Date post: | 28-Feb-2018 |
Category: |
Documents |
Upload: | sampathkumar |
View: | 228 times |
Download: | 0 times |
of 36
7/25/2019 Intruder Surveillance Final Document
1/36
1. INTRODUCTION
1.1. ORGANIZATION PROFILE
Timeless Info Technologies India (P) Ltd is the company that offered me the
opportunity to do this project. From a small beginning, it has grown into enormous ulti
!nit "nterprise with #oftware de$elopment units at #anta %lara and Infantry &oad in
'angalore ( arnata a), %hennai.
In addition to these units, the company has an Installation and aintenance !nit
located at 'areli for underta ing installation and maintenance of telecommunication
e*uipments throughout the company, which is now renamed as +etwor #ystem 'usinessroup
The company has a networ of sales and ser$ice offices comprising &egional offices
located %hennai and 'angalore and a number of sub offices under each region, to represent
the company in e$ery significant town.
The company has a strong &- infrastructure /ttached to the Independent 'usiness
roups. The main &- di$isions are at 'angalore and 'areli. Loo ing forward to
technology, the &- is engaged in continuous de$elopment and absorption of technology.
The company lays strong emphasis on 0uality, 1hich is ta en as a irector, &eporting to
%hairman and
anaging irector. 2T and International 0uality anagement #ystem co$er a large
number of the company3s products under the 4#elf5%ertification #cheme6. The company has
adopted I#2 7888, ta ing it as a 4Tool for 2rgani9ational %hange and 1ord &edesign6.
:uman &esource e$elopment is another thrust in the company in$ol$ing Professional and
2rgani9ational de$elopment acti$ities.
7/25/2019 Intruder Surveillance Final Document
2/36
2. SYSTEM STUDY
2.1 EXISTING SYSTEM
The current sur$eillance systems are able to capture the motion detected and it will be
stored in the local or networ dis s. The administrator or security professionals will be able
to ta e the detected footages from the networ locations.
2.2. DRAWBACK OF EXISTING SYSTEM
The e;isting sur$eillance system re*uires the administration team to be present in the
sur$eillance location.&emote management will be done only by accessing the file location in the networIt re*uires bul upload where it will in$ol$e more data transfers ma ing the networ
to become slow
2.3. PROPOSED SYSTEM
The proposed system aims in de$eloping the solution to remotely manage the
sur$eillance systems by integrating them with email client so that the captured images are
sent to the mail accounts. This would enable remotely manage the sur$eillance systems
through configured mail address from any location.
2.4. ADVANTAGES FOR PROPOSED SYSTEM
Intrusion sur$eillance alert systems start with motion detection, and the motion and
object detection process usually in$ol$es en$ironment (bac ground) modelling and
motion segmentation.2bject classification can be considered as a standard pattern recognition tas .The object trac ing module is responsible for the detection and trac ing of mo$ing
objects.'oth e$ent recognition and person identification helps to analysis the detected images.The sur$eillance tas s will become easier where we manage the files from the
configured mail address
7/25/2019 Intruder Surveillance Final Document
3/36
3. SYSTEM SPECIFICATION
3.1. HARDWARE SPECIFICATION
Processor < I= processor
:ard is < >88 '
&/ < ? '
onitor < #amsung @A3Inch %olor
ouse < ultimedia ouse
3.2. SOFTWARE SPECIFICATION
2perating #ystem < 1indows A.
Front "nd < Ba$a,ja$a #cript,;amp.
'ac "nd < y #*l
"*uipments < orgem web cam,1eb camera,%%TC camera
7/25/2019 Intruder Surveillance Final Document
4/36
5.PRO ECT DESCRIPTION
5.1 OVERVIEW OF THE PRO ECT
The Intrusion #ur$eillance /lert #ystem starts with motion and object detection.
otion detection aims at segmenting regions corresponding to mo$ing objects from the rest
of an image. The process of motionDobject detection usually in$ol$es
bac groundDen$ironment modeling and motion segmentation, which intersect each other
during the processing. otion segmentation in image se*uences aims at detecting regions
corresponding to mo$ing objects such as humans. /fter motion and object detection,
sur$eillance systems generally trac mo$ing objects from one frame to another in an image
se*uence.
This sur$eillance system should ha$e the capacity to obser$e the surrounding
en$ironment and e;tract useful information for subse*uent reasoning, li e detecting and
analy9ing the acti$ity (motion), or identifying the objects entering the scene. 'esides,
monitoring should be done E?5hours5a5day, without any interruption. This sort of a system
will achie$e the sur$eillance tas more accurately and effecti$ely, sa$ing a great amount of
human effort.
#ur$eillance and monitoring systems often re*uire on line segmentation of all mo$ing
objects in a $ideo se*uence. #egmentation is a ey step since it in uences the performance of
the other modules, e.g., object trac ing, classiGcation or recognition. For instance, if object
classiGcation is re*uired, an accurate detection is needed to obtain a correct classiGcation of
the object. For these project use specific algorithms for segmentation and Identification of
the mo$ing objects .
5.2 MODULE DESCRIPTION
#ur$eillance camera integrator.
otion and object detection.
2bject classification and Trac ing.
"$ent &ecognition.
7/25/2019 Intruder Surveillance Final Document
5/36
Person Identification.
&eport generator.
SURVEILLANCE CAMERA INTEGRATOR
This dri$er enables integration between the camera and P%. It enables the
configuration of the location where the camera images are to be stored and managed. This
also enables the motion detection and the detected motion will be captured, stored and
managed in the configured file location. The scheduler runs and chec s the recent captured
images. If it finds the recent images captured then they will be send mails to the configured
mail address.
MOTION AND OB ECT DETECTION
ost intrusion sur$eillance alert systems start with motion detection. otion
detection methods attempt to locate connected regions of pi;els that represent the mo$ing
objects within the sceneH different approaches include frame5to5frame difference, bac ground
subtraction and motion analysis using optical flow techni*ues. otion detection aims at
segmenting regions corresponding to mo$ing objects from the rest of an image. The motion
and object detection process usually in$ol$es en$ironment (bac ground) modeling and
motion segmentation.
OB ECT CLASSIFICATION AND TRACKING
2bject classification can be considered as a standard pattern recognition tas . There
are two main categories of approaches for classifying mo$ing objects< shape5based
classification and motion5based classification ifferent descriptions of shape information of
motion regions such as points, bo;es, etc., are a$ailable for classifying mo$ing objects.
The object trac ing module is responsible for the detection and trac ing of mo$ing
objects from indi$idual camerasH object locations are subse*uently transformed into = world
coordinates.
7/25/2019 Intruder Surveillance Final Document
6/36
a) &egion5based Trac ing 5 according to $ariation of the image regions corresponding
to the mo$ing objects b) %ontour5based Trac ing 5 the whole set of pi;els comprising an objectc) Feature5based Trac ing 5 use features of a $ideo subject to trac parts of the objectd) odel5based Trac ing 5 objects by matching projected object modele) :ybrid Trac ing 5 designed as a hybrid between region5based and feature5based
techni*ues
EVENT RECOGNITION
"$ent recognition is probably the ultimate purpose of a fully automated sur$eillance
system. "$en though it is *uite important and useful to recogni9e an acti$ity, it is not easy to
define the type of motion that is interesting and meaningful within sur$eillance conte;t.
/cti$ities are classified by using the nearest neighbor algorithm. The objects are detected by
using bac ground subtraction, then their boundaries are e;tracted and a s eleton is produced.
PERSON IDENTIFICATION
!nderstanding the identity of persons entering the scene is another important part of a
sur$eillance system. Face and gait are the main biometric features that can be obser$edwithin passi$e sur$eillance conte;t. In model5based methods, parameters for gait, gesture,
andDor posture, such as joint trajectories, limb lengths, and angular speeds are measured.
#tatistical recognition techni*ues usually characteri9e the statistical description of motion
image sets and ha$e been well de$eloped in automatic gait recognition. Physical5parameter5
based methods ma e use of geometric structural properties of a human body to characteri9e a
person3s gait pattern.
REPORT GENERATOR
This creates the report of suspected acti$ities history through sending the mails from
the captured images, the acti$ity inter$al can be configured and there can be more fre*uent
sur$eillance chec s for the motion detection.
7/25/2019 Intruder Surveillance Final Document
7/36
2.3. INTRODUCTION TO OPERATING SYSTEM
W!"#$%& ' is the current release of icrosoft 1indows, a series of operating systems
produced by icrosoft for use on personal computers, including home and business des tops,
laptops, netboo s, tablet P%s, and media center P%s. 1indows A was released to
manufacturing on Buly EE, E887, and reached general retail a$ailability worldwide on 2ctober
EE, E887, less than three years after the release of its predecessor, 1indows Cista. 1indows
A s ser$er counterpart, 1indows #er$er E88J &E, was released at the same time.!nli e 1indows Cista, which introduced a large number of new features, 1indows A
was intended to be a more focused, incremental upgrade to the 1indows line, with the goal of
being compatible with applications and hardware with which 1indows Cista was already
compatible. Presentations gi$en by icrosoft in E88J focused on multi5touch support, a
redesigned 1indows shell with a new tas bar, referred to as the #uperbar, a home networ ing
system called :ome roup, and performance impro$ements. #ome standard applications that
ha$e been included with prior releases of icrosoft 1indows, including 1indows %alendar,1indows ail, 1indows o$ie a er, and 1indows Photo allery, are not included in
1indows AH most are instead offered separately at no charge as part of the 1indows Li$e
"ssentials suite.
1indows A includes a number of new features, such as ad$ances in touch and
handwriting recognition, support for $irtual hard dis s, impro$ed performance on multi5core
processors, impro$ed boot performance, irect/ccess, and ernel impro$ements. 1indows A
adds support for systems using multiple heterogeneous graphics cards from different $endors
(:eterogeneous ulti5adapter), a new $ersion of 1indows edia %enter, a adget for
http://en.wikipedia.org/wiki/Microsoft_Gadgets#Desktop_gadgetshttp://en.wikipedia.org/wiki/Microsoft_Gadgets#Desktop_gadgets7/25/2019 Intruder Surveillance Final Document
8/36
1indows edia %enter, impro$ed media features, the KP# "ssentials Pac and 1indows
Power#hell being included, and a redesigned %alculator with multiline capabilities including
Programmer and #tatistics modes along with unit con$ersion for length, weight, temperature,
and se$eral others. any new items ha$e been added to the %ontrol Panel , including
%learType Te;t Tuner, isplay %olor %alibration 1i9ard, adgets, &eco$ery,
Troubleshooting, 1or spaces %enter, Location and 2ther #ensors, %redential anager,
'iometric e$ices, #ystem Icons, and isplay. 1indows #ecurity %enter has been renamed
to 1indows /ction %enter (1indows :ealth %enter and 1indows #olution %enter in earlier
builds), which encompasses both security and maintenance of the computer.
2.4. INTRODUCTION TO FRONT END
OVERVIEW OF AVA
Ba$a is the technology that ma es it easy to build distributed applications, which are
programs e;ecuted by multiple computers across a networ s. The state of art in networ
programming, Ba$a promises to e;pand the Internet3s role from an arena communication to a
networ on which full5fledged applications can be run. It brea through technology will allow
business to deploy full5scale transaction ser$ices and real5time, interacti$e information on the
Internet. /fter the de$elopment in ja$a there is a remar able change in the field of Internet.
any programmers choose ja$a to be the best language to write software and to implement it.
It also supports the electronic programming which is an added ad$antage. It does not refer the
directly the system resource such as c .
'efore, Ba$a the Internet was primarily used for information sharing. Though the
internet was created in @7M83s, it only started to reali9e its business potential in the @7783s,
than s to the 1orld 1ide 1eb. The web is a technology that treats Internet resources as
lin ed documents, and it has re$olutioni9ed the way we access information. The web is a
technology that treats internet resources as lin ed documents, and it has re$olutioni9ed the
way we access information. The reasons so much attention has been paid to Ba$a are
summari9ed in the following list.
1rite robust and reliable programs.
'uild an application on almost any platform, and run that application on any other supported platform without recompiling the code.
http://en.wikipedia.org/wiki/XML_Paper_Specificationhttp://en.wikipedia.org/wiki/Calculator_(Windows)http://en.wikipedia.org/wiki/Control_Panel_(Windows)http://en.wikipedia.org/wiki/ClearTypehttp://en.wikipedia.org/wiki/Microsoft_Gadgets#Desktop_gadgetshttp://en.wikipedia.org/wiki/Windows_Security_Centerhttp://en.wikipedia.org/wiki/Computer_securityhttp://en.wikipedia.org/wiki/XML_Paper_Specificationhttp://en.wikipedia.org/wiki/Calculator_(Windows)http://en.wikipedia.org/wiki/Control_Panel_(Windows)http://en.wikipedia.org/wiki/ClearTypehttp://en.wikipedia.org/wiki/Microsoft_Gadgets#Desktop_gadgetshttp://en.wikipedia.org/wiki/Windows_Security_Centerhttp://en.wikipedia.org/wiki/Computer_security7/25/2019 Intruder Surveillance Final Document
9/36
istribute applications o$er a networ in a secure fashion.
Ba$a programs can be embedded into web documents turning static pages into
applications that run on the user3s computer.
H$% ()( W$*+&
/s with many other programming languages, Ba$a uses a compiler to con$ert human5
readable source code into e;ecutable programs. Traditional compilers produce code that can
be e;ecuted by specific hardware. Ba$a compiler generates architecture5independent byte
codes. 2nly Ba$a Cirtual achine (C ) can e;ecute the byte codes.
To e;ecute Ba$a byte codes, the C uses a class loader to fetch the byte codes from a
dis or from the networ . "ach class file is fed to a byte code $erifier that ensures that the
class is formatted correctly and that the class will not corrupt memory when it is e;ecuted.
The e;ecution unit of the C carries out the instructions specified in the byte codes. The byte
codes are in the class file of the particular program.
()( F,(- *,&
Ba$a has many features such as security, /PI ,open standards, dynamic, object5
oriented, multithreaded, memory management and garbage.
S,/ *!-0 F,(- *,&
#ecurity is probably the number one problem facing internet de$elopers. !sers are
typically afraid of two things< that confidential information will be compromised, and that
their computer systems are $ulnerable to corruption or destruction by hac ers. Ba$a3s built5in
security addresses both of these concerns.
T , C$*, API
Ba$a3s %ore /PI (formerly nown as the Ba$a /pplet /PI) pro$ides a common set of
functions on all platforms. The /PI is di$ided into pac ages, which groups of classes that
perform related functions 2ne of these pac ages includes some core language related
functions. 2ne of these pac ages includes some core language functionality, such as te;t
handling and error processing. It is almost impossible to write a Ba$a program without using
7/25/2019 Intruder Surveillance Final Document
10/36
this library. The other pac ages contain utilities, networ ing, ID2, graphical user interface
tools, and interaction with web browsers.
O ," S-("#(*#&
Ba$a C s are a$ailable for more than a do9en different operating system
combinations. The most e;iting aspect of ja$a3s cross5platform capability is that ja$a class
files do not need to be compiled for each platform in ad$ance. The same compiled ja$a
program will wor on the P%, acintosh, and e$ery other platform that runs a Ba$a C . /
ja$a application you write on your system should run on e$ery supported platform.
D!&-*! -,# ("# #0"( !/
In the windows operating system, parts of programs can be placed into dynamic lin
libraries ( LLs) so they can be shared and loaded dynamicallyH that is when the program is
running. The operating system does the final stage of lin ing at e;ecution time. !sing shared
LL3s sa$es memory and impro$es the modularity of the software. Ba$a ta es dynamic
libraries a step further. The C class loader fetches class files from the networ , as well as
from the dis , ma ing Ba$a applications distributed as well as dynamic.
O ,/-6O*!,"-,#
2bject52riented programming (22P) is a way to write software that is reusable,
e;tensible, and maintainable. Ba$a is an object5oriented languageH that is, it has facilities for
22P incorporated into the language. The %ore /PI is actually a collection of prefabricated
22P components, nown to object oriented programmers as a class library. %lass Libraries
gi$e programmers a big head start when as a class library. %lass libraries gi$e programmers a
beg head start when it comes to de$eloping new projects
M 7-!- *,(#,#
/ single5Threaded application has one thread of e;ecution running at all times, and
such programs can do only one tas at a time. If a single5threaded program needs to perform
a tas that will ta e se$eral minutes. For e;ample, downloading its user interface.
()( &/*! -
7/25/2019 Intruder Surveillance Final Document
11/36
Ba$a#cript is the most popular web programming language today. Ba$a#cript can be
used on the ser$er to create a dynamic web site or to retrie$e information from the user ,
similar to % I scripts. Ba$a#cript can also be used on the client browser to pro$ide dynamic
content or a dynamic web page without ha$ing to access the ser$er.
S,*),*6S!#, ()(S/*! -
#er$er5#ide Ba$a#cript is another solution for implementing dynamic web sites. It lets
you embed Ba$a#cript into precompiled :T L pages. 'y pre5compiling the web pages you
impro$e performance, but the only ser$ers that implement #er$er5#ide Ba$a#cript is
+etscape s "nterprise and Fast Trac #er$ers. This again ties you to a particular $endor.
8. SYSTEM DESIGN
8.1. INPUT DESIGN
The *uality of the input determines the *uality of the system output. Input
specification describes the manner in which data entered the system for processing. In the
input design the user5oriented inputs are con$erted into recogni9able format. The collection
of input data is the most e;pensi$e part of a system. In the input design data is accepted and it
can be readily used for further use.
The *uality of the inputs determines the *uality of the system output. Input design is a
process of con$erting user5oriented description of the computer based business information
into programmer5oriented specification.
Input specification describes the manner in which data is entered to the system for
processing. /s far the project is concerned the following can be regarded as the features of
the input data.
2ften the collection of input data is the most e;pensi$e part of the system, in terms of
both the e*uipment used and the number of people in$ol$ed. ata entry $alidation is done to
7/25/2019 Intruder Surveillance Final Document
12/36
a$oid wrong data entry. For e;ample if a user lea$es blan fields for #er$ice +umber or ate
of 'irth and password then he won3t be allowed to proceed further.
6.2.OUTPUT DESIGN
2utputs are the direct source of information to the user. They pro$ide a consolidated
and permanent copy of records, which helps in decision5ma ing. They are also used to
pro$ide a permanent hard copy of these results for later consultations. 'ased on the needs and
re*uirements of the $arious departments, the outputs are designed with much care and
consideration.
ecide on the information conte;t
/rrangement of information in an acceptable format.
Identification of uni*ue attributes for retrie$al of data
Fre*uency of output.
Colume of the report.
Pro$iding meaningful error messages.
7/25/2019 Intruder Surveillance Final Document
13/36
4.3 SYSTEM FLOW DIAGRAM
/larm/nnotatio
n
%ontrol Cisuali9ation
+D1#witch2bject %lassification
'ac ground odeling
'eha$ior and /cti$ity/nalysis
CAMERA61CAMERA N
2bject Trac ing
Person Identification
2bject #egmentationata Fusion
otion -
etection
Cideo Processing
7/25/2019 Intruder Surveillance Final Document
14/36
5. SYSTEM TESTING AND IMPLEMENTATION
5.1 SYSTEM TESTING
#oftware testing is an important element of #D1 *uality assurance and represents the
ultimate re$iew of specification, design and coding. The increasing $isibility of #D1 as a
system element and the costs associated with a #D1 failure are moti$ating forces for well
planned, through testing.
TESTING OB ECTIVES
There are se$eral rules that can ser$e as testing objecti$es. They are,
Testing is a process of e;ecuting a program with the intent of finding an error.
/ good test case is one that has a high probability of finding an undisco$ered error.
/ successful test is one that unco$ers an undisco$ered error.
If testing is conducted successfully according to the objecti$es stated abo$e, it will
unco$er errors in the software. /lso, testing demonstrates that software functions appear to
the wor ing according to specification, that performance re*uirements appear to ha$e been
met.
TESTING METHODOLOGIES
The testing steps are!nit Testing.
Integration Testing.
Calidation Testing.
!ser /cceptance Testing.
UNIT TESTING
7/25/2019 Intruder Surveillance Final Document
15/36
!nit testing focused the $erification effort on the smallest unit of the software design
module. This is nown as module testing. The systems are better separately.
The testing was concerned out during the programming stage itself. In this testing step
each module was found to be wor ing satisfactory with to the e;pected output module.
INTEGRATION TESTING
ata can be lost across an interface, one module can ha$e an ad$erse effect on
another, sub function when combined, may not produce the desired major function.
Integration testing is a systematic techni*ue for constructing the program. #tructure, which at
it same time conducting tests to unco$er errors associated with in the interface. The objecti$e
is to ta e unit tested module s and to build a program structure. /ll the modules are combined
and tested a whole.
:ere correction is difficult because the isolated of causes is complicated by the $ast
e;panse of the entire program. Thus is the integration5testing step, all the errors unco$ered
for the ne;t testing steps.
VALIDATION TESTING
/t the culmination of integration testing, software is completely assembled as a
pac age, interfacing errors ha$e been unco$ered and corrected and a final series of software
upon which $alidation tests begin. Calidation testing can be defined in many was but a simple
definition id that $alidation succeeds when the software function is a manner that can be
relationally e;pected by the client.
/fter $alidation test has been conducted one of the two possible condition e;its the
function or performance characteristics conform to specification and are e;pected. /
de$iation from specification is unco$ered and a deficiency list is created.
USER ACCEPTANCE TESTING
The !ser acceptance testing is the final stage of testing phase. This is done by the user. The
system is gi$en to users and they will test the system with li$e data. The $arious possibilities
of the data are entered and the response from the system is tested. 2nce the acceptance
testing is signed by the user then the system is successfully implemented.
7/25/2019 Intruder Surveillance Final Document
16/36
5.2 SYSTEM IMPLEMENTATION
There is an increasing demand for personal and public security systems. :owe$er,
utili9ing human resources in such systems builds up the e;penses, as well as inconsistencies
due to subjecti$e perceptions. 'esides, technological de$ices are $astly a$ailable in this era.
/ll of these factors indicate the ine$itable utili9ation of automated systems. In this thesis, an
automated sur$eillance system is described, which includes the following four main building
bloc s< mo$ing object detection, object trac ing, e$ent recognition and person identification.
The implementation plan consists of the following steps.
List all files re*uired for implementation.Identify all data re*uired to build new files during implementation.
List all new documents and procedures that go into the new system.
The implementation plan should anticipate possible problems and must be able to deal
with them. The usual problems may be missing documents, mi;ed data formats between
current files, errors in data translation, missing data etc.
PREPARATION OF IMPLEMENTATION
Two major tests of preparation for implementation are educating and training of users
and testing the system. The most difficult tas in the system life cycle is the successful
implementation of the new system design. Implementation includes all those acti$ities that
ta e place to con$ert from the old system to the new system. The new system may be that a
major implementation becomes necessary so that a reliable system based on the re*uirements
of the organi9ation can be pro$ided.
There are three aspects of implementation,
Training personal
%on$ersion procedure
Post implementation re$iew
/fter the system is implemented and con$ersion is complete a re$iew should be conducted to
determine whether the system is meeting e;pectations and where impro$ements are needed.
/ post implementation re$iew measures the system3s performance against predefinedre*uirements. It determines how well the system continues to meet performance
7/25/2019 Intruder Surveillance Final Document
17/36
specifications. It also pro$ides information to determine whether a major re design or small
modification is re*uired.
The post implementation re$iew is an e$olution of a system in terms of the e;tent to
which the system accomplishes stated objecti$es and if the actual project costs e;ceeds initial
estimates. The post implementation study begins une;pected changes in the system that
affects the user or system performance is a primary factor that prompts system re$iew.
2nce a re*uest is filed, the user is as ed how well the system is functioning to
specifications or how well the measured benefits ha$e been reali9ed .
7/25/2019 Intruder Surveillance Final Document
18/36
8. SYSTEM MAINTENANCE
aintenance of the software is one of the major steps in the computer animation.#oftware which is de$eloped by the engineer, should undergo maintenance process in a
regular inter$al of time goes on new problems arise and it must be corrected accordingly.
aintenance and enhancements are a long5term process. If the problem is di$erted or
upgraded, then also the software should be changed.
In this project, the maintenance is carried o$er by the staff of the company. #ince,
they are the ey persons to de$elop this project they now clearly about the project and
coding structures. #o, they will change the coding whene$er re*uired. &egarding the project
maintenance, the changes will occur then and there according to the conditions.
Carious types of maintenance that can be made are
%orrecti$e maintenance
/dapti$e maintenance
Prefecture maintenance
&e$erse engineering
7/25/2019 Intruder Surveillance Final Document
19/36
'. CONCLUSIONS
There is an increasing demand for personal and public security systems. :owe$er,
utili9ing human resources in such systems builds up the e;penses, as well as inconsistencies
due to subjecti$e perceptions. 'esides, technological de$ices are $astly a$ailable in this area.
/ll of these factors indicate the ine$itable utili9ation of automated systems. In this thesis, an
automated sur$eillance system is described, which includes the following four main building
bloc s< mo$ing object detection, object trac ing, e$ent recognition and person identification.Cisual (or $ideo) sur$eillance systems ha$e been around for a couple of decades.
ost current automated $ideo sur$eillance systems can process $ideo se*uence and perform
almost all ey low5le$el functions, such as motion detection and segmentation, object
trac ing, and object classification with good accuracy. &ecently, technical interest in $ideo
sur$eillance has mo$ed from such low5le$el functions to more comple; scene analysis to
detect human andDor other object beha$iors, i.e., patterns of acti$ities or e$ents, for standoff
threat detection and pre$ention. $ideo sur$eillance and analy9es the challenges and feasibilityfor combining object trac ing, motion analysis, beha$ior analysis, and biometrics for stand5
off human subject identification and beha$ior understanding.
'eha$ior analysis using $isual sur$eillance in$ol$es the most ad$anced and comple;
researches in image processing, computer $ision, and artificial intelligence. e$elopments
and strategies of stages in$ol$ed in a general $isual sur$eillance systemH how to detect and
analy9e beha$ior and intent in the intrusion sur$eillance system.
7/25/2019 Intruder Surveillance Final Document
20/36
9. FUTURE ENHANCEMENT
/s some future wor , shadow remo$al process can be achie$ed with a more robust
algorithm. This case will both impro$e object silhouettes and trac ing results. /s for the
identification part, an automated combination scheme should be incorporated into the system,
which will automatically decide on the best combination rule with respecti$e weights of color
and te;ture features.
Future enhancements alert the user sending multimedia sms by using # (global system for
mobile communication) odem, and then it is $ery efficiently find out unauthori9ed person.
The programs were coded in an easier and more structured manner so that may further
modifications may be incorporated easily. The processing time in this system is $ery lesser
when compared to old system. This system has good fle;ibility of accommodating any more
changes that might arise in the future also in this system, data integrity is maintained and data
redundancy is a$oided and it increase system efficiency.
7/25/2019 Intruder Surveillance Final Document
21/36
:. BIBLIOGRAPHY
@) The Ba$a :andboo by Patric +aughton, ichael orrison , 2sborneD c raw5:ill,
/pril, @77M
E) #un %ertified "nterprise /rchitect for BE"" Technology #tudy uide by ar %ade ,
1ro; Press, @@ arch,E88E
=) Professional Ba$a #er$er Programming, BE"" @.= "dition by artin 'ond, an
:aywood, ebbie Law, /ndy Longshaw, and Peter &o;burgh, 1ro; Press, @A Bune,E88@
?) N@O F. e la Torre, ". artine9, . ". #antamaria and ./. oran, 4 o$ing 2bject
etection and Trac ing #ystem< a &eal time implementation 6, Proceedings of the
#ymposium on #ignal and Image Processing &"T#I 7A renoble, @77A.
WEBSITES
www.w=schools.com.
www.eboo s.eboo mall.com.
www.coderanch.com.
www.ja$aranch.com.
http://www.osborne.com/int/javah.htmhttp://www.osborne.com/int/javah.htm7/25/2019 Intruder Surveillance Final Document
22/36
1;. APPENDIX
1;.1 SCREEN SHOTS
FIGURE< 1;.1.1 I"-* #,* S *),!77("/, C( ,*( &,7,/-!$" &$ */, #,-(!7&
FIGURE< 1;.1.2 I"-* #,* S *),!77("/, S-*,( S,--!"=& F$* (-
7/25/2019 Intruder Surveillance Final Document
23/36
FIGURE
7/25/2019 Intruder Surveillance Final Document
24/36
FIGURE
7/25/2019 Intruder Surveillance Final Document
25/36
FIGURE
7/25/2019 Intruder Surveillance Final Document
26/36
FIGURE
7/25/2019 Intruder Surveillance Final Document
27/36
FIGURE!= *(-!$"
FIGURE
7/25/2019 Intruder Surveillance Final Document
28/36
FIGURE$ #,-(!7&
FIGURE
7/25/2019 Intruder Surveillance Final Document
29/36
FIGURE
7/25/2019 Intruder Surveillance Final Document
30/36
FIGURE
7/25/2019 Intruder Surveillance Final Document
31/36
7/25/2019 Intruder Surveillance Final Document
32/36
V().ready(function() W
$ar elf V( Xelfinder ).elfinder(W
url < jspDconnector.jsp DD connector !&L (&"0!I&" )
DD lang< ru , DD language (2PTI2+/L)
Y).elfinder( instance )H
Y)H
setInter$al(function()W
V.aja;( jspDscan.jsp ,function(data)Walert(data)Y)H
Y, >888)H
DscriptS
DheadS
bodyS
Q55 "lement where elFinder will be created (&"0!I&" ) 55S
di$ id UelfinderUS Ddi$S
DbodyS
DhtmlS
C$"",/-$*. &