By Hello Team Awesome World™.  To avoid strangers using others’ keys, cards, and passwords to enter the buildings, our team will develop a face recognition-based.

Slides:



Advertisements
Similar presentations
Vertical Markets Education, K-12 School. K – 12 Education Solution.
Advertisements

Secure File Transfer Protocol (SFTP) With Secure Copy (SC) What is a Secure File Transfer Protocol with Secure Copy???
Using PantherFile A guide for UWM students Welcome and Navigation Welcome to Using PantherFile, a guide for UWM students. You can link directly to the.
Alarms and Events Processing Group No. 2 Project Guide: Prof. N.D.R.Sarma.
The work Number Verifications of employment and income
The Green Group International Converter. What is International Converter? – International Converter is the ability to translate any measurement, currency,
Alarms and Events - Processing and Logging Project Mentors Suneel Kumar Venugopal Vanga.
Visitor Management System
Bonrix Track & Trace System A GPS Based Vehicle Tracing System (SMS, GPRS/3G, Offline) Bonrix Software Systems Ahmedabad (INDIA) Website:
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Database Software Application
Room Locator App Aabhas Sharma Vinayak Gokhale Yehia Khoja 1 Room Locator App.
CONTENTS:-  What is Event Log Service ?  Types of event logs and their purpose.  How and when the Event Log is useful?  What is Event Viewer?  Briefing.
Software Development Unit 2 Databases What is a database? A collection of data organised in a manner that allows access, retrieval and use of that data.
1 The Social Security Number Verification Service (SSNVS) National Payroll Reporting Forum June 2, 2005.
Finding Nearby Wireless Hotspots CSE 403 LCA Presentation Team Members: Chris Scoville Tessa MacDuff Matt Mohebbi Aiman Erbad Khalil El Haitami.
Confidential - © 2012 StreamWIDE © StreamWIDE
Intro to Google Apps B3: Working in Google Drive.
Introduction to our On-Line Self Service Center at
CIS 375—Web App Dev II Microsoft’s.NET. 2 Introduction to.NET Steve Ballmer (January 2000): Steve Ballmer "Delivering an Internet-based platform of Next.
1 Team Leader TKS Job Aid. 2 Viewing the On-line Presentation If you are viewing this presentation via Internet Explorer for best results resize the “Notes”
U.01 General File Upload As a file uploader, I want to be able to upload files to Media Vault so that I can safely store and access these files. Acceptance.
CS378 - Mobile Computing Intents.
Troubleshooting Windows Vista Security Chapter 4.
PHP meets MySQL.
Follow the Data Data (and information) move from place to place in computer systems and networks. As it moves it changes form frequently. This story describes.
LION and Fannie Mae are pleased to bring mortgage professionals Internet access to Automated Underwriting using Desktop Originator via the official DO.
1 OPOL Training (OrderPro Online) Prepared by Christina Van Metre Independent Educational Consultant CTO, Business Development Team © Training Version.
Training. work smarter not harder 1 Getting Started 2 Helpful Hints 3Questions.
Guide to Linux Installation and Administration, 2e1 Chapter 7 The Role of the System Administrator.
CS378 - Mobile Computing Intents. Allow us to use applications and components that are part of Android System – start activities – start services – deliver.
Near East University Department of Computer Engineering E-COMMERCE FOR LAPTOPS SELLING COMPANY Abdul Halim Abu Kuwaik
Basic & Advanced Reporting in TIMSNT ** Part Two **
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
Storing Organizational Information - Databases
 Whether using paper forms or forms on the web, forms are used for gathering information. User enter information into designated areas, or fields. Forms.
MS Access. Access is a DBMS/RDMS DBMS = Database Management System RDMS = Relational Database Management System.
ITGS Databases.
The Software Development Process
Vinay Paul. CONTENTS:- What is Event Log Service ? Types of event logs and their purpose. How and when the Event Log is useful? What is Event Viewer?
Web Server.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Database design Using Access 2007
Web Databases Vast information provider. Offers information about jobs, photos, movies, weather, sporting events, etc. Shop for any product/service, buy/sell.
Tutorial 2 Introduction to Android App Development Course: Network Protocols (NETW703) Department of Networks Faculty of Information Engineering and Technology.
Lab 1 Writing Interactive Queries CISB514 Advanced Database Systems.
Lunchbox. Overview ➲ We developed a program called Lunchbox with the purpose of allowing the administrator to create a time sheet, create an employee.
File Tracking System Presented by J. Madhusudhana Reddy Asst Mgr(IS)
PKI Services for CYPRUS STOCK EXCHANGE Kostas Nousias.
NIMAC for Accessible Media Producers: February 2013 NIMAC 2.0 for AMPs.
THIS TRAINING IS REQUIRED IN ORDER TO OBTAIN SECURITY TO INITIATE HIRING PACKETS FOR NEW EMPLOYEES. Hire Xpress User’s Training NAU’s Automated Hiring.
/16 Final Project Report By Facializer Team Final Project Report Eagle, Leo, Bessie, Five, Evan Dan, Kyle, Ben, Caleb.
START Application Spencer Johnson Jonathan Barella Cohner Marker.
Face Recognition-Based Security System By Hello Team Awesome World.
Online Civil Pensioner’s Medical Services
Architecture Review 10/11/2004
Operating Systems & System Software
Online Training Course
Select Survey Invitations
Mobile App Login Page This is the user ID and password that caregivers create when they complete your online app or you create for them. This is your unique.
AOL Phone Number
How to Install Norton Antivirus on Android Phone? We are providing easy steps to install Norton antivirus on android phone. If you facing any technical issue related to installing then you should contact via support. Get more details to visit our website
NForm 2.0 Training.
File Stream and Team Drives
Operating Systems Security
Follow the Data Data (and information) move from place to place in computer systems and networks. As it moves it changes form frequently. This story.
Hire Xpress User’s Training A Human Resources guide to Hire Xpress
Mobile Registration App Training Guide for OPO Staffers
Presentation transcript:

By Hello Team Awesome World™

 To avoid strangers using others’ keys, cards, and passwords to enter the buildings, our team will develop a face recognition-based security system, which offers higher protection of access control and building security.

 New Employees or Visitors  Human Resource or Security Department  Security Personnel

 The ABC company has several buildings for each department.  Each building requires different security clearance levels.  The security officer in each building will use an android phone to identify individuals by taking pictures, and decide whether or not to let individuals into the building.

 Android App:  Android Phone  Phone Interface  Database  Database Interface  Face Recognition Interface  Training App:  Web GUI

 Use camera - Take a photo.  Send photo to Phone Interface (invoke recognize procedure).  Wait for response while displaying progress to user.  Display the data or exception message (depending on whether the face has been detected or not).

 Receives JPEG photo from the Android phone.  Makes sure that the photo sent by the phone is in a correct format and invokes Face Recognition Interface recognize procedure.  Waits for a response and receives XML/JSON file containing data from Database Interface or an error message depending on recognition success/failure.  Forwards the above data/message to the phone device.

 Needs to be able to store Unique ID (int), First name (30 char), Last name (30 char), Job Title (40 char), Clearance Level (int) and Default Photo (binary blob).

 Receive the Unique ID from Face Recognition Interface and do a search query on the database for that ID.  Sends First Name, Last Name, Job Title, Clearance Level and Default Photo for that particular ID to Phone Interface via XML/JSON.  Stores data to the local database.

 Recognize procedure - receive JPEG photo and send it to face.com for evaluation.  Train procedure - receive batch of JPEG photo(s) and send them to face.com for training purposes.  Get response from face.com and forward it to appropriate interface.

 Should have some form of authentication for the user who is training the software.  Should ask for First and Last Name of the person as well as Job Title.  Should generate an integer Unique ID (Primary key)  Clearance Level (We assume that the security guard knows the clearance level for the building)

 Form to upload a batch of photo(s) which will be processed by a script.  Extension for the photo(s) should be.jpeg and have good resolution and contrast.  The Web App should send the photo(s) to the Face Recognition Interface, as well as the unique ID and name.  Upon training completion Web App should invoke store procedure in Database Interface, storing all the personal info and a unique ID to the local database.

 We divide the original architecture into two parts: the Android App and the Training App.

 Risk 1:  When we use the android app to send a picture to recognize, the system might return more than one matched result.  Mitigation:  Design a priority selection mechanism, which can choose a best one from given results according to a priority rule which is decided by the application performance.

 Risk 2:  Internet connection problems, or long responses.  Mitigation:  Give a prompt message asking the user to try again later.