Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.
dc.contributor.author | Saleem, Muhammad Zeeshan Reg # 41228 | |
dc.contributor.author | Aamir, Sarosh Reg # 41232 | |
dc.contributor.author | Shahid, Faraz Reg # 41213 | |
dc.contributor.author | Munawar, Hafsa Reg # 41214 | |
dc.contributor.author | Maaz, Muhammad Reg # 41225 | |
dc.date.accessioned | 2019-08-08T05:02:53Z | |
dc.date.available | 2019-08-08T05:02:53Z | |
dc.date.issued | 2019 | |
dc.identifier.uri | http://hdl.handle.net/123456789/8905 | |
dc.description | Supervised by Dr. Ghulam Muhammad Shaikh | en_US |
dc.description.abstract | The project’s objective is to develop a theft detection system based recognition. The system would detect faces though a camera, process the faces and decide whether the face belongs to an authorized entity or not. If the person i authorized to enter the room/area, the system would send an SMS to the authorized on facial is not person through GSM module, and the authorized person would be able to surveillance the area using an Android application in real time though internet an internet connection. Different techniques that are used for recognition of faces are explored in this report. All of the different stages that are involved in the entire image processing stage will be studied and discussed. Finally the algorithm coded implemented in the Raspberry Pie module. in python The report discusses the methods used for the completion of the project and the flow of the system. The report goes into detail about various stages in image processing about what methodology is used for facial detection, and then recognition. The report discusses how Har Cascade Classifiers are used for facial detection and LBPH for recognition with details of their working. And how SMS are sent using AT commands in python and how all the different applications are created for surveillance. The report focuses on details on how the different modules brought together and integrated are for the completion of the project. | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | Bahria University Karachi Campus | en_US |
dc.relation.ispartofseries | BS (IT);MFN 09 | |
dc.title | INTERNET OF THINGS PROVEN SECURITY MECHANISM USING PERSON IDENTIFICATION | en_US |
dc.type | Thesis | en_US |