Book ChapterDOI
Machine Learning Technique for Automatic Intruder Identification and Alerting
B. K. Uday,Anirudh Vattikuti,Kailash Gogineni,P. Natarajan +3 more
- pp 449-455
Reads0
Chats0
TLDR
This paper discusses different ways to identify the intruder and alert owner/administrator in different possible ways such as “a message (SMS), WhatsApp message, location of intruder, “an immediate call”, and “intruder’s image to owner’SMS and WhatsApp” to alert owner-administrator.Abstract:
Security has become an important factor. Intruders have become prominent factors for all the data/property theft. The basic idea in this paper is to identify the intruder and alert owner/administrator in different possible ways. This paper discusses different ways such as “a message (SMS)”, “WhatsApp message”, “location of intruder”, “an immediate call”, and “intruder’s image to owner’s/administrator’s WhatsApp” to alert owner/administrator. For identifying the intruder, machine learning algorithm is used. A camera placed at the locality is trained such that it can identify the familiar people and it is “on” all the time. Whenever an unknown/unidentified person comes to the vicinity of the camera, all the above-said features get activated and the owner gets alerted. The idea can be applied in many real-life situations, like thief identification near the house.read more
Citations
More filters
Book ChapterDOI
Intruder Detection and Tracking Using Computer Vision and IoT
TL;DR: In this article , the authors proposed an autonomous intruder detection and tracking system, which consists of an indoor unit and an outdoor unit, and these two units communicate with each other using TCP/IP sockets.
Proceedings ArticleDOI
Planning strategy for intruder agent based on game theory and artificial potential field
TL;DR: Wang et al. as discussed by the authors proposed a planner based on game theory and artificial potential field (APF) that enables intruder to confront defender in 2D environment, where the intruder would compute the mixed strategy approximate Nash equilibrium in the space of agent APF trajectory to maximally approach the target region while evading the pursuit of defender.
References
More filters
Proceedings ArticleDOI
FaceNet: A unified embedding for face recognition and clustering
TL;DR: A system that directly learns a mapping from face images to a compact Euclidean space where distances directly correspond to a measure offace similarity, and achieves state-of-the-art face recognition performance using only 128-bytes perface.
Journal ArticleDOI
Face Description with Local Binary Patterns: Application to Face Recognition
TL;DR: This paper presents a novel and efficient facial image representation based on local binary pattern (LBP) texture features that is assessed in the face recognition problem under different challenges.
Proceedings ArticleDOI
FaceNet: A Unified Embedding for Face Recognition and Clustering
TL;DR: FaceNet as discussed by the authors uses a deep convolutional network trained to directly optimize the embedding itself, rather than an intermediate bottleneck layer as in previous deep learning approaches, and achieves state-of-the-art face recognition performance using only 128 bytes per face.
Proceedings ArticleDOI
Face recognition using Eigenfaces
TL;DR: The paper presents a methodology for face recognition based on information theory approach of coding and decoding the face image using Principle Component Analysis and recognition using the feed forward back propagation Neural Network.
Journal ArticleDOI
Robust Face Recognition via Multimodal Deep Face Representation
Changxing Ding,Dacheng Tao +1 more
TL;DR: Wang et al. as discussed by the authors proposed a deep learning structure composed of a set of elaborately designed convolutional neural networks (CNNs) and a three-layer stacked auto-encoder (SAE).