Adil Khan 9 months ago
AdiKhanOfficial #FYP Ideas

Automated Surveillance Security Software

As the name suggests, this project automates the security and develops an AI-based solution that holds data of students or employees (pictures), compares them with people, and checks if they are authorized or not. We are considering implementing the solution on cameras and admin systems and alerting

Project Title

Automated Surveillance Security Software

Project Area of Specialization

Artificial Intelligence

Project Summary

As the name suggests, this project automates the security and develops an AI-based solution that holds data of students or employees (pictures), compares them with people, and checks if they are authorized or not. We are considering implementing the solution on cameras and admin systems and alerting or raising alarms if an unauthorized person is detected.

This project aims to:

  •  Make an AI solution that can recognize authorized persons with the help of deep learning algorithms.
  •  Develop a solution that holds data of students or employees (majorly pictures), compares with people, and checks if they are authorized.
  •  Implement solutions on cameras and admin systems.
  •  Alert or raise an alarm if an unauthorized person enters.

Project Objectives

In today’s digital world, the need for AI has been present more than ever before. Machines can do many tasks that are being performed by Humans today much more efficiently. One such task is video surveillance.

The primary objective of our project is to automate the security mechanisms of organizations and reduce man security, only app users will need to have basic knowledge of computers to make it work and the cameras should be good enough to focus on every person in range.

After that, the plan is to make Software that can recognize various patterns among people through the eyes of the security camera. All Target people will pass through the implemented camera and this solution will offer security and make old practices easier.

Project Implementation Method

Our project is determined on the basis of capturing the face of every person who passes in front of the camera. The authentication of the user will be based on the database. Our system will be applicable for a limited number of persons e.g) an organization, academies or security concerning places. It’s not applicable for Shopping malls or large audiences where thousands of people interact with the system.

1. Detect: Face in Image

2. Alignment: Determine the head’s position, size, and pose

3. Normalisation: Registered and mapped into an appropriate size and pose

4. Representation: Translate into a unique code

5. Matching: Newly acquired data is compared to stored data.

6. Authentication: If Data is Matched then authentication is successful otherwise not.

For successful authentication save the data in the Verified section of the database otherwise in the non-verified section.

Benefits of the Project

  • Security’s Next Step, “an  Automated system”
  • Protects businesses against theft and unauthorized access.
  • Strengthens security measures.
  • Automated identification makes working in an organization efficient.
  • Reduces the number of touchpoints.
  • Automates time taking process of fingerprint scanning
  • Easy integration
  • Improves photo organization.
  • Efficient than previous systems.
  • Make place or firm more secure.
  • Reduces cost to hire security guards.
  • Alerts automatically if an unauthorized person enters.
  • Many organizations are in need of this.
  • A system like this is not being used enough in this market.
  • Every firm is working day and night to add more security layers to their precious data.

Technical Details of Final Deliverable

The final project deliveralble contains: Face recoginiton system, workable interface, Database schema, manual.

We will use the open cv libraries as a base to develop our software on. We will use python as a programming language in backend and use MYSQL for database. Output of our application will be in a multimedia format.

We will deliver the final product along with the relevant technical documents:

  • Agreement overview 
  • Scope of the agreement
  • Suppliers appointment 
  • Tasking procedures
  • Form of contract
  • Services Security
  • Social values

Final Deliverable of the Project

Software System

Core Industry

IT

Other Industries

Security

Core Technology

Artificial Intelligence(AI)

Other Technologies

Internet of Things (IoT)

Sustainable Development Goals

Industry, Innovation and Infrastructure

Required Resources

Item Name Type No. of Units Per Unit Cost (in Rs) Total (in Rs)
Wireless CCTV Cameras Equipment3499914997
RASPBERRY PI 4 MODEL B Equipment13500035000
Internet and power cost Miscellaneous 150005000
Sensors and IC's Equipment12000020000
Deployment Cost Miscellaneous 150005000
Total in (Rs) 79997
If you need this project, please contact me on contact@adikhanofficial.com
Development of Dual-Axis Solar Tracking System

Followed by growing energy consumption, gives an enormous birth to pollution concern. Henc...

1675638330.png
Adil Khan
9 months ago
Anamolous Activity Recognition using Deep Learning Techniques

Today we are living in a small digital era where technologies like AI and IOT vows to dis...

1675638330.png
Adil Khan
9 months ago
Swarm Communication via MANETs

The project gets its inspiration from the biological swarms of bees, fish and other animal...

1675638330.png
Adil Khan
9 months ago
Automatic Hybrid Generator

It's about a hybrid generator which is   environment friendly and will save us a...

1675638330.png
Adil Khan
9 months ago
video

What is Social Media Marketing

AdiKhanOfficial
Adil Khan
3 years ago