Download presentation
Presentation is loading. Please wait.
1
SUSPICIOUS ACTIVITY DETECTION
Student: Dane Brown Supervisor: James Connan
2
OVERVIEW INTRODUCTION USER REQUIREMENTS PROPOSED METHODOLOGY
CONCLUSION REFERENCES QUESTIONS & ANSWERS
3
INTRODUCTION What is SUSPICIOUS ACTIVITY DETECTION?
This project serves to detect suspicious activity. Loitering next to a vehicle is suspicious
4
USER REQUIREMENTS Video Camera Server Capture the parking lot
Runs the c++ code.
5
PROPOSED METHODOLOGY Input Process Output Video capture
Camera 1 Camera 2 Camera 3 Camera n Input Video capture Process Image pre-processing Output Suspicious activity Process Output
6
PROJECT REPORT Term2 Term1 Project analysis and requirements complete
Start working towards a prototype
7
Suspect 1
8
Another example of a suspect
9
Non-suspect (not within range)
10
CONCLUSION Feasible solution to supplement current security.
Good foundation for future security solutions.
11
REFERENCES http://library.wolfram.com/examples/edgedetection/
12
QUESTIONS AND ANSWERS Thank You!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.