SUSPICIOUS ACTIVITY DETECTION

Slides:



Advertisements
Similar presentations
By: Hossein and Hadi Shayesteh Supervisor: Mr J.Connan.
Advertisements

Y A S O O B A L I b o r n o n 1 9 t h F e b r u a r y i n K a n p u r d i s t r i c t o f U t t a r P r a d e s h. H e s t a r t e d s i n g i.
F ACE D ETECTION FOR A CCESS C ONTROL By Dmitri De Klerk Supervisor: James Connan.
IS6112 Application Modelling and Design Introduction.
Safeguarding Financial Institutions with Pixim ® ’s Digital Pixel System ® Technology July 2008.
Application Programming Interface For Tracking Face & Eye Motion Team Members Tharaka Roshan Pathberiya Nimesh Saveendra Chamara Susantha Gayan Gunarathne.
Lie Detection System Using Micro-Expressions
By: Hossein and Hadi Shayesteh Supervisor: Mr. James Connan.
SG-VoIP Page 1 / 14 PLANET Pan / Tilt Internet Camera Internet Surveillance Solution.
Augmented Reality and 3D modelling Done by Stafford Joemat Supervised by Mr James Connan and Mr Mehrdad Ghaziasgar.
MobSched: An Optimizable Scheduler for Mobile Cloud Computing S. SindiaS. GaoB. Black A.LimV. D. AgrawalP. Agrawal Auburn University, Auburn, AL 45 th.
Toward Real-Time Extraction of Pedestrian Contexts with Stereo Camera Kei Suzuki, Kazunori Takashio, Hideyuki Tokuda, Masaki Wada, Yusuke Matsuki, Kazunori.
Anaglyph Videos Student:Jihaad Pienaar Supervisor: Mehrdad Ghaziasgar & James Connan Mentors: Roland Foster & Kenzo Abrahams.
By: Hadley Scholtz Supervisor: Mehrdad Ghaziasgar Co – supervisor: James Connan Assisted by: Ibraheem Frieslaar.
Student: Dane Brown Supervisor : James Connan and Mehrdad Ghaziasgar.
Research Problem: A Review of the DLSU Library’s Book Chute Service from
PRESENTED BY : MOHAMMAD DIAB ALAA’ DWAIKAT SUPERVISOR: DR.SUFYAN SAMARA GRADUATION PROJECT PRESENTATION Amany 3la Al Tareeq أماني على الطريق.
By: Hadley Scholtz Supervisor: Mehrdad Ghaziasgar Co - supervisor: James Connan Mentor: Ibraheem Frieslaar.
Web Controlled of Robot Georgi Chakarov Ivelin Stoyanov.
USER IDENTIFICATION SYSTEM.
Mazlan Sulong Department of Statistics MALAYSIA Census Data Capture MALAYSIA Population Census 2000 vs Population Census 2010 (proposed solution)
Windows Server 2003 with Active Directory and Group Policies Wendy Hurst Eastern Kentucky University Department of Technology CEN/CET.
D EPT. OF I NFO. & C OMM., GIST Networked Media Lab. Networked Media Laboratory Dept. of Information & Communications Gwang-Ju Institute of Science & Technology.
Soundscapes James Martin. Overview Problem Statement Proposed Solution Solution Created (Modules, Model, Pics) Testing Looking Back See It in Action Q&A.
Math – What is a Function? 1. 2 input output function.
Anaglyph Videos Student:Jihaad Pienaar Supervisor: Mr Mehrdad Ghaziasgar Co-Supervisor:Mr James Connan Mentors: Mr Roland Foster & Mr Kenzo Abrahams.
Compiled and Presented by KJ Tsiri Supervisor : Mr. Ismail.
TEMPLATE DESIGN © E-Eye : A Multi Media Based Unauthorized Object Identification and Tracking System Tolgahan Cakaloglu.
CAPTURING, ENCODING AND RENDERING GESTURES USING THE KINECT by Adan Patience Supervisor: Mr Mehrdad Ghazi-Asgar.
Condor Technology Solutions, Inc. Grace Performance Chemicals HRIS Intranet Project.
The Optical Telemeter Supervisor - Mr Reg Dodds Co – Supervisor - Mentor- Mr Dane Brown Presented by Mutende Msiska.
By Roland Foster Supervisors: Mr. Mehrdad Ghaziasgar Mr. James Connan Mentor: Mr. Warren Nel.
Student: Ibraheem Frieslaar Supervisor: Mehrdad Ghaziasgar.
Augmented Reality and 3D modelling Done by Stafford Joemat Supervised by Mr James Connan.
Write a function rule for a graph EXAMPLE 3 Write a rule for the function represented by the graph. Identify the domain and the range of the function.
Kearan Mc Pherson Supervised by James Connan. Introduction Record ball bowled Track the ball Methods Interpret the results.
G UN S POT – A GUNSHOT DETECTION APPLICATION FOR MOBILE PHONES By Simon Kleinsmith Supervisor: Mr James Connan.
By: Hossein and Hadi Shayesteh Supervisor: Mr. James Connan.
We are :- Soma Datta, Pramit Ghosh and Debotosh Bhattacherjee
Student: Thabang Kgwefane Supervisor: James Connan.
Video Analytics Integration and Analytics. Introduction The functions of video analytics. The architecture of video analytics. The applications of video.
SYSTEM ANALYSIS AND DESIGN LAB NARZU TARANNUM(NAT)
May 5, 2004Slide 2 OmnAuto TMS Solution May 5, 2004Slide 3 OmnAuto TMS Dataflow.
Augmented Reality and 3D modelling Done by Stafford Joemat Supervised by Mr James Connan and Mehrdad Ghaziasgar.
Group Member: 1. Nguyen Tuan Minh Nguyen Huy Hoang Tran Van Huynh Le Dinh Son Supervisor: Phan Truong Lam.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Student: Dane Brown Supervisor : James Connan Co-Supervisor : Mehrdad Ghaziasgar.
LOGO AutoCarParking Capstone Project. LOGO Project Role HungPD Supervisor Huynb Project Manager, Developer Truongpx Developer Tuanhh Developer, tester.
Scope of Systems Requirements: Definition o f Requirements Not to define the full system Not to define the full system Describe or define the essential.
Automatic License Plate Recognition for Electronic Payment system Chiu Wing Cheung d.
Chapter 1 Connections to Algebra Review
Day 3: computer vision.
Sponsored by Portakal Technologies
Tracking the eyes using a webcam
<Student’s name>
Face Detection for Access Control
FISH IDENTIFICATION SYSTEM
JC Bailey Rhodes University
Pertemuan 07 Materi : Buku Wajib & Sumber Materi :
Graphical User Interface Based Digital Sixth Sense
Lab Seminar Video Presence System with One VS Multi Supported
E190Q – Final Project Presenation
ACTi ALPR - Automatic License Plate Recognition
Lab Seminar Video Presence System with One VS Multi Supported
Title Introduction: Discussion & Conclusion: Methods & Results:
Applications of Linear Algebra in Electronics and Communication
FISH IDENTIFICATION SYSTEM
FISH IDENTIFICATION SYSTEM
GUNSPOT – A GUNSHOT DETECTION SYSTEM FOR MOBILE PHONES
Multi-modal transport workshop session
Presentation transcript:

SUSPICIOUS ACTIVITY DETECTION Student: Dane Brown Supervisor: James Connan

OVERVIEW INTRODUCTION USER REQUIREMENTS PROPOSED METHODOLOGY CONCLUSION REFERENCES QUESTIONS & ANSWERS

INTRODUCTION What is SUSPICIOUS ACTIVITY DETECTION? This project serves to detect suspicious activity. Loitering next to a vehicle is suspicious

USER REQUIREMENTS Video Camera Server Capture the parking lot Runs the c++ code.

PROPOSED METHODOLOGY Input Process Output Video capture Camera 1 Camera 2 Camera 3 Camera n Input Video capture Process Image pre-processing Output Suspicious activity Process Output

PROJECT REPORT Term2 Term1 Project analysis and requirements complete Start working towards a prototype

Suspect 1

Another example of a suspect

Non-suspect (not within range)

CONCLUSION Feasible solution to supplement current security. Good foundation for future security solutions.

REFERENCES http://library.wolfram.com/examples/edgedetection/ http://homepages.inf.ed.ac.uk/rbf/CVonline/LOCAL_COPIES/RAJA/CV.html http://opencv.willowgarage.com/wiki/ http://www.owlnet.rice.edu/~elec539/Projects97/morphjrks/laplacian.html http://www.pages.drexel.edu/~weg22/can_tut.html

QUESTIONS AND ANSWERS Thank You!