Online Submission!

Open Journal Systems


D KeranaHanirex, Anu Kumari Pratibha


The security of one\'s belongings once an individual leaves his/her home is invariably a priority with increasing range of incidents of thieving, theft etc. several automatic systems has been developed that informs the owner in a very remote location concerning any intrusion or arrange to intrude within the house. 8051 has been extensively employed in past comes. However, this paper appearance into the event of associate humanoid application that interprets the message a mobile device receives on attainable intrusion associated afterwards a reply (Short Message Service) SMS that triggers an alarm/buzzer within the remote house creating others awake to the attainable intrusion.In the EXISTING SYSTEM M2M style used computer as terminal User rather than microcontroller. AT commands, a decrypt module that decodes the text message. In planned SYSTEM, Home Security is enforced. If any interrupt happens, instantly it\'s detected and controller communicates to the humanoid Phone via SMS. The system can watch for the reply from the mobile user for a few amount of your time to trigger the buzzer, if there was no reply then system can mechanically trigger buzzer. within the MODIFICATION section of the project, digital camera is connected to trace the Person and therefore the image is hold on within the server, so humanoid user will see the photographs from their mobile.

Full Text:



A. Elgammal, D. Harwood, and L. Davis, “Non-Parametric Model for Background Subtraction,” Proc.European Conf. laptop Vision, pp. 751-767, June 2000.1022 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 34, NO. 5, MAY 2012

C. Stauffer and W.E.L. Grimson, “Learning Patterns of Activity victimisation Real- Time chase,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 22, no. 8, pp. 747-757, Aug. 2000.

B. Han, D. Comaniciu, and L. Davis, “Sequential Kernel Density Approximation through Mode Propagation: Applications to Background Modeling,” Proc. Asian Conf. laptop Vision, 2004.

D.S. Lee, “Effective mathematician Mixture Learning for Video BackgroundSubtraction,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 27,no. 5, pp. 827-832, May 2005.

Z. Zivkovic and F. van der Heijden, “Efficient adaptative Density EstimationPer Image element for Task of Background Subtraction,” Pattern RecognitionLetters, vol. 27, no. 7, pp. 773-780, 2006.

P. Viola and M. Jones, “Rapid Object Detection employing a Boosted Cascade ofSimple options,” Proc. IEEE Conf. laptop Vision and Pattern Recognition,pp. 511-518, 2001.

B. Han, D. Comaniciu, Y. Zhu, and L.S. Davis, “Sequential Kernel DensityApproximation and Its Application to period Visual chase,” IEEETrans. Pattern Analysis and Machine Intelligence, vol. 30, no. 7, pp. 1186-1197,July 2008.

B. Han and L.S. Davis, “Adaptive Background Modeling and Subtraction:A Density-Based Approach with Multiple Features” Intelligent VideoSurveillance Systems and Technology, Y. Ma and G. Qian eds., Ch. 4, pp. 79-103, CRC Press, 2010.

I. Haritaoglu, D. Harwood, and L.S. Davis, “W4: period police investigation ofPeople and Their Activities,” IEEE Trans. Pattern Analysis and MachineIntelligence, vol. 22, no. 8, pp. 809-830, Aug. 2000.

K. Kim, T.H. Chalidabhongse, D. Harwood, and L. Davis, “Real-TimeForeground-Background Segmentation victimisation Codebook Model,” periodImaging, vol. 11, no. 3, pp. 172-185, 2005.



  • There are currently no refbacks.

Copyright (c) 2015 COMPUSOFT "An International Journal of Advanced Computer Technology"