Android Based Human Monitoring and Image Tracking with SMS Alert

Authors

  • KeranaHanirex D Department of Computer Science, Bharath University
  • Abhay A Department of Computer Science, Bharath University
  • Pratibha AK Department of Computer Science, Bharath University

Keywords:

Short Message Service, Android Application, M2M Design, Video police investigation

Abstract

The security of one\'s belongings once an individual leaves his/her home is invariably a priority with increasing range of incidents of thieving, theft etc. several automatic systems has been developed that informs the owner in a very remote location concerning any intrusion or arrange to intrude within the house. 8051 has been extensively employed in past comes. However, this paper appearance into the event of associate humanoid application that interprets the message a mobile device receives on attainable intrusion associated afterwards a reply (Short Message Service) SMS that triggers an alarm/buzzer within the remote house creating others awake to the attainable intrusion.In the EXISTING SYSTEM M2M style used computer as terminal User rather than microcontroller. AT commands, a decrypt module that decodes the text message. In planned SYSTEM, Home Security is enforced. If any interrupt happens, instantly it\'s detected and controller communicates to the humanoid Phone via SMS. The system can watch for the reply from the mobile user for a few amount of your time to trigger the buzzer, if there was no reply then system can mechanically trigger buzzer. within the MODIFICATION section of the project, digital camera is connected to trace the Person and therefore the image is hold on within the server, so humanoid user will see the photographs from their mobile.

References

A. Elgammal, D. Harwood, and L. Davis, “Non-Parametric Model for Background Subtraction,” Proc.European Conf. laptop Vision,

pp. 751-767, June 2000.1022 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 34, NO. 5, MAY 2012

C. Stauffer and W.E.L. Grimson, “Learning Patterns of Activity victimisation Real- Time chase,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 22, no. 8, pp. 747-757, Aug. 2000.

B. Han, D. Comaniciu, and L. Davis, “Sequential Kernel Density Approximation through Mode Propagation: Applications to Background Modeling,” Proc. Asian Conf. laptop Vision, 2004.

D.S. Lee, “Effective mathematician Mixture Learning for Video BackgroundSubtraction,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 27,no. 5, pp. 827-832, May 2005.

Z. Zivkovic and F. van der Heijden, “Efficient adaptative Density EstimationPer Image element for Task of Background Subtraction,” Pattern

Recognition Letters, vol. 27, no. 7, pp. 773-780, 2006.

P. Viola and M. Jones, “Rapid Object Detection employing a Boosted Cascade ofSimple options,” Proc. IEEE Conf. laptop Vision and Pattern Recognition,pp. 511-518, 2001.

B. Han, D. Comaniciu, Y. Zhu, and L.S. Davis, “Sequential Kernel DensityApproximation and Its Application to period Visual chase,” IEEETrans.

Pattern Analysis and Machine Intelligence, vol. 30, no. 7, pp. 1186-1197,July 2008.

B. Han and L.S. Davis, “Adaptive Background Modeling and Subtraction:A Density-Based Approach with Multiple Features” Intelligent VideoSurveillance Systems and Technology, Y. Ma and G. Qian eds., Ch. 4, pp. 79-103, CRC Press, 2010.

I. Haritaoglu, D. Harwood, and L.S. Davis, “W4: period police investigation of People and Their Activities,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 22, no. 8, pp. 809-830, Aug. 2000.

K. Kim, T.H. Chalidabhongse, D. Harwood, and L. Davis, “Real-TimeForeground-Background Segmentation victimisation Codebook Model,”

periodImaging, vol. 11, no. 3, pp. 172-185, 2005.

Downloads

Published

2024-02-26

How to Cite

KeranaHanirex, D., Abhay, A., & Pratibha, A. K. (2024). Android Based Human Monitoring and Image Tracking with SMS Alert. COMPUSOFT: An International Journal of Advanced Computer Technology, 4(04), 1646–1649. Retrieved from https://ijact.in/index.php/j/article/view/289

Issue

Section

Original Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.