SlideShare a Scribd company logo
1 of 17
GROUP MEMBERS 
 AKSHATA MOHITE 
 MANGESH NIKAM 
 PRATIK NAIK 
 KIRTI MADHAVI 
UNDER THE GUIDANCE OF 
Ms. SHOBHANA GAIKWAD
 Existing System 
 Limitations of Existing System 
 Proposed System 
 Algorithm 
 Data Flow Diagram 
 Advantages of Proposed System 
 Real Time Applications 
 Soft. & Hardware Specification 
 References
CCTV 
Now a Days CCTV (Closed circuit Television) Is 
Most Popular System For Security Purpose.
It Gives Evidence After Incident. 
It’s Difficult To Maintain Heavy Amount Of 
Raw Video Data 
Human Interaction. 
Require Higher Bandwidth For Transmitting 
The Visual Data.
We Propose a Robust Security Alarming 
System Based On Detection Of Moving 
Objects In Video Streams And An Efficient 
Security System.
Capture Image 
Convert To Gray Image 
Edge Detection 
Comparison 
Alarming And Report
MODULE 1 : 
Taking Snapshot Of Images. 
MODULE 2 : 
This Images Will Converted To Gray Images. 
MODULE 3 : 
Detect Edges Of Images By Using Canny Detector. 
MODULE 4 : 
Edges Of Images Will Compared With Default 
Images. 
MODULE 5 : 
If Suspicious Image Is Detected Then Alert 
Administrator.
CANNY EDGE DETECTOR 
The Algorithm Runs In 5 Separate Steps 
1. Smoothing 
2. Finding Gradients 
3. Non-Maximum Suppression 
4. Double Thresholding 
5. Edge Tracking By Hysteresis
EDGES COMPARISON 
This Module Will Extract The Moving Object 
From The Edged Images And Give The 
Coordinate And Area Acquired By The Object 
This object Will Be Compared With The 
Previously Stored the Default Behavior Of The 
Object In Restricted Area 
If Any Conflicting Behaviour Apart From 
Default Stored Context Is Detected; It Will 
Send To The Alarming Module
ALARMING AND REPORT 
If Module 4 Sends Report Of Any Suspicious 
Activity Then This Module Will Be Activated. It 
Will Alert The Administrator 
As The Alarm Rings The System Will Enter 
New Record In Database Which Will Have 
Information For Analysis Of Event
Helpful In Identifying People In The Crime Scenes etc. 
Don’t need to monitor videos manually by the person 
Keep Track Of Information Video Data For Future Use 
Reduce The Large Data Storage 
Does Not Require Large Bandwidth 
Provide a Robust Alarming System To Alert The 
System Administrator
Indoor/Outdoor Security. 
Real Time Crime Detection. 
Traffic Monitoring. 
High Security Area, 
 BANKS. 
 AIRPORTS. 
 ATM CENTERS. 
 MALLS.
SOFTWARE 
SPECIFICATION 
• Operating System 
Windows XP,7 
• Programming 
language : 
• Java(JDK 1.6) 
SOFTWARE 
TOOLS 
• IBM RAD 
,Rational Rose 
• Backend 
Microsoft 
Access 
HARDWARE 
SPECIFICATION 
•PROCESSOR: Speed 
minimum: PIII 800 MHz 
•RAM: Minimum: 128 MB, 
256 MB 
•Web camera
PAPER REFERENCE 
• ICCTAI'2011 paper on “Motion Based Security Alarming System for 
Video surveillance” by G. Raja Raman, M. Sarath Chandran, and S. R. 
Vinotha” 
WEB REFERENCES 
• http://www.filestub.com 
• http://www.ebookee.org 
• http://www.google.com
Motion based security alarm

More Related Content

What's hot

DHS ICS Security Presentation
DHS ICS Security PresentationDHS ICS Security Presentation
DHS ICS Security Presentationguest85a34f
 
Logger NERC CIP 1.0 Solutions Guide
Logger NERC CIP 1.0 Solutions GuideLogger NERC CIP 1.0 Solutions Guide
Logger NERC CIP 1.0 Solutions Guideprotect724rkeer
 
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for  Intrusion DetectionCloudslam09:Building a Cloud Computing Analysis System for  Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion DetectionWei-Yu Chen
 
Applying Auto-Data Classification Techniques for Large Data Sets
Applying Auto-Data Classification Techniques for Large Data SetsApplying Auto-Data Classification Techniques for Large Data Sets
Applying Auto-Data Classification Techniques for Large Data SetsPriyanka Aash
 
Compromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayCompromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayEnergySec
 
Scada security presentation by Stephen Miller
Scada security presentation by Stephen MillerScada security presentation by Stephen Miller
Scada security presentation by Stephen MillerAVEVA
 
Network_Intrusion_Detection_System_Team1
Network_Intrusion_Detection_System_Team1Network_Intrusion_Detection_System_Team1
Network_Intrusion_Detection_System_Team1Saksham Agrawal
 
Cheatsheet for your cloud project
Cheatsheet for your cloud projectCheatsheet for your cloud project
Cheatsheet for your cloud projectPetteri Heino
 
PLC Virtualization Dragos S4 2019
PLC Virtualization Dragos S4 2019PLC Virtualization Dragos S4 2019
PLC Virtualization Dragos S4 2019Dragos, Inc.
 
Novetta Cyber Analytics
Novetta Cyber AnalyticsNovetta Cyber Analytics
Novetta Cyber AnalyticsNovetta
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Digital Bond
 
Big data ... for security
Big data ... for securityBig data ... for security
Big data ... for securityJames Salter
 
Smart Megalopolises. How Safe and Reliable Is Your Data?
Smart Megalopolises. How Safe and Reliable Is Your Data?Smart Megalopolises. How Safe and Reliable Is Your Data?
Smart Megalopolises. How Safe and Reliable Is Your Data?Priyanka Aash
 
Security Advantages of Software-Defined Networking
Security Advantages of Software-Defined NetworkingSecurity Advantages of Software-Defined Networking
Security Advantages of Software-Defined NetworkingPriyanka Aash
 
Blackhat USA 2016 - What's the DFIRence for ICS?
Blackhat USA 2016 - What's the DFIRence for ICS?Blackhat USA 2016 - What's the DFIRence for ICS?
Blackhat USA 2016 - What's the DFIRence for ICS?Chris Sistrunk
 
Infocyte Mid-market Threat and Incident Response Report Webinar
Infocyte Mid-market Threat and Incident Response Report WebinarInfocyte Mid-market Threat and Incident Response Report Webinar
Infocyte Mid-market Threat and Incident Response Report WebinarInfocyte
 
Malicious Client Detection Using Machine Learning
Malicious Client Detection Using Machine LearningMalicious Client Detection Using Machine Learning
Malicious Client Detection Using Machine Learningsecurityxploded
 

What's hot (20)

DHS ICS Security Presentation
DHS ICS Security PresentationDHS ICS Security Presentation
DHS ICS Security Presentation
 
Logger NERC CIP 1.0 Solutions Guide
Logger NERC CIP 1.0 Solutions GuideLogger NERC CIP 1.0 Solutions Guide
Logger NERC CIP 1.0 Solutions Guide
 
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for  Intrusion DetectionCloudslam09:Building a Cloud Computing Analysis System for  Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
 
Applying Auto-Data Classification Techniques for Large Data Sets
Applying Auto-Data Classification Techniques for Large Data SetsApplying Auto-Data Classification Techniques for Large Data Sets
Applying Auto-Data Classification Techniques for Large Data Sets
 
S4x20 Forescout Presentation
S4x20 Forescout Presentation S4x20 Forescout Presentation
S4x20 Forescout Presentation
 
Compromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayCompromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles Away
 
Scada security presentation by Stephen Miller
Scada security presentation by Stephen MillerScada security presentation by Stephen Miller
Scada security presentation by Stephen Miller
 
IKare Vulnerability Scanner - Datasheet EN
IKare Vulnerability Scanner - Datasheet ENIKare Vulnerability Scanner - Datasheet EN
IKare Vulnerability Scanner - Datasheet EN
 
Network_Intrusion_Detection_System_Team1
Network_Intrusion_Detection_System_Team1Network_Intrusion_Detection_System_Team1
Network_Intrusion_Detection_System_Team1
 
Cheatsheet for your cloud project
Cheatsheet for your cloud projectCheatsheet for your cloud project
Cheatsheet for your cloud project
 
PLC Virtualization Dragos S4 2019
PLC Virtualization Dragos S4 2019PLC Virtualization Dragos S4 2019
PLC Virtualization Dragos S4 2019
 
Novetta Cyber Analytics
Novetta Cyber AnalyticsNovetta Cyber Analytics
Novetta Cyber Analytics
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)
 
Big data ... for security
Big data ... for securityBig data ... for security
Big data ... for security
 
Smart Megalopolises. How Safe and Reliable Is Your Data?
Smart Megalopolises. How Safe and Reliable Is Your Data?Smart Megalopolises. How Safe and Reliable Is Your Data?
Smart Megalopolises. How Safe and Reliable Is Your Data?
 
Security Advantages of Software-Defined Networking
Security Advantages of Software-Defined NetworkingSecurity Advantages of Software-Defined Networking
Security Advantages of Software-Defined Networking
 
Blackhat USA 2016 - What's the DFIRence for ICS?
Blackhat USA 2016 - What's the DFIRence for ICS?Blackhat USA 2016 - What's the DFIRence for ICS?
Blackhat USA 2016 - What's the DFIRence for ICS?
 
Infocyte Mid-market Threat and Incident Response Report Webinar
Infocyte Mid-market Threat and Incident Response Report WebinarInfocyte Mid-market Threat and Incident Response Report Webinar
Infocyte Mid-market Threat and Incident Response Report Webinar
 
Outlier+Overview
Outlier+OverviewOutlier+Overview
Outlier+Overview
 
Malicious Client Detection Using Machine Learning
Malicious Client Detection Using Machine LearningMalicious Client Detection Using Machine Learning
Malicious Client Detection Using Machine Learning
 

Viewers also liked

Energy Efficient Intelligent LED Lighting System
Energy Efficient Intelligent  LED Lighting SystemEnergy Efficient Intelligent  LED Lighting System
Energy Efficient Intelligent LED Lighting SystemAnand Parakkat Parambil
 
Lighting and control
Lighting and controlLighting and control
Lighting and controlStephen Dyson
 
The science of light sensors
The science of light   sensorsThe science of light   sensors
The science of light sensorsJozhe Fonseca
 
DALI Lighting Control Solutions Explained
DALI Lighting Control Solutions ExplainedDALI Lighting Control Solutions Explained
DALI Lighting Control Solutions ExplainedCrestron Electronics
 
Final project report on Solar street light
Final project report on Solar street light Final project report on Solar street light
Final project report on Solar street light Darshil Shah
 

Viewers also liked (7)

Automatic Lighting control
Automatic Lighting controlAutomatic Lighting control
Automatic Lighting control
 
Energy Efficient Intelligent LED Lighting System
Energy Efficient Intelligent  LED Lighting SystemEnergy Efficient Intelligent  LED Lighting System
Energy Efficient Intelligent LED Lighting System
 
Lighting and control
Lighting and controlLighting and control
Lighting and control
 
The science of light sensors
The science of light   sensorsThe science of light   sensors
The science of light sensors
 
DALI Lighting Control Solutions Explained
DALI Lighting Control Solutions ExplainedDALI Lighting Control Solutions Explained
DALI Lighting Control Solutions Explained
 
Light Dependent Resistor
Light Dependent ResistorLight Dependent Resistor
Light Dependent Resistor
 
Final project report on Solar street light
Final project report on Solar street light Final project report on Solar street light
Final project report on Solar street light
 

Similar to Motion based security alarm

Psdot 7 change detection algorithm for visual
Psdot 7 change detection algorithm for visualPsdot 7 change detection algorithm for visual
Psdot 7 change detection algorithm for visualZTech Proje
 
Voice Assistance Based Remote Surveillance System
Voice Assistance Based Remote Surveillance SystemVoice Assistance Based Remote Surveillance System
Voice Assistance Based Remote Surveillance SystemIRJET Journal
 
NoxEye.pptx
NoxEye.pptxNoxEye.pptx
NoxEye.pptxMathanE5
 
IoT Based Smart Surveillance and Automation
IoT Based Smart Surveillance and AutomationIoT Based Smart Surveillance and Automation
IoT Based Smart Surveillance and AutomationIRJET Journal
 
WEAPON DETECTION USING ARTIFICIAL INTELLIGENCE AND DEEP LEARINING FOR SECURIT...
WEAPON DETECTION USING ARTIFICIAL INTELLIGENCE AND DEEP LEARINING FOR SECURIT...WEAPON DETECTION USING ARTIFICIAL INTELLIGENCE AND DEEP LEARINING FOR SECURIT...
WEAPON DETECTION USING ARTIFICIAL INTELLIGENCE AND DEEP LEARINING FOR SECURIT...MNaresh15
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
Density-Based Multi feature Background Subtraction with Support Vector Machine
Density-Based Multi feature Background Subtraction with  Support Vector MachineDensity-Based Multi feature Background Subtraction with  Support Vector Machine
Density-Based Multi feature Background Subtraction with Support Vector MachineNAZNEEN BEGUM
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYjmical
 
Motion Detector (Fourth Copy).pptx
Motion Detector (Fourth Copy).pptxMotion Detector (Fourth Copy).pptx
Motion Detector (Fourth Copy).pptxMOHAMMEDHabeeb54
 
Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...Venkat Projects
 
Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...Venkat Projects
 
Proactive Monitoring: Playing Offense for the Win
Proactive Monitoring: Playing Offense for the WinProactive Monitoring: Playing Offense for the Win
Proactive Monitoring: Playing Offense for the WinDeborah Schalm
 
Ashrith Barthur, Security Scientist, H2o.ai, at MLconf 2017
Ashrith Barthur, Security Scientist, H2o.ai, at MLconf 2017Ashrith Barthur, Security Scientist, H2o.ai, at MLconf 2017
Ashrith Barthur, Security Scientist, H2o.ai, at MLconf 2017MLconf
 
Development of wearable object detection system & blind stick for visuall...
Development of wearable object detection system & blind stick for visuall...Development of wearable object detection system & blind stick for visuall...
Development of wearable object detection system & blind stick for visuall...Arkadev Kundu
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxkarlhennesey
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissanceCloudera, Inc.
 
Mongoose H4D 2021 Lessons Learned
Mongoose H4D 2021 Lessons LearnedMongoose H4D 2021 Lessons Learned
Mongoose H4D 2021 Lessons LearnedStanford University
 
Introduction-to-Theft-Automatic-Detection-IoT-Project (1).pptx [Repaired].pptx
Introduction-to-Theft-Automatic-Detection-IoT-Project (1).pptx [Repaired].pptxIntroduction-to-Theft-Automatic-Detection-IoT-Project (1).pptx [Repaired].pptx
Introduction-to-Theft-Automatic-Detection-IoT-Project (1).pptx [Repaired].pptxMkknowledgehub
 

Similar to Motion based security alarm (20)

Psdot 7 change detection algorithm for visual
Psdot 7 change detection algorithm for visualPsdot 7 change detection algorithm for visual
Psdot 7 change detection algorithm for visual
 
Voice Assistance Based Remote Surveillance System
Voice Assistance Based Remote Surveillance SystemVoice Assistance Based Remote Surveillance System
Voice Assistance Based Remote Surveillance System
 
NoxEye.pptx
NoxEye.pptxNoxEye.pptx
NoxEye.pptx
 
IoT Based Smart Surveillance and Automation
IoT Based Smart Surveillance and AutomationIoT Based Smart Surveillance and Automation
IoT Based Smart Surveillance and Automation
 
WEAPON DETECTION USING ARTIFICIAL INTELLIGENCE AND DEEP LEARINING FOR SECURIT...
WEAPON DETECTION USING ARTIFICIAL INTELLIGENCE AND DEEP LEARINING FOR SECURIT...WEAPON DETECTION USING ARTIFICIAL INTELLIGENCE AND DEEP LEARINING FOR SECURIT...
WEAPON DETECTION USING ARTIFICIAL INTELLIGENCE AND DEEP LEARINING FOR SECURIT...
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Density-Based Multi feature Background Subtraction with Support Vector Machine
Density-Based Multi feature Background Subtraction with  Support Vector MachineDensity-Based Multi feature Background Subtraction with  Support Vector Machine
Density-Based Multi feature Background Subtraction with Support Vector Machine
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
 
Motion Detector (Fourth Copy).pptx
Motion Detector (Fourth Copy).pptxMotion Detector (Fourth Copy).pptx
Motion Detector (Fourth Copy).pptx
 
Multimedia
MultimediaMultimedia
Multimedia
 
Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...
 
Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...
 
Proactive Monitoring: Playing Offense for the Win
Proactive Monitoring: Playing Offense for the WinProactive Monitoring: Playing Offense for the Win
Proactive Monitoring: Playing Offense for the Win
 
Ashrith Barthur, Security Scientist, H2o.ai, at MLconf 2017
Ashrith Barthur, Security Scientist, H2o.ai, at MLconf 2017Ashrith Barthur, Security Scientist, H2o.ai, at MLconf 2017
Ashrith Barthur, Security Scientist, H2o.ai, at MLconf 2017
 
Development of wearable object detection system & blind stick for visuall...
Development of wearable object detection system & blind stick for visuall...Development of wearable object detection system & blind stick for visuall...
Development of wearable object detection system & blind stick for visuall...
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 
Mongoose H4D 2021 Lessons Learned
Mongoose H4D 2021 Lessons LearnedMongoose H4D 2021 Lessons Learned
Mongoose H4D 2021 Lessons Learned
 
Introduction-to-Theft-Automatic-Detection-IoT-Project (1).pptx [Repaired].pptx
Introduction-to-Theft-Automatic-Detection-IoT-Project (1).pptx [Repaired].pptxIntroduction-to-Theft-Automatic-Detection-IoT-Project (1).pptx [Repaired].pptx
Introduction-to-Theft-Automatic-Detection-IoT-Project (1).pptx [Repaired].pptx
 
Whitepaper perimeter protection
Whitepaper perimeter protectionWhitepaper perimeter protection
Whitepaper perimeter protection
 

More from Akshay Surve

Women security application
Women security applicationWomen security application
Women security applicationAkshay Surve
 
Virus detection system
Virus detection systemVirus detection system
Virus detection systemAkshay Surve
 
Student feedback system
Student feedback systemStudent feedback system
Student feedback systemAkshay Surve
 
Shoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemShoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemAkshay Surve
 
Issue tracking system
Issue tracking systemIssue tracking system
Issue tracking systemAkshay Surve
 
Face detection system
Face detection systemFace detection system
Face detection systemAkshay Surve
 
Buget planning system
Buget planning systemBuget planning system
Buget planning systemAkshay Surve
 
Automatic attendance system
Automatic attendance systemAutomatic attendance system
Automatic attendance systemAkshay Surve
 
E notes application2.ppsx
E notes application2.ppsxE notes application2.ppsx
E notes application2.ppsxAkshay Surve
 

More from Akshay Surve (13)

Women security application
Women security applicationWomen security application
Women security application
 
Virus detection system
Virus detection systemVirus detection system
Virus detection system
 
Travel planning
Travel planningTravel planning
Travel planning
 
Student feedback system
Student feedback systemStudent feedback system
Student feedback system
 
Software security
Software securitySoftware security
Software security
 
Shoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemShoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login system
 
Pharming attack
Pharming attackPharming attack
Pharming attack
 
Issue tracking system
Issue tracking systemIssue tracking system
Issue tracking system
 
Face detection system
Face detection systemFace detection system
Face detection system
 
Buget planning system
Buget planning systemBuget planning system
Buget planning system
 
Automatic attendance system
Automatic attendance systemAutomatic attendance system
Automatic attendance system
 
E notes application2.ppsx
E notes application2.ppsxE notes application2.ppsx
E notes application2.ppsx
 
Attitude
AttitudeAttitude
Attitude
 

Recently uploaded

Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 

Recently uploaded (20)

Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 

Motion based security alarm

  • 1.
  • 2. GROUP MEMBERS  AKSHATA MOHITE  MANGESH NIKAM  PRATIK NAIK  KIRTI MADHAVI UNDER THE GUIDANCE OF Ms. SHOBHANA GAIKWAD
  • 3.  Existing System  Limitations of Existing System  Proposed System  Algorithm  Data Flow Diagram  Advantages of Proposed System  Real Time Applications  Soft. & Hardware Specification  References
  • 4. CCTV Now a Days CCTV (Closed circuit Television) Is Most Popular System For Security Purpose.
  • 5. It Gives Evidence After Incident. It’s Difficult To Maintain Heavy Amount Of Raw Video Data Human Interaction. Require Higher Bandwidth For Transmitting The Visual Data.
  • 6. We Propose a Robust Security Alarming System Based On Detection Of Moving Objects In Video Streams And An Efficient Security System.
  • 7. Capture Image Convert To Gray Image Edge Detection Comparison Alarming And Report
  • 8. MODULE 1 : Taking Snapshot Of Images. MODULE 2 : This Images Will Converted To Gray Images. MODULE 3 : Detect Edges Of Images By Using Canny Detector. MODULE 4 : Edges Of Images Will Compared With Default Images. MODULE 5 : If Suspicious Image Is Detected Then Alert Administrator.
  • 9. CANNY EDGE DETECTOR The Algorithm Runs In 5 Separate Steps 1. Smoothing 2. Finding Gradients 3. Non-Maximum Suppression 4. Double Thresholding 5. Edge Tracking By Hysteresis
  • 10. EDGES COMPARISON This Module Will Extract The Moving Object From The Edged Images And Give The Coordinate And Area Acquired By The Object This object Will Be Compared With The Previously Stored the Default Behavior Of The Object In Restricted Area If Any Conflicting Behaviour Apart From Default Stored Context Is Detected; It Will Send To The Alarming Module
  • 11. ALARMING AND REPORT If Module 4 Sends Report Of Any Suspicious Activity Then This Module Will Be Activated. It Will Alert The Administrator As The Alarm Rings The System Will Enter New Record In Database Which Will Have Information For Analysis Of Event
  • 12.
  • 13. Helpful In Identifying People In The Crime Scenes etc. Don’t need to monitor videos manually by the person Keep Track Of Information Video Data For Future Use Reduce The Large Data Storage Does Not Require Large Bandwidth Provide a Robust Alarming System To Alert The System Administrator
  • 14. Indoor/Outdoor Security. Real Time Crime Detection. Traffic Monitoring. High Security Area,  BANKS.  AIRPORTS.  ATM CENTERS.  MALLS.
  • 15. SOFTWARE SPECIFICATION • Operating System Windows XP,7 • Programming language : • Java(JDK 1.6) SOFTWARE TOOLS • IBM RAD ,Rational Rose • Backend Microsoft Access HARDWARE SPECIFICATION •PROCESSOR: Speed minimum: PIII 800 MHz •RAM: Minimum: 128 MB, 256 MB •Web camera
  • 16. PAPER REFERENCE • ICCTAI'2011 paper on “Motion Based Security Alarming System for Video surveillance” by G. Raja Raman, M. Sarath Chandran, and S. R. Vinotha” WEB REFERENCES • http://www.filestub.com • http://www.ebookee.org • http://www.google.com