Open Access   Article Go Back

Automation of Security System Using Machine Learning

Sam Sebastian1 , Dipin S Nair2 , Aiswarya B Nair3 , Jeswin Elza Varghese4 , Sithu Ubaid5

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-5 , Page no. 1756-1761, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i5.17561761

Online published on May 31, 2019

Copyright © Sam Sebastian, Dipin S Nair, Aiswarya B Nair, Jeswin Elza Varghese, Sithu Ubaid . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sam Sebastian, Dipin S Nair, Aiswarya B Nair, Jeswin Elza Varghese, Sithu Ubaid, “Automation of Security System Using Machine Learning,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1756-1761, 2019.

MLA Style Citation: Sam Sebastian, Dipin S Nair, Aiswarya B Nair, Jeswin Elza Varghese, Sithu Ubaid "Automation of Security System Using Machine Learning." International Journal of Computer Sciences and Engineering 7.5 (2019): 1756-1761.

APA Style Citation: Sam Sebastian, Dipin S Nair, Aiswarya B Nair, Jeswin Elza Varghese, Sithu Ubaid, (2019). Automation of Security System Using Machine Learning. International Journal of Computer Sciences and Engineering, 7(5), 1756-1761.

BibTex Style Citation:
@article{Sebastian_2019,
author = {Sam Sebastian, Dipin S Nair, Aiswarya B Nair, Jeswin Elza Varghese, Sithu Ubaid},
title = {Automation of Security System Using Machine Learning},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {1756-1761},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4485},
doi = {https://doi.org/10.26438/ijcse/v7i5.17561761}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.17561761}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4485
TI - Automation of Security System Using Machine Learning
T2 - International Journal of Computer Sciences and Engineering
AU - Sam Sebastian, Dipin S Nair, Aiswarya B Nair, Jeswin Elza Varghese, Sithu Ubaid
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 1756-1761
IS - 5
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
296 177 downloads 144 downloads
  
  
           

Abstract

This project mainly focuses on controlling and securing our home or office using machine learning technology. In this system we are implementing a system to monitor our home or office using a security camera system. Most thefts are done in the night and most of the times thieves cover their face during the theft time. So even though the home and office have those security camera systems, we are unable to identify the thief. In this project we use the machine learning technology in the security camera. It identifies each and every object in the visuals by real time. Whenever it identifies a person in the night, the system will send message to the concerned admin and nearby police station. Alarm will be produced as it automatically sends signal to our automation system. This system has the ability to identify the person, animals and all other objects. So system won’t work when it identify an animal in the night.

Key-Words / Index Term

Machine Learning technology, Security Camera, Identify

References

[1] Bejammin Danielsson, “Real-time object detection and identification Using machine learning, training a model from a pretrained checkpoint”.
[2] Human Motion Detection and Tracking for Real-Time Security System Pavithra ,Mahanthesh, Stafford Michahial1, Dr. M Shivakumar Asst. Professor, Department of IT1 Prof & Head, Department of ITI. International Journal of Advanced Research in Computer and Communication Engineering ISO 3297:2007 Certified Vol. 5, Issue 12, December 2016.
[3] Nwalozie G. C, Aniedu A. N, Nwokoye C. S, Abazuonu I.E “SMS Based Intruder Detection System” IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1177 – 1184.
[4] Jorge Garcia, Alfredo Garden, Ignacio Bravo, Jose Luis Lazar and Miguel Martinez, (2013).“Tracking People Motion Based Extended Condensation .Algorithm, ”IEEE Trans.Syst.,Man,Cybern. A, Syst., vol. 43, No. 3, May.
[5] Y.-L. Hou and G. K. H. Pang, (2011).“People counting and human detection in a challenging situation,” IEEE Trans. Syst., Man, Cybern. A, Syst., Humans,vol. 41, no. 1, pp. 24-33, Jan.
[6] X. Zhao, E. Delleandrea, and L. Chen, (2009).“A people counting system based on face detection and tracking in a video,” in Proc. IEEE Int. Conf. AVSS, pp. 67-72.
[7] Xiaowei Zhou, Can Yang, and Weichuan Yu, (2013). “Moving Object Detection by Detecting Contiguous Outliers in the LowRank Representation” IEEE Trans.
[8] Shi-qi Xing, Yong-zhen Li, Da-hai Dai, XueSongWang,(2012).“Three-Dimensional Reconstruction of ManMade Objects Using Polarimetric Tomographic SAR”, IEEE Trans. Vol. 51, Issue: 6 Journal on Geoscience and Remote Sensing.
[9] Liyuan Li, Weimin HuangIreneYu-Hua Gu, and. QiTian, (2004). “Statistical Modelling of Complex Backgroundsfor Foreground Object Detection” IEEE Transon Image Processing, Vol. 13, NO. 11
[10] Weiming Hu, Xue Zhou, Wei Li, WenhanLuo, Xiaoqin Zhang, and Stephen Maybank,(2013).“Active Contour-Based VisualTracking by Integrating Colors, Shapes ,and Motions Image Processing”, IEEETrans.onImageProcessing,Vol.22
[11] .Hsu-Yung Cheng, Chih-Chia Weng, Yi-Ying Chen, (2012). “Vehicle Detection in Aerial Surveillance Using Dynamic Bayesian Networks”, IEEE Trans on Image Processing, Vol.21, Issue:4.
[12] Pushe Zhao, Hongbo Zhu, He Li, and Tadashi Shibata, (2013). “A Directional-Edge-Based Real-Time Object Tracking System Employing Multiple Candidate-Location Generation” IEEE Trans.vol. 23,no. 3, Mar.
[13] Wang. H and Suter.D, (2006). “A Novel Robust Statistical Method for Background Initialization and Visual Surveillance” Proc. Asian Conf. Computer Vision.