SUSPICIOUS ACTIVITY DETECTION Student: Dane Brown Supervisor: James Connan
OVERVIEW INTRODUCTION USER REQUIREMENTS PROPOSED METHODOLOGY CONCLUSION REFERENCES QUESTIONS & ANSWERS
INTRODUCTION What is SUSPICIOUS ACTIVITY DETECTION? This project serves to detect suspicious activity. Loitering next to a vehicle is suspicious
USER REQUIREMENTS Video Camera Server Capture the parking lot Runs the c++ code.
PROPOSED METHODOLOGY Input Process Output Video capture Camera 1 Camera 2 Camera 3 Camera n Input Video capture Process Image pre-processing Output Suspicious activity Process Output
PROJECT REPORT Term2 Term1 Project analysis and requirements complete Start working towards a prototype
Suspect 1
Another example of a suspect
Non-suspect (not within range)
CONCLUSION Feasible solution to supplement current security. Good foundation for future security solutions.
REFERENCES http://library.wolfram.com/examples/edgedetection/ http://homepages.inf.ed.ac.uk/rbf/CVonline/LOCAL_COPIES/RAJA/CV.html http://opencv.willowgarage.com/wiki/ http://www.owlnet.rice.edu/~elec539/Projects97/morphjrks/laplacian.html http://www.pages.drexel.edu/~weg22/can_tut.html
QUESTIONS AND ANSWERS Thank You!