Please use this identifier to cite or link to this item:
http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/8010
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Bhardwaj, Isha | - |
dc.contributor.author | Puri, Shikha | - |
dc.contributor.author | Madaan, Sumit | - |
dc.contributor.author | Saini, D. S. [Guided by] | - |
dc.date.accessioned | 2022-10-20T11:12:57Z | - |
dc.date.available | 2022-10-20T11:12:57Z | - |
dc.date.issued | 2014 | - |
dc.identifier.uri | http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/8010 | - |
dc.description.abstract | The Project deals with the monitoring of the users surroundings/premises and detecting any human presence in his absence. If that human being is a known of the user, no specific action is taken but if that human is some unknown, then the software immediately sets an alarm and the user is informed of the breach in his premises. We are achieving this via using MATLAB software. The code written on it will activate the cameras to take snapshots of the surroundings. If any human is detected then the image is saved for further analysis. After saving the image we are performing face detection and recognition to find out if the person detected is known or unknown. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Jaypee University of Information Technology, Solan, H.P. | en_US |
dc.subject | Software | en_US |
dc.subject | Intruder detection | en_US |
dc.title | Software Implementation of Intruder Detection | en_US |
dc.type | Project Report | en_US |
Appears in Collections: | B.Tech. Project Reports |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Software Implementation of Intruder Detection.pdf | 1.69 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.