NPPT

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 21

Index

 Introduction
 Advantages
 Problem Statement
 Applications
 Motivation
 Conclusion
 Literature Survey
 Reference
 Mathematical Model

 System Architecture

 Proposed System

 Algorithm

 UML Diagrams
2
Introduction

 There is an abnormal increase in the crime rate and also the number of
criminals are increasing, this leads towards a great concern about the
security issues.

 Crime preventions and criminal identification are the primary issues


before the police personnel, since property and lives protection are the
basic concerns of the police but to combat the crime, the availability of
police personnel is limited

 This Real time criminal identification system based on face recognition


works with a fully automated facial recognition system.
Problem Statement

To develop an web application which will serve a way to register


and track criminals remotely with the help of criminal data. This
application provides two ways to identify criminals. One is by manually
providing the photos of criminal and the other way is by using live
cameras

Project Title March 16, 5


2024
Motivation

As the crime rate has been increasing year after year, it has
become increasingly difficult for police to be able to monitor and
respond to situations immediately because of the extensive load upon
them. With the exponential growth in technology in recent years, we
need to work on a solution for this. Artificial intelligence (AI) and
blockchain appear to be a cornerstone for a crime prevention strategy
Literature Survey
Sr.no Title Author Published Year Technology Limitation

1 Face Sanika IEEE 5th 2019 Machine High


Detection Tanmay World learning Costing
and Ratnaparkh Forum on and not
Recognition i Internet of user
for Criminal Things friendly
Identification (WF-IoT)
System

2 Criminal Nagnath 3rd 2019 OPENCV Just a


Identificatio Aherwadi Internation theory
n System al
using Facial Conference
Recognition on
Computer
Science
and
Informatio
n
Technolog
Sr.no Title Author Published Year Technology Limitatio
n
3 Criminal Alireza 14th IEEE 2019 Deep Low
Face Chevelwall Internation Learning Performanc
Recognition a al e
System Workshop
on Factory
Communic
ation
Systems
(WFCS)
4 Criminal NeetuMitta IEEE 2020 Blockchain Complex
identificatio l Internation
n system al IOT,
using face Electronics
detection and
with Mechatroni
artificial cs
intelligence Conference
(IEMTRO
NICS)
Project Title March 16, 8
2024
Architecture

Project Title March 16, 9


2024
Mathematical Model

System Description :

S = (I,O,F)
Where,
 S: System.

 I = { FC, UL} are set of Inputs


Where,
1. FC : Face Camera
2. UL : User Login
F = {A, DP, PM}are set of Function
Where,
A : Aauthentication
DP: Data Processing.
PM: Prediction Module

O = { CT} are set of Output


Where,
CT: Criminal detection

Success Conditions :
Proper database.
Failure Conditions :
No database, Internet connection
Proposed Solution
1. The main objective of Real-time criminal identification based on face recognition
Application is to help police personnel identify criminals.
2. The objective of this application is to provide information about a particular
criminal which we are finding.
3. Police personnel can use this application anytime, anywhere to find a criminal
4. Any police personnel can access this application using internet from anywhere and
anytime.
5. We can also find criminals from live CCTV surveillance cameras.
6. This application is fast, robust, reasonably simple and accurate with a relatively
simple and easy to understand GUI.

Project Title March 16, 12


2024
Algorithm Explanation
 Imports: import cv2. import os. import cv2 import os. ...

 Initialize the classifier: cascPath=os. path. ...

 Apply faceCascade on webcam frames: video_capture = cv2.


VideoCapture(0) ...

 Release the capture frames: video_capture. release() ...


Now, run the project file using
UML Diagrams (er)
UML Diagrams (Activity)
UML Diagrams (Use case)
Advantages

1. Successfully getting the Prediction.


2. Low budget with best solution.
3. Dataset authentication

Project Title March 16, 18


2024
Application

1. Personal.

2. Organization.

3. Company.

4. Malls

5. Airport

6. Temples

Project Title March 16, 19


2024
Conclusion

In this work, we compare the various types of images and the


accuracy level of results is very satisfying. It performs well with both
images and videos. The results displayed are 90% accurate. This requires
less memory space to implement and takes less time when compared with
other approaches. By using this the criminals and missing children/person
can be easily identifiable and it keeps on updating dynamically

Project Title March 16, 20


2024
Reference
[1] Nurul Azma Abdullah, Md. Jamri Saidi and Nurul Hidayah Ab Rahman “Face recognition for criminal
identification: An implementation of principal component analysis for face recognition”The 2nd
International Conference on Applied Science and Technology 2017 (ICAST’17)

[2] Apoorva.P, Ramesh.B and Varshitha.M.R “Automated criminal identification by face recognition using
open computer vision classifiers” Third International Conference on Computing Methodologies and
Communication (ICCMC 2019).

[3] Rasanayagam, K.Kumarasiri, S.D.D, Tharuka, W. A. D. Samaranayake, N. Samarasinghe and P.


Siriwardana “CIS: An Automated Criminal Identification System”. 2018 IEEE International Conference on
Information and Automation for Sustainability (ICIAfS)R. Nicole, “Title of paper with only first word
capitalized,” J. Name Stand. Abbrev., in press.

[4] Mantoro, T., Ayu, M. A., & Suhendi. (2018).” Multi-Faces Recognition Process Using Haar Cascades and
Eigenface Methods” 2018 6th International Conference on Multimedia Computing and Systems (ICMCS).

[5] Chang L , Yang J, Li S, Xu H, Liu K & Huan, C. (2018). ”Face Recognition Based on Stacked
Project Title
Convolutional Autoencoder and Sparse Representation”. 2018 March
IEEE
2024
16, 21
23rd International Conference on
Digital Signal Processing (DSP).

You might also like