scispace - formally typeset
Book ChapterDOI

Machine Learning Technique for Automatic Intruder Identification and Alerting

Reads0
Chats0
TLDR
This paper discusses different ways to identify the intruder and alert owner/administrator in different possible ways such as “a message (SMS), WhatsApp message, location of intruder, “an immediate call”, and “intruder’s image to owner’SMS and WhatsApp” to alert owner-administrator.
Abstract
Security has become an important factor. Intruders have become prominent factors for all the data/property theft. The basic idea in this paper is to identify the intruder and alert owner/administrator in different possible ways. This paper discusses different ways such as “a message (SMS)”, “WhatsApp message”, “location of intruder”, “an immediate call”, and “intruder’s image to owner’s/administrator’s WhatsApp” to alert owner/administrator. For identifying the intruder, machine learning algorithm is used. A camera placed at the locality is trained such that it can identify the familiar people and it is “on” all the time. Whenever an unknown/unidentified person comes to the vicinity of the camera, all the above-said features get activated and the owner gets alerted. The idea can be applied in many real-life situations, like thief identification near the house.

read more

Citations
More filters
Book ChapterDOI

Intruder Detection and Tracking Using Computer Vision and IoT

Chengchen Mao
TL;DR: In this article , the authors proposed an autonomous intruder detection and tracking system, which consists of an indoor unit and an outdoor unit, and these two units communicate with each other using TCP/IP sockets.
Proceedings ArticleDOI

Planning strategy for intruder agent based on game theory and artificial potential field

TL;DR: Wang et al. as discussed by the authors proposed a planner based on game theory and artificial potential field (APF) that enables intruder to confront defender in 2D environment, where the intruder would compute the mixed strategy approximate Nash equilibrium in the space of agent APF trajectory to maximally approach the target region while evading the pursuit of defender.
References
More filters
Proceedings ArticleDOI

FaceNet: A unified embedding for face recognition and clustering

TL;DR: A system that directly learns a mapping from face images to a compact Euclidean space where distances directly correspond to a measure offace similarity, and achieves state-of-the-art face recognition performance using only 128-bytes perface.
Journal ArticleDOI

Face Description with Local Binary Patterns: Application to Face Recognition

TL;DR: This paper presents a novel and efficient facial image representation based on local binary pattern (LBP) texture features that is assessed in the face recognition problem under different challenges.
Proceedings ArticleDOI

FaceNet: A Unified Embedding for Face Recognition and Clustering

TL;DR: FaceNet as discussed by the authors uses a deep convolutional network trained to directly optimize the embedding itself, rather than an intermediate bottleneck layer as in previous deep learning approaches, and achieves state-of-the-art face recognition performance using only 128 bytes per face.
Proceedings ArticleDOI

Face recognition using Eigenfaces

TL;DR: The paper presents a methodology for face recognition based on information theory approach of coding and decoding the face image using Principle Component Analysis and recognition using the feed forward back propagation Neural Network.
Journal ArticleDOI

Robust Face Recognition via Multimodal Deep Face Representation

TL;DR: Wang et al. as discussed by the authors proposed a deep learning structure composed of a set of elaborately designed convolutional neural networks (CNNs) and a three-layer stacked auto-encoder (SAE).