Security Monitoring Intelligence System Using IoT

Authors

  • Roshan Shinde Student, Department of Computer Science & Engineering, Pillai HOC College of Engineering and Technology Khalapur, HOC Colony Rd, Taluka, Rasayani, Maharashtra, India
  • Anushka Gurbe Student, Department of Computer Science & Engineering, Pillai HOC College of Engineering and Technology Khalapur, HOC Colony Rd, Taluka, Rasayani, Maharashtra, India
  • Shruti Walunj Student, Department of Computer Science & Engineering, Pillai HOC College of Engineering and Technology Khalapur, HOC Colony Rd, Taluka, Rasayani, Maharashtra, India
  • Archana Augustine Assistant Professor, Department of Computer Science & Engineering, Pillai HOC College of Engineering and Technology Khalapur, HOC Colony Rd, Taluka, Rasayani, Maharashtra, India

Keywords:

SMIS, CCTV, Surveillance, Night Vision Camera, Suspicious Activity, Mailbox

Abstract

The main objective of the Security Monitoring Intelligence System (SMIS) is to provide security for human beings and to people under dangerous circumstances wherever immediate help is required. CCTV surveillance is provided everywhere, but its disadvantage is that we do not have night vision cameras so we cannot get a hold of what is really happening there and so we cannot judge. We are providing a night vision camera which will help to get a clear picture of the entire situation happening around the person in danger. We are also making use of suspicious activities for training the model, with the use of which the model will identify all the suspicious activities and send the message on the owner's mailbox.

References

Martin Joel Rathnam, Abhirami Das, et al. Intelligent Surveillance And Night Patrolling Using Drone Camera. Int Res J Eng Technol (IRJET). 2021; 8(Spl Issue): 13–16.

Loganathan S, Kariyawasam G, Sumathipala P. Suspicious activity detection in surveillance footage. In 2019 IEEE International Conference on Electrical and Computing technologies and applications (ICECTA). 2019 Nov 19; 1–4.

Thudumu S, Branch P, Jin J, Singh J. A comprehensive survey of anomaly detection techniques for high dimensional big data. J Big Data. 2020 Dec; 7: 1–30.

Dudek D, Haas C, Kuntz A, Zitterbart M, Krüger D, Rothenpieler P, Pfisterer D, Fischer S. A wireless sensor network for border surveillance. In Proceedings of the 7th ACM conference on embedded networked sensor systems. 2009 Nov 4; 303–304.

Amrutha CV, Jyotsna C, Amudha J. Deep learning approach for suspicious activity detection from surveillance video. In 2020 IEEE 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA). 2020 Mar 5; 335–339.

Bointon P. Mechanical design and dynamic performance characterisation for non-contact form measurement systems. Doctoral dissertation, University of Nottingham; 2020.

Akshay Agarwal, Swapnil Galhate, et al. Suspicious Activity Detection through CCTV. Int J Res Eng Appl Manag (IJREAM). 2020; 5(12): 301–304.

Vigneshwaran K, Yagneshwaran K, et al. Fabrication and operation of UAV for rehabilitation and repair. Int Res J Mod Eng Technol Sci. 2022; 4(6): 1928–1931.

Geuze J, van Gerven MA, Farquhar J, Desain P. Detecting semantic priming at the single-trial level. PloS One. 2013 Apr 2; 8(4): e60377.

Avi Networks. (2023). What is Anomaly Detection? Definition & FAQs. [Online]. Avi Networks. Available from: https://avinetworks.com/glossary/anomaly-detection/

Wikibooks. (2020). Practical DevOps for Big Data/Related Work. [Online]. Wikibooks, open books for an open world. Available from: https://en.wikibooks.org/wiki/Practical_DevOps_ for_Big_Data/

Downloads

Published

2023-05-02