Webcam Based Intelligent Surveillance System
|
|
|
- Augustine Scott
- 9 years ago
- Views:
Transcription
1 Research Inventy: International Journal Of Engineering And Science Vol.2, Issue 8 (March 2013), Pp Issn(e): , Issn(p): , Webcam Based Intelligent Surveillance System 1 Akshada Deshmukh, 2 Harshalata Wadaskar, 3 Leena Zade, 4 Neha Dhakate, 5 Preetee Karmore. 1,2,3,4, (Student, Dept.of Computer Science and Engineering, Dr. Babasaheb Ambedkar College of Engineering,Nagpur, Maharashtra , India) 5 (HOD, Dept.of Computer Science and Engineering, Dr. Babasaheb Ambedkar College of Engineering,Nagpur, Maharashtra , India) Abstract -. An intelligent monitoring sensor is an application which is developed from the security point of view. The objective of this project is to develop a system that monitors the area in which it is being implemented. An Intelligent Monitoring Sensor is applicable in the area where no one is permissible to enter, also where we need to detect if any motion has been done. For this a digital camera is used. By combining the software and camera we can use this system as an Intelligent Monitoring Sensor.The Camera is used to catch the live images of the area in which it is being implemented, if any object is moving. The captured images are stored in a particular folder. The stored images will be then useful to work on. As the software detects the motion, it sends the signal from a transmitter, which is connected to the PC. The transmitter will send the wireless signal to the receiver out somewhere else, in the form of radio frequency. In this way the system will provide the security against any misdeed. Keywords image capturing, motion detection, monitoring, receiver, security, transmitter. I. INTRODUCTION Intelligent Monitoring Sensor is an application in which a digital camera is used as a powerful motion detector. Instead of using various ultra-sonic or other sensors, we are using camera as the sensor here. By combining the software and the camera we can use this system as a Intelligent monitoring Sensor. An Intelligent Monitoring Sensor can be used for security in restricted areas, where no one is allowed to visit or enter the space during particular time. For this a digital camera is used. By combining the software and camera we can use this system as an Intelligent Monitoring Sensor.If any changes has been found the camera capture the images at the rate of one image per 60msec and stores them in the folder. The stored images will be then useful to work on. As the changes have been detected, the transmitter which is connected to the PC sends the wireless signal to the receiver at the other end. There are three security levels in the software to control the monitoring. [1] High: This level will focus on the particular object only and can sense within the range of 1meter only [2] Middle: In this level the security will be less as compared to High Level.here it will sense the human as well as object. [3] Low: It s the lowest level security. This mode is basically used for monitoring only. The main modules of the project are: [1] Login Form designing [2] Camera Interfacing [3] Image Capturing & Storage [4] Hardware Interfacing [5] Motion Detection 1.1. First Module :- Login Form designing. The Login form is designed to provide authentication. If the login is successfully done, then it will switch to next form i.e. Option Form, where we have three options- 38
2 [1] Motion Detection Form [2] Image List Form [3] Exit In Motion Detection Form, the motion caused,if any, is analyzed and thus the indications are given to the authenticated person. In the second option, all the images can be viewed wherein we can see what all changes have been done and by whom. Whereas, the third option is the way to exit an application Second Module :- Camera Interfacing. This form contains the list box where the list of all the camera devices connected to the software are displayed. By default the first camera is selected, but we can select any of the available devices from the listbox.after the device is selected, the camera is interfaced through coding part. Then there is a button Activate Motion Detection, through which we can select the mode of our working and the application is set on. Here we actually have three modes - High Middle Low 1.3. Third Module :- Image Capturing & storage. Whenever any changes between the two corresponding images have been detected, the application starts capturing the images and they are stored into the folder using AVICAP32.dll class. At the same time, a wireless signal is transmitted to the receiver through.wave file. AVICap routes video and audio stream data from a captured window to a file named CAPTURE.AVI in the root directory of the current drive. AVICap window class provides applications with a message-based interface to access video and waveform-audio acquisition hardware and to control the process of streaming video capture to disk. AVICap window is efficient enough to control the process of streaming video capture to disk Fourth Module :- Motion Detection. The basic working of motion detection module is comparison between two images. The first image is the one when we activate the application and the second image is of the second instant of time. When the application recognizes any changes between two corresponding images, it calls the next module i.e Image Capturing, and if not, it keeps monitoring again Fifth Module :- Hardware Interfacing When the software will detect any movement or changes in the image, it will send a signal (hex value) to LPT port. A transmitter will be connected to the LPT port of the PC. The transmitter will transmit the signal to the receiver and it will play the buzzer at the receiver s end. Then the further actions will be taken by user. II. LITERATURE REVIEW There are many existing devices in market such as CCTv Cameras, IP camera, Infrared Sensor, Laser Sensor etc. CCTv : Implementation of CCTv cameras are very costly and has drawbacks since it require constant monitoring of every activity which is not as ease. Continuous manual visualization hampers the productivity and time. Criminals can penetrate into the CCTV system, thereby facilitating criminal acts. IP camera : Implementation of IP cameras are also very costly and not feasible. This system cause major problems as it becomes open to hackers via internet(false bomb threats, called in hoaxers while watching the cameras.). Infrared Sensor and Laser Sensor: These devices are quite economic in comparison to above devices however they have some drawbacks too. These devices are difficult to install and rarely available. One of the major disadvantages of infrared sensors is the size required to provide good resolution to the the signal. 39
3 40 Webcam Based Intelligent Surveillance III. INDENTATIONS AND EQUATIONS 3.1 Moving-Object Detection The detection of moving objects is the first stage of a typical surveillance system. Motion detection aims at segmenting the regions pertaining to moving objects from the rest of the image. Subsequent processes such as tracking and behavior analysis are greatly dependent on the performance of this stage. Many algorithms have been suggested to solve the problem of motion detection, where the moving pixels are identified by thresholding the temporal difference between the frames; background subtraction where detection occurs by comparing the incoming frame with a background model of the scene that is built by modeling the pixel intensity either by a single Gaussian distribution, a mixture of Gaussians, or using the maximum, minimum and maximum intensity difference as in ; and optical flow approaches that use characteristics of flow vectors of moving objects over time to detect moving regions in image sequences. 3.2 Temporal Variance Based Motion Detection: In our system, we use the temporal variance as a parameter to detect moving areas in a stationary scenes. The mean and variance of the intensity value at each pixel is calculated over a window of several previous frames and updated recursively for every new frame. This value of the variance is used directly afterward for the detection of moving area. The use of temporal variance for motion detection has some nice properties: [1] The variance of intensity at a certain pixel depends on both the amplitude of changes and the duration of this change so it is more robust to transient noises incurred by moving texture. [2] There is no need for background training period as this method can build the model with the existence of moving objects on the scene. The mean and variance for the intensity at each pixel (i, j) are recursively updated using a simple exponentially decaying adaptive filter as follows: m(i, j, t) = αm(i, j, t 1) + (1 α)x(i, j, t) m2(i, j, t) = αm2(i, j, t 1) + (1 α)x2(i, j, t) σ2(i, j, t) = m2(i, j, t) m2(i, j, t)..(1) where: x(i, j, t) is the intensity, m(i, j, t) is the first moment, m2(i, j, t) is the second moment and σ2(i, j, t) is the variance at pixel (i, j) at time t, α is the decay rate, that can be rewritten with respect to the filter window size N as: α = (N 1)/N N =1/(1 α).(2) 3.3 Background Modeling: In order to remove the trail effect, a background model is built by recursively updating another set of mean and variance as follows: mbg(i, j, t) = αbgmbg(i, j, t 1) + (1 αbg)x(i, j, t) m2bg(i, j, t) = αbgm2bg(i, j, t 1) + (1 αbg)x2(i, j, t) σ2 bg(i, j, t) = m2bg(i, j, t) m2 bg(i, j, t) where: mbg(i, j, t) is the background first moment, m2bg(i, j, t) is the background second moment, and σbg(i, j, t)2 is the background variance for the background at pixel (i, j) at time t. αbg is the background model decay rate that can also be written with respect to the background filter window size Nbg The background model is used to obtain a confidence weight representing the confidence of this pixel being a part of the foreground. This confidence weight is obtained as a function of the distance between the pixel intensity and the background model
4 C(i, j, t) = f _ x(i, j, t) mbg(i, j, t) _σbg(i, j, t) where C(i, j, t) is the confidence weight that the pixel (i, j) is part of the foreground and f is a nonlinear-mapping function such as sigmoid to map the distance to range of [0,1] and to emphasize the large distance points. The final binary detection map L(i, j, t) is obtained as follows: L(i, j, t) = _ 1 if C(i, j, t)σ(i, j, t) Threshold 0 if C(i, j, t)σ(i, j, t) < Threshold where the value of Threshold can be obtained either empirically or by multiplying the average background variance by a factor. IV FIGURES AND TABLES fig:flowchart V. TRANSMITTER AND RECEIVER KIT Fig: Transmitter kit Fig: Receiver kit WORKING OF TRANSMITTER KIT: [1] When the power is supplied to the circuit, the frequency is generated [2] This frequency is traveled through gang condenser where it is tuned to 3.587MHz [3] Then the frequency is converted into voltage. This voltage is amplified using the transistor T1 [4] During this process the noise is generated which is filtered using capacitive-resistive filter [5] Now this voltage is travelled through capacitor c3 where the capacitor gets charged [6] To transmit the signal this voltage is again converted into frequency using induction coil and thus it generates emf. [7] Due to this induced emf, the frequency is generated, which is then transmitted by antenna and gives wireless signal at the receiver end. 41
5 WORKING OF RECEIVER KIT: [1] Antena receives signal through transmitter, the capacitor c3 gets charged and it converts frequency to volatge at 9volt and the noise is generated. [2] Then the current is forwarded through the transformer through the inductively coupled conductors in the transformer. [3] Then the capacitive-resistive coil filters the noise generated in the received signal. [4] The silicon diode is one way conductor and provides no backing of voltage and amplifies the signal. [5] Inductor converts voltage to frequency. [6] Also there is a filtering circuit which filters 2-3 times to drop the weak signals. [7] Further the NPN transistor amplifies the current which acts as a switch. [8] The capacitor c6,c9 and c10 gets charged which holds the energy for a while and notification is given to the receiver through buzzer. VI. CONCLUSION Webcam Surveillance Standard is advanced video surveillance software. Users can effortlessly monitor home, office, cradle, parking area, storehouse, UFO or any other premises 24-hours a day. Timestamped image capturing let users capture details of events precisely when they happen. Simply connect a USB or FireWire Camera to your PC. Different environments have different surveillance requirements. A large facility like a parking lot, store, residence, or hall cannot be monitored efficiently by a single camera. Advances in PC based surveillance software now allow anyone with a webcam to setup a robust, effective and inexpensive surveillance system. Today, all you need for securing your assets is a PC, a couple of webcams and software like Webcam Based Intelligent Surveillance System. Traditionally, CCTV (Closed Circuit TV) based Surveillance Systems were used for multi camera monitoring. This solution was expensive due to the huge hardware costs. Applications : [1] Office Security [2] Army Surveillance [3] Museum [4] Bank Security [5] Space Research [6] Home Security REFERENCES [1] Bramberger, Pflugfelder, Maier, Rinner, Strobl, Schwabach, A Smart Camera for Traffic Surveillance (2000) [2] Trans. on systems, man, and cybernetics part C: Applications and Reviews, Vol.34, NO.3, AUGUST [3] Trans. on systems, man, and cybernetics part C: Applications and Reviews, Vol.34, NO.3, AUGUST [4] Mohemed F Abdelkader, Integrated Motion Detection & Tracking for Visual Surveillance (ICVS 2006). [5] Raman Maini & Dr. Himanshu Aggarwal,International Journal of Image Processing (IJIP), Volume (3) : Issue (1) [6] An Improved Motion Detection Method for Real-Time Surveillance Nan Lu, Jihong Wang, Q.H. Wu and Li Yang(19 February 2008). [7] W. Hu,T. Tan,L.Wang, and S. Maybank. A survey on visual surveillance of object motion and behaviors, IEEE [8] N.R.Mokhtar, Nor Hazlyna Harun,M.Y.Mashor, 2H.Roseline, 1Nazahah Mustafa, R.Adollah,H. Adilah, N.F.Mohd Nasir, Image Enhancement Techniques Using Local,Global, Bright, Dark and Partial Contrast Stretching For Acute Leukemia Images Proceedings of the World Congress on Engineering 2009 Vol I WCE [9] Implementation of webcam based sytem for surveillance monitoring,brahmanandha Prabhu R,Arul Prabhar A,Garima Bohra,Proceeding of ASCNT-2010,CDAC,Noida,India. [10] G. D. Hager, and P. N. Belhumeur. Efficient region tracking with parametric models of geometry and illumination, IEEE Trans. PAMI, vol. 20. [11] W. E. L. Grimson, C. Stauffer, R. Romano, and L. Lee. Using adaptive tracking to classify and monitor activities in a site, in Proc. IEEE Conf. CVPR, Santa Barbara, CA. Books: [1] Book: Mastering Visual Basic 6.0 by Evangelos Petroutsos [2] Book: Visual Basic Bible by Douglas Herger 42
A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA
A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA N. Zarrinpanjeh a, F. Dadrassjavan b, H. Fattahi c * a Islamic Azad University of Qazvin - [email protected]
Indoor Surveillance System Using Android Platform
Indoor Surveillance System Using Android Platform 1 Mandar Bhamare, 2 Sushil Dubey, 3 Praharsh Fulzele, 4 Rupali Deshmukh, 5 Dr. Shashi Dugad 1,2,3,4,5 Department of Computer Engineering, Fr. Conceicao
Classroom Monitoring System by Wired Webcams and Attendance Management System
Classroom Monitoring System by Wired Webcams and Attendance Management System Sneha Suhas More, Amani Jamiyan Madki, Priya Ranjit Bade, Upasna Suresh Ahuja, Suhas M. Patil Student, Dept. of Computer, KJCOEMR,
Design of Multi-camera Based Acts Monitoring System for Effective Remote Monitoring Control
보안공학연구논문지 (Journal of Security Engineering), 제 8권 제 3호 2011년 6월 Design of Multi-camera Based Acts Monitoring System for Effective Remote Monitoring Control Ji-Hoon Lim 1), Seoksoo Kim 2) Abstract With
AN INTERNET OF THINGS (IOT) BASED SECURITY ALERT SYSTEM USING RASPBERRY PI
Available online at www.apije.com ASIA PACIFIC INTERNATIONAL JOURNAL OF ENGINEERING SCIENCE Vol. 02 (01) (2016) 37 41 AN INTERNET OF THINGS (IOT) BASED SECURITY ALERT SYSTEM USING RASPBERRY PI A.Arun Raja
A Surveillance Robot with Climbing Capabilities for Home Security
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 11, November 2013,
Original Research Articles
Original Research Articles Researchers Mr.Ramchandra K. Gurav, Prof. Mahesh S. Kumbhar Department of Electronics & Telecommunication, Rajarambapu Institute of Technology, Sakharale, M.S., INDIA Email-
Constructing a precision SWR meter and antenna analyzer. Mike Brink HNF, Design Technologist.
Constructing a precision SWR meter and antenna analyzer. Mike Brink HNF, Design Technologist. Abstract. I have been asked to put together a detailed article on a SWR meter. In this article I will deal
FPGA Implementation of Human Behavior Analysis Using Facial Image
RESEARCH ARTICLE OPEN ACCESS FPGA Implementation of Human Behavior Analysis Using Facial Image A.J Ezhil, K. Adalarasu Department of Electronics & Communication Engineering PSNA College of Engineering
Android based Alcohol detection system using Bluetooth technology
For more Project details visit: http://www.projectsof8051.com/android-based-alcohol-detection-system-usingbluetooth-technology/ Code 1435 Project Title Android based Alcohol detection system using Bluetooth
How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode
A General Framework for Tracking Objects in a Multi-Camera Environment
A General Framework for Tracking Objects in a Multi-Camera Environment Karlene Nguyen, Gavin Yeung, Soheil Ghiasi, Majid Sarrafzadeh {karlene, gavin, soheil, majid}@cs.ucla.edu Abstract We present a framework
Home Security System
Arab Academy for Science & Technology, And Maritime Transport College of Engineering and Technology Computer Engineering Depatment Home Security System Final Year Graduation Project B. Eng. July 2008 Arab
A secure face tracking system
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 10 (2014), pp. 959-964 International Research Publications House http://www. irphouse.com A secure face tracking
Intelligent Home Automation and Security System
Intelligent Home Automation and Security System Ms. Radhamani N Department of Electronics and communication, VVIET, Mysore, India ABSTRACT: In todays scenario safer home security is required, As the technology
IP Box Camera ACM-5711. Ver. 081016. Hardware User s Manual
IP Box Camera ACM-5711 Ver. 081016 Hardware User s Manual 0 0 PRECAUTIONS 1. Read these instructions All the safety and operating instructions should be read before the product is operated. 2. Heed all
REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING
REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING Ms.PALLAVI CHOUDEKAR Ajay Kumar Garg Engineering College, Department of electrical and electronics Ms.SAYANTI BANERJEE Ajay Kumar Garg Engineering
Navigation Aid And Label Reading With Voice Communication For Visually Impaired People
Navigation Aid And Label Reading With Voice Communication For Visually Impaired People A.Manikandan 1, R.Madhuranthi 2 1 M.Kumarasamy College of Engineering, [email protected],karur,india 2 M.Kumarasamy
VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS
VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS Aswin C Sankaranayanan, Qinfen Zheng, Rama Chellappa University of Maryland College Park, MD - 277 {aswch, qinfen, rama}@cfar.umd.edu Volkan Cevher, James
MVS - Mini Video Speaker
MVS - Mini Video Speaker Mini Clock Radio Night Vision Hidden Camera User Manual Spy Tec www.spytecinc.com GETTING STARTED Components Features Powering Up the Device Micro SD Memory Card for Data Storage
Camera Technology Guide. Factors to consider when selecting your video surveillance cameras
Camera Technology Guide Factors to consider when selecting your video surveillance cameras Introduction Investing in a video surveillance system is a smart move. You have many assets to protect so you
Automatic Traffic Estimation Using Image Processing
Automatic Traffic Estimation Using Image Processing Pejman Niksaz Science &Research Branch, Azad University of Yazd, Iran [email protected] Abstract As we know the population of city and number of
1. Learn about the 555 timer integrated circuit and applications 2. Apply the 555 timer to build an infrared (IR) transmitter and receiver
Electronics Exercise 2: The 555 Timer and its Applications Mechatronics Instructional Laboratory Woodruff School of Mechanical Engineering Georgia Institute of Technology Lab Director: I. Charles Ume,
Implementation of Smart Homes and Industrial Automation System with Secure Communication over GSM
Universal Journal of Electrical and Electronic Engineering 3(4): 125-131, 2015 DOI: 10.13189/ujeee.2015.030403 http://www.hrpub.org Implementation of Smart Homes and Industrial Automation System with Secure
A Review of Security System for Smart Home Applications
Journal of Computer Science 8 (7): 1165-1170, 2012 ISSN 1549-3636 2012 Science Publications A Review of Security System for Smart Home Applications Mohammad Syuhaimi Ab-Rahman and Mohd Ariff Razaly Department
Digital Camera Imaging Evaluation
Digital Camera Imaging Evaluation Presenter/Author J Mazzetta, Electro Optical Industries Coauthors Dennis Caudle, Electro Optical Industries Bob Wageneck, Electro Optical Industries Contact Information
Contents. Preface. xiii. Part I 1
Contents Preface xiii Part I 1 Chapter 1 Introduction to Frequency-Modulated Continuous-Wave 3 Radar 1.1 Brief History 3 1.2 Examples of Use of FMCW Radar 5 1.2.1 Radio Altimeters 5 1.2.2 Level-Measuring
Human Detection Robot using PIR Sensors
Human Detection Robot using PIR Sensors Saravana Kumar K, Priscilla P, Germiya K Jose, Balagopal G Abstract: Human Detection Robot is a robot that can detect the presence of human; it sends the signal
A Survey of Video Processing with Field Programmable Gate Arrays (FGPA)
A Survey of Video Processing with Field Programmable Gate Arrays (FGPA) Heather Garnell Abstract This paper is a high-level, survey of recent developments in the area of video processing using reconfigurable
FB-500A User s Manual
Megapixel Day & Night Fixed Box Network Camera FB-500A User s Manual Quality Service Group Product name: Network Camera (FB-500A Series) Release Date: 2011/7 Manual Revision: V1.0 Web site: Email: www.brickcom.com
MH - Gesellschaft für Hardware/Software mbh
E.d.a.s.VX Data acquisition on board road and track vehicles The E.d.a.s.VX System is designed for portable applications running on 12 Volts DC, and is capable of measuring at selectable rates up to 30,000,000
Tracking and Recognition in Sports Videos
Tracking and Recognition in Sports Videos Mustafa Teke a, Masoud Sattari b a Graduate School of Informatics, Middle East Technical University, Ankara, Turkey [email protected] b Department of Computer
Pop-up Surveillance Camera On Your TV
Pop-up Surveillance Camera On Your TV Would you like to automatically see who s at your front door, even before they ring the doorbell? It s easy to do! Just follow the simple steps described below. CAMERA
Diode Applications. by Kenneth A. Kuhn Sept. 1, 2008. This note illustrates some common applications of diodes.
by Kenneth A. Kuhn Sept. 1, 2008 This note illustrates some common applications of diodes. Power supply applications A common application for diodes is converting AC to DC. Although half-wave rectification
Germanium Diode AM Radio
Germanium Diode AM Radio LAB 3 3.1 Introduction In this laboratory exercise you will build a germanium diode based AM (Medium Wave) radio. Earliest radios used simple diode detector circuits. The diodes
Parametric Comparison of H.264 with Existing Video Standards
Parametric Comparison of H.264 with Existing Video Standards Sumit Bhardwaj Department of Electronics and Communication Engineering Amity School of Engineering, Noida, Uttar Pradesh,INDIA Jyoti Bhardwaj
Logging of RF Power Measurements
Logging of RF Power Measurements By Orwill Hawkins Logging of measurement data is critical for effective trend, drift and Exploring the use of RF event analysis of various processes. For RF power measurements,
Hands On ECG. Sean Hubber and Crystal Lu
Hands On ECG Sean Hubber and Crystal Lu The device. The black box contains the circuit and microcontroller, the mini tv is set on top, the bars on the sides are for holding it and reading hand voltage,
Distributed Vision Processing in Smart Camera Networks
Distributed Vision Processing in Smart Camera Networks CVPR-07 Hamid Aghajan, Stanford University, USA François Berry, Univ. Blaise Pascal, France Horst Bischof, TU Graz, Austria Richard Kleihorst, NXP
Automated Security System using ZigBee
IJIRST International Journal for Innovative Research in Science & Technology Volume 2 Issue 01 June 2015 ISSN (online): 2349-6010 Automated Security System using ZigBee Sneha Susan Abraham Saveetha School
Whitepaper. Image stabilization improving camera usability
Whitepaper Image stabilization improving camera usability Table of contents 1. Introduction 3 2. Vibration Impact on Video Output 3 3. Image Stabilization Techniques 3 3.1 Optical Image Stabilization 3
DIGICLIENT 8.0 Remote Agent Software
DIGICLIENT 8.0 Remote Agent Software MODEL: D17800 Series Instruction Manual English Version 1.0 Copyright 2007 Digimerge Technologies Inc Table of Contents Table of Contents About the DigiClient 8.0...
Automated Monitoring System for Fall Detection in the Elderly
Automated Monitoring System for Fall Detection in the Elderly Shadi Khawandi University of Angers Angers, 49000, France [email protected] Bassam Daya Lebanese University Saida, 813, Lebanon Pierre
Human Behavior Analysis in Intelligent Retail Environments
Human Behavior Analysis in Intelligent Retail Environments Andrea Ascani, Emanuele Frontoni, Adriano Mancini, Primo Zingaretti 1 D.I.I.G.A., Università Politecnica delle Marche, Ancona - Italy, {ascani,
[email protected] [email protected]
Bhaskar Kapoor 1 and Anamika Chhabra 2 1 Department of Information Technology, MAIT, New Delhi INDIA [email protected] 2 Department of Information Technology, MAIT, New Delhi INDIA [email protected]
Mouse Control using a Web Camera based on Colour Detection
Mouse Control using a Web Camera based on Colour Detection Abhik Banerjee 1, Abhirup Ghosh 2, Koustuvmoni Bharadwaj 3, Hemanta Saikia 4 1, 2, 3, 4 Department of Electronics & Communication Engineering,
Keywords: GPS, GSM, AVR Microcontroller, SMS.
Volume 5, Issue 4, 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A System for Car Accident
A Multilevel Home Security System (MHSS)
A Multilevel Home Security System (MHSS) Jer-Vui Lee, Yea-Dat Chuah and Chin-Tin Chai Department of Mechatronics and Biomedical Engineering, Faculty of Engineering and Science, Universiti Tunku Abdul Rahman,
VEHICLE LOCALISATION AND CLASSIFICATION IN URBAN CCTV STREAMS
VEHICLE LOCALISATION AND CLASSIFICATION IN URBAN CCTV STREAMS Norbert Buch 1, Mark Cracknell 2, James Orwell 1 and Sergio A. Velastin 1 1. Kingston University, Penrhyn Road, Kingston upon Thames, KT1 2EE,
AM Receiver. Prelab. baseband
AM Receiver Prelab In this experiment you will use what you learned in your previous lab sessions to make an AM receiver circuit. You will construct an envelope detector AM receiver. P1) Introduction One
BlackHawk for MAC Software User Guide
BlackHawk for MAC Software User Guide Products: BLK-DH2 Series and BLK-HD Series DVRs Please read this manual before using your software, and always follow the instructions for safety and proper use. Save
Vision based Vehicle Tracking using a high angle camera
Vision based Vehicle Tracking using a high angle camera Raúl Ignacio Ramos García Dule Shu [email protected] [email protected] Abstract A vehicle tracking and grouping algorithm is presented in this work
Understanding Network Video Security Systems
Understanding Network Video Security Systems Chris Adesanya Panasonic System Solutions Company [email protected] Introduction and Overview This session will provide vendor neutral introduction
ARCHITECTURE OF INDUSTRIAL AUTOMATION SYSTEMS
ARCHITECTURE OF INDUSTRIAL AUTOMATION SYSTEMS Abdu Idris Omer Taleb M.M., PhD Majmaah University, Kingdom of Saudia Arabia Abstract This article is aimed to name the levels of industrial automation, describes
This section will focus on basic operation of the interface including pan/tilt, video, audio, etc.
Catalogue Basic Operation... 2 For Internet Explorer... 2 For Other Non-IE Web Browsers... 5 Camera Settings... 6 System... 6 About... 6 PT Setting... 7 Backup and Restore Setup... 8 NTP Setting... 8 System
The Visual Internet of Things System Based on Depth Camera
The Visual Internet of Things System Based on Depth Camera Xucong Zhang 1, Xiaoyun Wang and Yingmin Jia Abstract The Visual Internet of Things is an important part of information technology. It is proposed
Real-Time Background Estimation of Traffic Imagery Using Group-Based Histogram *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 411-423 (2008) Real-Time Background Estimation of Traffic Imagery Using Group-Based Histogram KAI-TAI SONG AND JEN-CHAO TAI + Department of Electrical
Single Transistor FM Transmitter Design
Single Transistor FM Transmitter Design In telecommunications, frequency modulation (FM) conveys information over a carrier wave by varying its frequency. FM is commonly used at VHF radio frequencies for
Automatic Detection of PCB Defects
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 6 November 2014 ISSN (online): 2349-6010 Automatic Detection of PCB Defects Ashish Singh PG Student Vimal H.
Megapixel PoE Day / Night Internet Camera TV-IP572PI (v1.0r)
(v1.0r) PRODUCT OVERVIEW The Megapixel PoE Day / Night Internet Camera, model TV- IP572PI, transmits real-time Megapixel video over the Internet. Record crisp video in complete darkness for distances of
Power surges can also be generated by equipment in your facility such as:
Power Quality Surge Suppressors What is Surge Protection A surge suppressor can be the first and best defense against the instant or gradual destruction of electrical equipment. Compared to the replacement
Nagpur, Maharashtra, India
Volume 6, Issue 2, February 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Automated Door
Application and Instruction Manual Motion Activated Solar Powered LED Security Light with Camera MODEL: XP-2H38WC
Application and Instruction Manual Motion Activated Solar Powered LED Security Light with Camera MODEL: XP-2H38WC Please do not return this item to the store. If you have any questions, please contact
Video compression: Performance of available codec software
Video compression: Performance of available codec software Introduction. Digital Video A digital video is a collection of images presented sequentially to produce the effect of continuous motion. It takes
An Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network
Proceedings of the 8th WSEAS Int. Conf. on ARTIFICIAL INTELLIGENCE, KNOWLEDGE ENGINEERING & DATA BASES (AIKED '9) ISSN: 179-519 435 ISBN: 978-96-474-51-2 An Energy-Based Vehicle Tracking System using Principal
Wires & Connections Component Circuit Symbol Function of Component. Power Supplies Component Circuit Symbol Function of Component
Lista Dei Simboli Dei Circuiti Per i Componenti Elettronici Wires & Connections Wire Wires joined Wires not joined To pass current very easily from one part of a circuit to another. A 'blob' should be
Live Streaming Motion Detection Camera Security System with Email Notification using Raspberry Pi
Live Streaming Motion Detection Camera Security System with Email Notification using Raspberry Pi Angela Antony 1, Prof. G. R. Gidveer 2 1,2( Dept. Electronics and Telecommunication, MGM s Jawaharlal Nehru
AN1200.04. Application Note: FCC Regulations for ISM Band Devices: 902-928 MHz. FCC Regulations for ISM Band Devices: 902-928 MHz
AN1200.04 Application Note: FCC Regulations for ISM Band Devices: Copyright Semtech 2006 1 of 15 www.semtech.com 1 Table of Contents 1 Table of Contents...2 1.1 Index of Figures...2 1.2 Index of Tables...2
FREQUENCY RESPONSE OF AN AUDIO AMPLIFIER
2014 Amplifier - 1 FREQUENCY RESPONSE OF AN AUDIO AMPLIFIER The objectives of this experiment are: To understand the concept of HI-FI audio equipment To generate a frequency response curve for an audio
Study on Differential Protection of Transmission Line Using Wireless Communication
Study on Differential Protection of Transmission Line Using Wireless Communication George John.P 1, Agna Prince 2, Akhila.K.K 3, Guy Marcel 4, Harikrishnan.P 5 Professor, Dept. of EEE, MA Engineering College,
Sending A/V Signals Over Twisted Pair Cables: An Introduction. What is A/V over twisted pair?... 2
Sending A/V Signals Over Twisted Pair s: An Introduction Table of Contents What is A/V over twisted pair?... 2 What can be accommodated with A/V over twisted pair?... 3 What applications can effectively
Ultrasound Distance Measurement
Final Project Report E3390 Electronic Circuits Design Lab Ultrasound Distance Measurement Yiting Feng Izel Niyage Asif Quyyum Submitted in partial fulfillment of the requirements for the Bachelor of Science
Motion Activated Camera User Manual
Brinno MAC200 User Manual Last Modified on 12/23/2015 7:51 pm EST Motion Activated Camera User Manual www.brinno.com Register@online http://www.brinno.com/support/register.html contact us: [email protected]
AN588 ENERGY HARVESTING REFERENCE DESIGN USER S GUIDE. 1. Kit Contents. 2. Introduction. Figure 1. Energy Harvesting Sensor Node
ENERGY HARVESTING REFERENCE DESIGN USER S GUIDE 1. Kit Contents The RF to USB Reference Design contains the following items: Si1012 Energy Harvesting Wireless Sensor Node EZRadioPRO USB Dongle ToolStick
Radio sensor powered by a mini solar cell the EnOcean STM 110 now functions with even less light
Radio sensor powered by a mini solar cell the EnOcean STM 110 now functions with even less light In this issue, we would like to present the EnOcean radio sensor module STM 110 in more detail. The module
UNDERSTANDING POWER FACTOR AND INPUT CURRENT HARMONICS IN SWITCHED MODE POWER SUPPLIES
UNDERSTANDING POWER FACTOR AND INPUT CURRENT HARMONICS IN SWITCHED MODE POWER SUPPLIES WHITE PAPER: TW0062 36 Newburgh Road Hackettstown, NJ 07840 Feb 2009 Alan Gobbi About the Author Alan Gobbi Alan Gobbi
Speed Performance Improvement of Vehicle Blob Tracking System
Speed Performance Improvement of Vehicle Blob Tracking System Sung Chun Lee and Ram Nevatia University of Southern California, Los Angeles, CA 90089, USA [email protected], [email protected] Abstract. A speed
Video in Logger Pro. There are many ways to create and use video clips and still images in Logger Pro.
Video in Logger Pro There are many ways to create and use video clips and still images in Logger Pro. Insert an existing video clip into a Logger Pro experiment. Supported file formats include.avi and.mov.
Wireless Day / Night Cloud Camera TV-IP751WIC (v1.0r)
(v1.0r) TRENDnet s Wireless Day / Night Cloud Camera, model, takes the work out of viewing video over the internet. Previously to view video remotely, users needed to perform many complicated and time
AxxonSoft Inc. Axxon Smart. Quick Start Guide. AxxonSoft. The. Axxon Smart. Software Package. Quick Start Guide. Version 1.0
AxxonSoft The Axxon Smart Software Package Quick Start Guide Version 1.0 Moscow 2010 1 Contents CONTENTS... 2 1 INTRODUCTION... 3 1.1 Document purpose... 3 1.2 Purpose of the Axxon Smart software package...
Efficient Background Subtraction and Shadow Removal Technique for Multiple Human object Tracking
ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Efficient
User Manual Wireless HD AV Transmitter & Receiver Kit
Ma User Manual REV.1.0 Thank you for purchasing this. Please read the following instructions carefully for your safety and prevention of property damage. Do not use the product in the extreme hot, cold,
Keywords RFID READER, FPGA, GSM.
Volume 5, Issue 2, February 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com FPGA Based
AM TRANSMITTERS & RECEIVERS
Reading 30 Ron Bertrand VK2DQ http://www.radioelectronicschool.com AM TRANSMITTERS & RECEIVERS Revision: our definition of amplitude modulation. Amplitude modulation is when the modulating audio is combined
The Shift to Wireless Data Communication
The Shift to Wireless Data Communication Choosing a Cellular Solution for Connecting Devices to a WWAN Dana Lee, Senior Product Manager [email protected] Recent developments in the wireless and industrial
Beyond Built-in: Why a Better Webcam Matters
Whitepaper: Beyond Built-in: Why a Better Webcam Matters How to Uplevel Your Ability to Connect, Communicate and Collaborate Using Your Laptop or PC Introduction The ability to virtually communicate and
SAMPLE CHAPTERS UNESCO EOLSS DIGITAL INSTRUMENTS. García J. and García D.F. University of Oviedo, Spain
DIGITAL INSTRUMENTS García J. and García D.F. University of Oviedo, Spain Keywords: analog-to-digital conversion, digital-to-analog conversion, data-acquisition systems, signal acquisition, signal conditioning,
Enhanced In-house Voice Communication over Power- Line Network
International Journal of Scientific and Research Publications, Volume 3, Issue 7, July 2013 1 Enhanced In-house Voice Communication over Power- Line Network Asif Hassan Senior Lecturer, Dept. of ECE, HMSIT,
Feasibility Study of Implementation of Cell Phone Controlled, Password Protected Door Locking System
Feasibility Study of Implementation of Cell Phone Controlled, Password Protected Door Locking System Ashish Jadhav 1, Mahesh Kumbhar 2, Mahesh Walunjkar 3 Lecturer, Dept. of Electronics and Telecommunication,
Low-resolution Image Processing based on FPGA
Abstract Research Journal of Recent Sciences ISSN 2277-2502. Low-resolution Image Processing based on FPGA Mahshid Aghania Kiau, Islamic Azad university of Karaj, IRAN Available online at: www.isca.in,
Real Time Target Tracking with Pan Tilt Zoom Camera
2009 Digital Image Computing: Techniques and Applications Real Time Target Tracking with Pan Tilt Zoom Camera Pankaj Kumar, Anthony Dick School of Computer Science The University of Adelaide Adelaide,
Image Processing Based Automatic Visual Inspection System for PCBs
IOSR Journal of Engineering (IOSRJEN) ISSN: 2250-3021 Volume 2, Issue 6 (June 2012), PP 1451-1455 www.iosrjen.org Image Processing Based Automatic Visual Inspection System for PCBs Sanveer Singh 1, Manu
International Journal of Advancements in Research & Technology, Volume 2, Issue 5, M ay-2013 331 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 2, Issue 5, M ay-2013 331 An Integrated Real-Time Vision Based Home Security System Qusay Idrees Sarhan Department of Computer Sciences,
