs can do only one tas at a time. If a single5threaded program needs to perform

    a tas that will ta e se$eral minutes. For e;ample, downloading its user interface.

    ()( &/*! -

  • 7/25/2019 Intruder Surveillance Final Document

    11/36

    Ba$a#cript is the most popular web programming language today. Ba$a#cript can be

    used on the ser$er to create a dynamic web site or to retrie$e information from the user ,

    similar to % I scripts. Ba$a#cript can also be used on the client browser to pro$ide dynamic

    content or a dynamic web page without ha$ing to access the ser$er.

    S,*),*6S!#, ()(S/*! -

    #er$er5#ide Ba$a#cript is another solution for implementing dynamic web sites. It lets

    you embed Ba$a#cript into precompiled :T L pages. 'y pre5compiling the web pages you

    impro$e performance, but the only ser$ers that implement #er$er5#ide Ba$a#cript is

    +etscape s "nterprise and Fast Trac #er$ers. This again ties you to a particular $endor.

    8. SYSTEM DESIGN

    8.1. INPUT DESIGN

    The *uality of the input determines the *uality of the system output. Input

    specification describes the manner in which data entered the system for processing. In the

    input design the user5oriented inputs are con$erted into recogni9able format. The collection

    of input data is the most e;pensi$e part of a system. In the input design data is accepted and it

    can be readily used for further use.

    The *uality of the inputs determines the *uality of the system output. Input design is a

    process of con$erting user5oriented description of the computer based business information

    into programmer5oriented specification.

    Input specification describes the manner in which data is entered to the system for

    processing. /s far the project is concerned the following can be regarded as the features of

    the input data.

    2ften the collection of input data is the most e;pensi$e part of the system, in terms of

    both the e*uipment used and the number of people in$ol$ed. ata entry $alidation is done to

  • 7/25/2019 Intruder Surveillance Final Document

    12/36

    a$oid wrong data entry. For e;ample if a user lea$es blan fields for #er$ice +umber or ate

    of 'irth and password then he won3t be allowed to proceed further.

    6.2.OUTPUT DESIGN

    2utputs are the direct source of information to the user. They pro$ide a consolidated

    and permanent copy of records, which helps in decision5ma ing. They are also used to

    pro$ide a permanent hard copy of these results for later consultations. 'ased on the needs and

    re*uirements of the $arious departments, the outputs are designed with much care and

    consideration.

    ecide on the information conte;t

    /rrangement of information in an acceptable format.

    Identification of uni*ue attributes for retrie$al of data

    Fre*uency of output.

    Colume of the report.

    Pro$iding meaningful error messages.

  • 7/25/2019 Intruder Surveillance Final Document

    13/36

    4.3 SYSTEM FLOW DIAGRAM

    /larm/nnotatio

    n

    %ontrol Cisuali9ation

    +D1#witch2bject %lassification

    'ac ground odeling

    'eha$ior and /cti$ity/nalysis

    CAMERA61CAMERA N

    2bject Trac ing

    Person Identification

    2bject #egmentationata Fusion

    otion -

    etection

    Cideo Processing

  • 7/25/2019 Intruder Surveillance Final Document

    14/36

    5. SYSTEM TESTING AND IMPLEMENTATION

    5.1 SYSTEM TESTING

    #oftware testing is an important element of #D1 *uality assurance and represents the

    ultimate re$iew of specification, design and coding. The increasing $isibility of #D1 as a

    system element and the costs associated with a #D1 failure are moti$ating forces for well

    planned, through testing.

    TESTING OB ECTIVES

    There are se$eral rules that can ser$e as testing objecti$es. They are,

    Testing is a process of e;ecuting a program with the intent of finding an error.

    / good test case is one that has a high probability of finding an undisco$ered error.

    / successful test is one that unco$ers an undisco$ered error.

    If testing is conducted successfully according to the objecti$es stated abo$e, it will

    unco$er errors in the software. /lso, testing demonstrates that software functions appear to

    the wor ing according to specification, that performance re*uirements appear to ha$e been

    met.

    TESTING METHODOLOGIES

    The testing steps are!nit Testing.

    Integration Testing.

    Calidation Testing.

    !ser /cceptance Testing.

    UNIT TESTING

  • 7/25/2019 Intruder Surveillance Final Document

    15/36

    !nit testing focused the $erification effort on the smallest unit of the software design

    module. This is nown as module testing. The systems are better separately.

    The testing was concerned out during the programming stage itself. In this testing step

    each module was found to be wor ing satisfactory with to the e;pected output module.

    INTEGRATION TESTING

    ata can be lost across an interface, one module can ha$e an ad$erse effect on

    another, sub function when combined, may not produce the desired major function.

    Integration testing is a systematic techni*ue for constructing the program. #tructure, which at

    it same time conducting tests to unco$er errors associated with in the interface. The objecti$e

    is to ta e unit tested module s and to build a program structure. /ll the modules are combined

    and tested a whole.

    :ere correction is difficult because the isolated of causes is complicated by the $ast

    e;panse of the entire program. Thus is the integration5testing step, all the errors unco$ered

    for the ne;t testing steps.

    VALIDATION TESTING

    /t the culmination of integration testing, software is completely assembled as a

    pac age, interfacing errors ha$e been unco$ered and corrected and a final series of software

    upon which $alidation tests begin. Calidation testing can be defined in many was but a simple

    definition id that $alidation succeeds when the software function is a manner that can be

    relationally e;pected by the client.

    /fter $alidation test has been conducted one of the two possible condition e;its the

    function or performance characteristics conform to specification and are e;pected. /

    de$iation from specification is unco$ered and a deficiency list is created.

    USER ACCEPTANCE TESTING

    The !ser acceptance testing is the final stage of testing phase. This is done by the user. The

    system is gi$en to users and they will test the system with li$e data. The $arious possibilities

    of the data are entered and the response from the system is tested. 2nce the acceptance

    testing is signed by the user then the system is successfully implemented.

  • 7/25/2019 Intruder Surveillance Final Document

    16/36

    5.2 SYSTEM IMPLEMENTATION

    There is an increasing demand for personal and public security systems. :owe$er,

    utili9ing human resources in such systems builds up the e;penses, as well as inconsistencies

    due to subjecti$e perceptions. 'esides, technological de$ices are $astly a$ailable in this era.

    /ll of these factors indicate the ine$itable utili9ation of automated systems. In this thesis, an

    automated sur$eillance system is described, which includes the following four main building

    bloc s< mo$ing object detection, object trac ing, e$ent recognition and person identification.

    The implementation plan consists of the following steps.

    List all files re*uired for implementation.Identify all data re*uired to build new files during implementation.

    List all new documents and procedures that go into the new system.

    The implementation plan should anticipate possible problems and must be able to deal

    with them. The usual problems may be missing documents, mi;ed data formats between

    current files, errors in data translation, missing data etc.

    PREPARATION OF IMPLEMENTATION

    Two major tests of preparation for implementation are educating and training of users

    and testing the system. The most difficult tas in the system life cycle is the successful

    implementation of the new system design. Implementation includes all those acti$ities that

    ta e place to con$ert from the old system to the new system. The new system may be that a

    major implementation becomes necessary so that a reliable system based on the re*uirements

    of the organi9ation can be pro$ided.

    There are three aspects of implementation,

    Training personal

    %on$ersion procedure

    Post implementation re$iew

    /fter the system is implemented and con$ersion is complete a re$iew should be conducted to

    determine whether the system is meeting e;pectations and where impro$ements are needed.

    / post implementation re$iew measures the system3s performance against predefinedre*uirements. It determines how well the system continues to meet performance

  • 7/25/2019 Intruder Surveillance Final Document

    17/36

    specifications. It also pro$ides information to determine whether a major re design or small

    modification is re*uired.

    The post implementation re$iew is an e$olution of a system in terms of the e;tent to

    which the system accomplishes stated objecti$es and if the actual project costs e;ceeds initial

    estimates. The post implementation study begins une;pected changes in the system that

    affects the user or system performance is a primary factor that prompts system re$iew.

    2nce a re*uest is filed, the user is as ed how well the system is functioning to

    specifications or how well the measured benefits ha$e been reali9ed .

  • 7/25/2019 Intruder Surveillance Final Document

    18/36

    8. SYSTEM MAINTENANCE

    aintenance of the software is one of the major steps in the computer animation.#oftware which is de$eloped by the engineer, should undergo maintenance process in a

    regular inter$al of time goes on new problems arise and it must be corrected accordingly.

    aintenance and enhancements are a long5term process. If the problem is di$erted or

    upgraded, then also the software should be changed.

    In this project, the maintenance is carried o$er by the staff of the company. #ince,

    they are the ey persons to de$elop this project they now clearly about the project and

    coding structures. #o, they will change the coding whene$er re*uired. &egarding the project

    maintenance, the changes will occur then and there according to the conditions.

    Carious types of maintenance that can be made are

    %orrecti$e maintenance

    /dapti$e maintenance

    Prefecture maintenance

    &e$erse engineering

  • 7/25/2019 Intruder Surveillance Final Document

    19/36

    '. CONCLUSIONS

    There is an increasing demand for personal and public security systems. :owe$er,

    utili9ing human resources in such systems builds up the e;penses, as well as inconsistencies

    due to subjecti$e perceptions. 'esides, technological de$ices are $astly a$ailable in this area.

    /ll of these factors indicate the ine$itable utili9ation of automated systems. In this thesis, an

    automated sur$eillance system is described, which includes the following four main building

    bloc s< mo$ing object detection, object trac ing, e$ent recognition and person identification.Cisual (or $ideo) sur$eillance systems ha$e been around for a couple of decades.

    ost current automated $ideo sur$eillance systems can process $ideo se*uence and perform

    almost all ey low5le$el functions, such as motion detection and segmentation, object

    trac ing, and object classification with good accuracy. &ecently, technical interest in $ideo

    sur$eillance has mo$ed from such low5le$el functions to more comple; scene analysis to

    detect human andDor other object beha$iors, i.e., patterns of acti$ities or e$ents, for standoff

    threat detection and pre$ention. $ideo sur$eillance and analy9es the challenges and feasibilityfor combining object trac ing, motion analysis, beha$ior analysis, and biometrics for stand5

    off human subject identification and beha$ior understanding.

    'eha$ior analysis using $isual sur$eillance in$ol$es the most ad$anced and comple;

    researches in image processing, computer $ision, and artificial intelligence. e$elopments

    and strategies of stages in$ol$ed in a general $isual sur$eillance systemH how to detect and

    analy9e beha$ior and intent in the intrusion sur$eillance system.

  • 7/25/2019 Intruder Surveillance Final Document

    20/36

    9. FUTURE ENHANCEMENT

    /s some future wor , shadow remo$al process can be achie$ed with a more robust

    algorithm. This case will both impro$e object silhouettes and trac ing results. /s for the

    identification part, an automated combination scheme should be incorporated into the system,

    which will automatically decide on the best combination rule with respecti$e weights of color

    and te;ture features.

    Future enhancements alert the user sending multimedia sms by using # (global system for

    mobile communication) odem, and then it is $ery efficiently find out unauthori9ed person.

    The programs were coded in an easier and more structured manner so that may further

    modifications may be incorporated easily. The processing time in this system is $ery lesser

    when compared to old system. This system has good fle;ibility of accommodating any more

    changes that might arise in the future also in this system, data integrity is maintained and data

    redundancy is a$oided and it increase system efficiency.

  • 7/25/2019 Intruder Surveillance Final Document

    21/36

    :. BIBLIOGRAPHY

    @) The Ba$a :andboo by Patric +aughton, ichael orrison , 2sborneD c raw5:ill,

    /pril, @77M

    E) #un %ertified "nterprise /rchitect for BE"" Technology #tudy uide by ar %ade ,

    1ro; Press, @@ arch,E88E

    =) Professional Ba$a #er$er Programming, BE"" @.= "dition by artin 'ond, an

    :aywood, ebbie Law, /ndy Longshaw, and Peter &o;burgh, 1ro; Press, @A Bune,E88@

    ?) N@O F. e la Torre, ". artine9, . ". #antamaria and ./. oran, 4 o$ing 2bject

    etection and Trac ing #ystem< a &eal time implementation 6, Proceedings of the

    #ymposium on #ignal and Image Processing &"T#I 7A renoble, @77A.

    WEBSITES

    www.w=schools.com.

    www.eboo s.eboo mall.com.

    www.coderanch.com.

    www.ja$aranch.com.

    http://www.osborne.com/int/javah.htmhttp://www.osborne.com/int/javah.htm
  • 7/25/2019 Intruder Surveillance Final Document

    22/36

    1;. APPENDIX

    1;.1 SCREEN SHOTS

    FIGURE< 1;.1.1 I"-* #,* S *),!77("/, C( ,*( &,7,/-!$" &$ */, #,-(!7&

    FIGURE< 1;.1.2 I"-* #,* S *),!77("/, S-*,( S,--!"=& F$* (-

  • 7/25/2019 Intruder Surveillance Final Document

    23/36

    FIGURE

  • 7/25/2019 Intruder Surveillance Final Document

    24/36

    FIGURE

  • 7/25/2019 Intruder Surveillance Final Document

    25/36

    FIGURE

  • 7/25/2019 Intruder Surveillance Final Document

    26/36

    FIGURE

  • 7/25/2019 Intruder Surveillance Final Document

    27/36

    FIGURE!= *(-!$"

    FIGURE

  • 7/25/2019 Intruder Surveillance Final Document

    28/36

    FIGURE$ #,-(!7&

    FIGURE

  • 7/25/2019 Intruder Surveillance Final Document

    29/36

    FIGURE

  • 7/25/2019 Intruder Surveillance Final Document

    30/36

    FIGURE

  • 7/25/2019 Intruder Surveillance Final Document

    31/36

  • 7/25/2019 Intruder Surveillance Final Document

    32/36

    V().ready(function() W

    $ar elf V( Xelfinder ).elfinder(W

    url < jspDconnector.jsp DD connector !&L (&"0!I&" )

    DD lang< ru , DD language (2PTI2+/L)

    Y).elfinder( instance )H

    Y)H

    setInter$al(function()W

    V.aja;( jspDscan.jsp ,function(data)Walert(data)Y)H

    Y, >888)H

    DscriptS

    DheadS

    bodyS

    Q55 "lement where elFinder will be created (&"0!I&" ) 55S

    di$ id UelfinderUS Ddi$S

    DbodyS

    DhtmlS

    C$"",/-$*. &


Recommended