Presentation is loading. Please wait.

Presentation is loading. Please wait.

SUSPICIOUS ACTIVITY DETECTION

Similar presentations


Presentation on theme: "SUSPICIOUS ACTIVITY DETECTION"— Presentation transcript:

1 SUSPICIOUS ACTIVITY DETECTION
Student: Dane Brown Supervisor: James Connan

2 OVERVIEW INTRODUCTION USER REQUIREMENTS PROPOSED METHODOLOGY
CONCLUSION REFERENCES QUESTIONS & ANSWERS

3 INTRODUCTION What is SUSPICIOUS ACTIVITY DETECTION?
This project serves to detect suspicious activity. Loitering next to a vehicle is suspicious

4 USER REQUIREMENTS Video Camera Server Capture the parking lot
Runs the c++ code.

5 PROPOSED METHODOLOGY Input Process Output Video capture
Camera 1 Camera 2 Camera 3 Camera n Input Video capture Process Image pre-processing Output Suspicious activity Process Output

6 PROJECT REPORT Term2 Term1 Project analysis and requirements complete
Start working towards a prototype

7 Suspect 1

8 Another example of a suspect

9 Non-suspect (not within range)

10 CONCLUSION Feasible solution to supplement current security.
Good foundation for future security solutions.

11 REFERENCES http://library.wolfram.com/examples/edgedetection/

12 QUESTIONS AND ANSWERS Thank You!


Download ppt "SUSPICIOUS ACTIVITY DETECTION"

Similar presentations


Ads by Google