Smart Inventory System for Expiry Date Tracking
Volume-7 | Issue-2

Classification of Remote Sensing Image Scenes Using Double Feature Extraction Hybrid Deep Learning Approach
Volume-3 | Issue-2

Light Weight CNN based Robust Image Watermarking Scheme for Security
Volume-3 | Issue-2

Survey: Unconventional Categories of Chatbots that make use of Machine Learning Techniques
Volume-5 | Issue-3

AI based Identification of Students Dress Code in Schools and Universities
Volume-6 | Issue-1

Principle of 6G Wireless Networks: Vision, Challenges and Applications
Volume-3 | Issue-4

PROGRESS AND PRECLUSION OF KNEE OSTEOARTHRITIS: A STUDY
Volume-3 | Issue-3

Getis-Ord (Gi*) based Farmer Suicide Hotspot Detection
Volume-4 | Issue-2

Ground-breaking Theory of Knowledge Representation Practices for Information Sharing in IT Organization
Volume-4 | Issue-3

Is Internet becoming a Major Contributor for Global warming - The Online Carbon Footprint
Volume-2 | Issue-4

AUTOMATION USING IOT IN GREENHOUSE ENVIRONMENT
Volume-1 | Issue-1

Principle of 6G Wireless Networks: Vision, Challenges and Applications
Volume-3 | Issue-4

Classification of Remote Sensing Image Scenes Using Double Feature Extraction Hybrid Deep Learning Approach
Volume-3 | Issue-2

Light Weight CNN based Robust Image Watermarking Scheme for Security
Volume-3 | Issue-2

VIRTUAL REALITY GAMING TECHNOLOGY FOR MENTAL STIMULATION AND THERAPY
Volume-1 | Issue-1

Design of Digital Image Watermarking Technique with Two Stage Vector Extraction in Transform Domain
Volume-3 | Issue-3

Analysis of Natural Language Processing in the FinTech Models of Mid-21st Century
Volume-4 | Issue-3

PROGRESS AND PRECLUSION OF KNEE OSTEOARTHRITIS: A STUDY
Volume-3 | Issue-3

Image Augmentation based on GAN deep learning approach with Textual Content Descriptors
Volume-3 | Issue-3

Comparative Analysis for Personality Prediction by Digital Footprints in Social Media
Volume-3 | Issue-2

Home / Archives / Volume-2 / Issue-1 / Article-6

Volume - 2 | Issue - 1 | march 2020

Smart Security System for Suspicious Activity Detection in Volatile Areas
Pages: 64-72
DOI
10.36548/jitdw.2020.1.006
Published
March, 2020
Abstract

The latest progress in the technology has led to automation and digitization in almost every fields, and has influenced a wide scope of application. This has caused enormous amount of data flow from each sectors, where the information contained in the data acts as the important component for the progress of the single person, organization, state, country and so on. These data with valuable information can be used in the constructive and the destructive perceptive based on the hands that handle it. So protective measures become very essential for preserving the data from unwanted access. This paves for developing a system to identify the suspicious movement in the volatile areas like military regimes, hospitals and financial organizations to safe the data. The method put forward in the paper incorporates the motion sensors and the face identification system to detect the suspicious activities and report to the lawful person. The algorithm for the system was developed using the python and tested for various sets of exemplary real time video recordings to know the accuracy in the detection.

Keywords

Smart Security Suspicious Activity Volatile Areas Motion Sensors Facial Identification

×

Currently, subscription is the only source of revenue. The subscription resource covers the operating expenses such as web presence, online version, pre-press preparations, and staff wages.

To access the full PDF, please complete the payment process.

Subscription Details

Category Fee
Article Access Charge
15 USD
Open Access Fee Nil
Annual Subscription Fee
200 USD
After payment,
please send an email to irojournals.contact@gmail.com / journals@iroglobal.com requesting article access.
Subscription form: click here