170 likes | 563 Views
Student: Dane Brown Supervisor: James Connan. SUSPICIOUS ACTIVITY DETECTION. OVERVIEW. INTRODUCTION USER REQUIREMENTS PROPOSED METHODOLOGY CONCLUSION REFERENCES QUESTIONS & ANSWERS. INTRODUCTION . What is SUSPICIOUS ACTIVITY DETECTION?
E N D
Student: Dane Brown Supervisor: James Connan SUSPICIOUS ACTIVITY DETECTION
OVERVIEW • INTRODUCTION • USER REQUIREMENTS • PROPOSED METHODOLOGY • CONCLUSION • REFERENCES • QUESTIONS & ANSWERS
INTRODUCTION • What is SUSPICIOUS ACTIVITY DETECTION? • This project serves to detect suspicious activity. • Loitering next to a vehicle is suspicious
USER REQUIREMENTS • Video Camera • Capture the parking lot • Server • Runs the c++ code.
PROPOSEDMETHODOLOGY • Input • Video capture • Process • Image pre-processing • Output • Suspicious activity
PROJECT REPORT • Term1 • Project analysis and requirements complete • Term2 • Start working towards a prototype
CONCLUSION • Feasible solution to supplement current security. • Good foundation for future security solutions.
REFERENCES • http://library.wolfram.com/examples/edgedetection/ • http://homepages.inf.ed.ac.uk/rbf/CVonline/LOCAL_COPIES/RAJA/CV.html • http://opencv.willowgarage.com/wiki/ • http://www.owlnet.rice.edu/~elec539/Projects97/morphjrks/laplacian.html • http://www.pages.drexel.edu/~weg22/can_tut.html