SlideShare a Scribd company logo
1 of 17
GROUP MEMBERS 
 AKSHATA MOHITE 
 MANGESH NIKAM 
 PRATIK NAIK 
 KIRTI MADHAVI 
UNDER THE GUIDANCE OF 
Ms. SHOBHANA GAIKWAD
 Existing System 
 Limitations of Existing System 
 Proposed System 
 Algorithm 
 Data Flow Diagram 
 Advantages of Proposed System 
 Real Time Applications 
 Soft. & Hardware Specification 
 References
CCTV 
Now a Days CCTV (Closed circuit Television) Is 
Most Popular System For Security Purpose.
It Gives Evidence After Incident. 
It’s Difficult To Maintain Heavy Amount Of 
Raw Video Data 
Human Interaction. 
Require Higher Bandwidth For Transmitting 
The Visual Data.
We Propose a Robust Security Alarming 
System Based On Detection Of Moving 
Objects In Video Streams And An Efficient 
Security System.
Capture Image 
Convert To Gray Image 
Edge Detection 
Comparison 
Alarming And Report
MODULE 1 : 
Taking Snapshot Of Images. 
MODULE 2 : 
This Images Will Converted To Gray Images. 
MODULE 3 : 
Detect Edges Of Images By Using Canny Detector. 
MODULE 4 : 
Edges Of Images Will Compared With Default 
Images. 
MODULE 5 : 
If Suspicious Image Is Detected Then Alert 
Administrator.
CANNY EDGE DETECTOR 
The Algorithm Runs In 5 Separate Steps 
1. Smoothing 
2. Finding Gradients 
3. Non-Maximum Suppression 
4. Double Thresholding 
5. Edge Tracking By Hysteresis
EDGES COMPARISON 
This Module Will Extract The Moving Object 
From The Edged Images And Give The 
Coordinate And Area Acquired By The Object 
This object Will Be Compared With The 
Previously Stored the Default Behavior Of The 
Object In Restricted Area 
If Any Conflicting Behaviour Apart From 
Default Stored Context Is Detected; It Will 
Send To The Alarming Module
ALARMING AND REPORT 
If Module 4 Sends Report Of Any Suspicious 
Activity Then This Module Will Be Activated. It 
Will Alert The Administrator 
As The Alarm Rings The System Will Enter 
New Record In Database Which Will Have 
Information For Analysis Of Event
Helpful In Identifying People In The Crime Scenes etc. 
Don’t need to monitor videos manually by the person 
Keep Track Of Information Video Data For Future Use 
Reduce The Large Data Storage 
Does Not Require Large Bandwidth 
Provide a Robust Alarming System To Alert The 
System Administrator
Indoor/Outdoor Security. 
Real Time Crime Detection. 
Traffic Monitoring. 
High Security Area, 
 BANKS. 
 AIRPORTS. 
 ATM CENTERS. 
 MALLS.
SOFTWARE 
SPECIFICATION 
• Operating System 
Windows XP,7 
• Programming 
language : 
• Java(JDK 1.6) 
SOFTWARE 
TOOLS 
• IBM RAD 
,Rational Rose 
• Backend 
Microsoft 
Access 
HARDWARE 
SPECIFICATION 
•PROCESSOR: Speed 
minimum: PIII 800 MHz 
•RAM: Minimum: 128 MB, 
256 MB 
•Web camera
PAPER REFERENCE 
• ICCTAI'2011 paper on “Motion Based Security Alarming System for 
Video surveillance” by G. Raja Raman, M. Sarath Chandran, and S. R. 
Vinotha” 
WEB REFERENCES 
• http://www.filestub.com 
• http://www.ebookee.org 
• http://www.google.com
Motion based security alarm

More Related Content

What's hot

Novetta Cyber Analytics
Novetta Cyber AnalyticsNovetta Cyber Analytics
Novetta Cyber Analytics
Novetta
 

What's hot (20)

DHS ICS Security Presentation
DHS ICS Security PresentationDHS ICS Security Presentation
DHS ICS Security Presentation
 
Logger NERC CIP 1.0 Solutions Guide
Logger NERC CIP 1.0 Solutions GuideLogger NERC CIP 1.0 Solutions Guide
Logger NERC CIP 1.0 Solutions Guide
 
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for  Intrusion DetectionCloudslam09:Building a Cloud Computing Analysis System for  Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
 
Applying Auto-Data Classification Techniques for Large Data Sets
Applying Auto-Data Classification Techniques for Large Data SetsApplying Auto-Data Classification Techniques for Large Data Sets
Applying Auto-Data Classification Techniques for Large Data Sets
 
S4x20 Forescout Presentation
S4x20 Forescout Presentation S4x20 Forescout Presentation
S4x20 Forescout Presentation
 
Compromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayCompromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles Away
 
Scada security presentation by Stephen Miller
Scada security presentation by Stephen MillerScada security presentation by Stephen Miller
Scada security presentation by Stephen Miller
 
IKare Vulnerability Scanner - Datasheet EN
IKare Vulnerability Scanner - Datasheet ENIKare Vulnerability Scanner - Datasheet EN
IKare Vulnerability Scanner - Datasheet EN
 
Network_Intrusion_Detection_System_Team1
Network_Intrusion_Detection_System_Team1Network_Intrusion_Detection_System_Team1
Network_Intrusion_Detection_System_Team1
 
Cheatsheet for your cloud project
Cheatsheet for your cloud projectCheatsheet for your cloud project
Cheatsheet for your cloud project
 
PLC Virtualization Dragos S4 2019
PLC Virtualization Dragos S4 2019PLC Virtualization Dragos S4 2019
PLC Virtualization Dragos S4 2019
 
Novetta Cyber Analytics
Novetta Cyber AnalyticsNovetta Cyber Analytics
Novetta Cyber Analytics
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)
 
Big data ... for security
Big data ... for securityBig data ... for security
Big data ... for security
 
Smart Megalopolises. How Safe and Reliable Is Your Data?
Smart Megalopolises. How Safe and Reliable Is Your Data?Smart Megalopolises. How Safe and Reliable Is Your Data?
Smart Megalopolises. How Safe and Reliable Is Your Data?
 
Security Advantages of Software-Defined Networking
Security Advantages of Software-Defined NetworkingSecurity Advantages of Software-Defined Networking
Security Advantages of Software-Defined Networking
 
Blackhat USA 2016 - What's the DFIRence for ICS?
Blackhat USA 2016 - What's the DFIRence for ICS?Blackhat USA 2016 - What's the DFIRence for ICS?
Blackhat USA 2016 - What's the DFIRence for ICS?
 
Infocyte Mid-market Threat and Incident Response Report Webinar
Infocyte Mid-market Threat and Incident Response Report WebinarInfocyte Mid-market Threat and Incident Response Report Webinar
Infocyte Mid-market Threat and Incident Response Report Webinar
 
Outlier+Overview
Outlier+OverviewOutlier+Overview
Outlier+Overview
 
Malicious Client Detection Using Machine Learning
Malicious Client Detection Using Machine LearningMalicious Client Detection Using Machine Learning
Malicious Client Detection Using Machine Learning
 

Viewers also liked (7)

Automatic Lighting control
Automatic Lighting controlAutomatic Lighting control
Automatic Lighting control
 
Energy Efficient Intelligent LED Lighting System
Energy Efficient Intelligent  LED Lighting SystemEnergy Efficient Intelligent  LED Lighting System
Energy Efficient Intelligent LED Lighting System
 
Lighting and control
Lighting and controlLighting and control
Lighting and control
 
The science of light sensors
The science of light   sensorsThe science of light   sensors
The science of light sensors
 
DALI Lighting Control Solutions Explained
DALI Lighting Control Solutions ExplainedDALI Lighting Control Solutions Explained
DALI Lighting Control Solutions Explained
 
Light Dependent Resistor
Light Dependent ResistorLight Dependent Resistor
Light Dependent Resistor
 
Final project report on Solar street light
Final project report on Solar street light Final project report on Solar street light
Final project report on Solar street light
 

Similar to Motion based security alarm

The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
theijes
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
jmical
 
Ashrith Barthur, Security Scientist, H2o.ai, at MLconf 2017
Ashrith Barthur, Security Scientist, H2o.ai, at MLconf 2017Ashrith Barthur, Security Scientist, H2o.ai, at MLconf 2017
Ashrith Barthur, Security Scientist, H2o.ai, at MLconf 2017
MLconf
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
karlhennesey
 
Introduction-to-Theft-Automatic-Detection-IoT-Project (1).pptx [Repaired].pptx
Introduction-to-Theft-Automatic-Detection-IoT-Project (1).pptx [Repaired].pptxIntroduction-to-Theft-Automatic-Detection-IoT-Project (1).pptx [Repaired].pptx
Introduction-to-Theft-Automatic-Detection-IoT-Project (1).pptx [Repaired].pptx
Mkknowledgehub
 

Similar to Motion based security alarm (20)

Psdot 7 change detection algorithm for visual
Psdot 7 change detection algorithm for visualPsdot 7 change detection algorithm for visual
Psdot 7 change detection algorithm for visual
 
Voice Assistance Based Remote Surveillance System
Voice Assistance Based Remote Surveillance SystemVoice Assistance Based Remote Surveillance System
Voice Assistance Based Remote Surveillance System
 
NoxEye.pptx
NoxEye.pptxNoxEye.pptx
NoxEye.pptx
 
IoT Based Smart Surveillance and Automation
IoT Based Smart Surveillance and AutomationIoT Based Smart Surveillance and Automation
IoT Based Smart Surveillance and Automation
 
WEAPON DETECTION USING ARTIFICIAL INTELLIGENCE AND DEEP LEARINING FOR SECURIT...
WEAPON DETECTION USING ARTIFICIAL INTELLIGENCE AND DEEP LEARINING FOR SECURIT...WEAPON DETECTION USING ARTIFICIAL INTELLIGENCE AND DEEP LEARINING FOR SECURIT...
WEAPON DETECTION USING ARTIFICIAL INTELLIGENCE AND DEEP LEARINING FOR SECURIT...
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Density-Based Multi feature Background Subtraction with Support Vector Machine
Density-Based Multi feature Background Subtraction with  Support Vector MachineDensity-Based Multi feature Background Subtraction with  Support Vector Machine
Density-Based Multi feature Background Subtraction with Support Vector Machine
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
 
Motion Detector (Fourth Copy).pptx
Motion Detector (Fourth Copy).pptxMotion Detector (Fourth Copy).pptx
Motion Detector (Fourth Copy).pptx
 
Multimedia
MultimediaMultimedia
Multimedia
 
Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...
 
Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...
 
Proactive Monitoring: Playing Offense for the Win
Proactive Monitoring: Playing Offense for the WinProactive Monitoring: Playing Offense for the Win
Proactive Monitoring: Playing Offense for the Win
 
Ashrith Barthur, Security Scientist, H2o.ai, at MLconf 2017
Ashrith Barthur, Security Scientist, H2o.ai, at MLconf 2017Ashrith Barthur, Security Scientist, H2o.ai, at MLconf 2017
Ashrith Barthur, Security Scientist, H2o.ai, at MLconf 2017
 
Development of wearable object detection system & blind stick for visuall...
Development of wearable object detection system & blind stick for visuall...Development of wearable object detection system & blind stick for visuall...
Development of wearable object detection system & blind stick for visuall...
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 
Mongoose H4D 2021 Lessons Learned
Mongoose H4D 2021 Lessons LearnedMongoose H4D 2021 Lessons Learned
Mongoose H4D 2021 Lessons Learned
 
Introduction-to-Theft-Automatic-Detection-IoT-Project (1).pptx [Repaired].pptx
Introduction-to-Theft-Automatic-Detection-IoT-Project (1).pptx [Repaired].pptxIntroduction-to-Theft-Automatic-Detection-IoT-Project (1).pptx [Repaired].pptx
Introduction-to-Theft-Automatic-Detection-IoT-Project (1).pptx [Repaired].pptx
 
Whitepaper perimeter protection
Whitepaper perimeter protectionWhitepaper perimeter protection
Whitepaper perimeter protection
 

More from Akshay Surve (13)

Women security application
Women security applicationWomen security application
Women security application
 
Virus detection system
Virus detection systemVirus detection system
Virus detection system
 
Travel planning
Travel planningTravel planning
Travel planning
 
Student feedback system
Student feedback systemStudent feedback system
Student feedback system
 
Software security
Software securitySoftware security
Software security
 
Shoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemShoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login system
 
Pharming attack
Pharming attackPharming attack
Pharming attack
 
Issue tracking system
Issue tracking systemIssue tracking system
Issue tracking system
 
Face detection system
Face detection systemFace detection system
Face detection system
 
Buget planning system
Buget planning systemBuget planning system
Buget planning system
 
Automatic attendance system
Automatic attendance systemAutomatic attendance system
Automatic attendance system
 
E notes application2.ppsx
E notes application2.ppsxE notes application2.ppsx
E notes application2.ppsx
 
Attitude
AttitudeAttitude
Attitude
 

Recently uploaded

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
dharasingh5698
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 

Motion based security alarm

  • 1.
  • 2. GROUP MEMBERS  AKSHATA MOHITE  MANGESH NIKAM  PRATIK NAIK  KIRTI MADHAVI UNDER THE GUIDANCE OF Ms. SHOBHANA GAIKWAD
  • 3.  Existing System  Limitations of Existing System  Proposed System  Algorithm  Data Flow Diagram  Advantages of Proposed System  Real Time Applications  Soft. & Hardware Specification  References
  • 4. CCTV Now a Days CCTV (Closed circuit Television) Is Most Popular System For Security Purpose.
  • 5. It Gives Evidence After Incident. It’s Difficult To Maintain Heavy Amount Of Raw Video Data Human Interaction. Require Higher Bandwidth For Transmitting The Visual Data.
  • 6. We Propose a Robust Security Alarming System Based On Detection Of Moving Objects In Video Streams And An Efficient Security System.
  • 7. Capture Image Convert To Gray Image Edge Detection Comparison Alarming And Report
  • 8. MODULE 1 : Taking Snapshot Of Images. MODULE 2 : This Images Will Converted To Gray Images. MODULE 3 : Detect Edges Of Images By Using Canny Detector. MODULE 4 : Edges Of Images Will Compared With Default Images. MODULE 5 : If Suspicious Image Is Detected Then Alert Administrator.
  • 9. CANNY EDGE DETECTOR The Algorithm Runs In 5 Separate Steps 1. Smoothing 2. Finding Gradients 3. Non-Maximum Suppression 4. Double Thresholding 5. Edge Tracking By Hysteresis
  • 10. EDGES COMPARISON This Module Will Extract The Moving Object From The Edged Images And Give The Coordinate And Area Acquired By The Object This object Will Be Compared With The Previously Stored the Default Behavior Of The Object In Restricted Area If Any Conflicting Behaviour Apart From Default Stored Context Is Detected; It Will Send To The Alarming Module
  • 11. ALARMING AND REPORT If Module 4 Sends Report Of Any Suspicious Activity Then This Module Will Be Activated. It Will Alert The Administrator As The Alarm Rings The System Will Enter New Record In Database Which Will Have Information For Analysis Of Event
  • 12.
  • 13. Helpful In Identifying People In The Crime Scenes etc. Don’t need to monitor videos manually by the person Keep Track Of Information Video Data For Future Use Reduce The Large Data Storage Does Not Require Large Bandwidth Provide a Robust Alarming System To Alert The System Administrator
  • 14. Indoor/Outdoor Security. Real Time Crime Detection. Traffic Monitoring. High Security Area,  BANKS.  AIRPORTS.  ATM CENTERS.  MALLS.
  • 15. SOFTWARE SPECIFICATION • Operating System Windows XP,7 • Programming language : • Java(JDK 1.6) SOFTWARE TOOLS • IBM RAD ,Rational Rose • Backend Microsoft Access HARDWARE SPECIFICATION •PROCESSOR: Speed minimum: PIII 800 MHz •RAM: Minimum: 128 MB, 256 MB •Web camera
  • 16. PAPER REFERENCE • ICCTAI'2011 paper on “Motion Based Security Alarming System for Video surveillance” by G. Raja Raman, M. Sarath Chandran, and S. R. Vinotha” WEB REFERENCES • http://www.filestub.com • http://www.ebookee.org • http://www.google.com