Beruflich Dokumente
Kultur Dokumente
College
OUTLINE
INTRODUCTION
WORKFLOW
BLOCK DIAGRAM
TOOLS USED
REFERENCES
8/10/15
INTRODUCTION
Security system plays an important role of providing an
extra layer of security through user authentication.
Illegal intrusions can be easily tracked at the entry itself.
For the past few decades face recognition has received
significant attention.
Used in many important issues in many applications like
access
control,
security
systems,
and
criminal
identification.
8/10/15
CONT
The main goal is to propose three main subsystems:
Face recognition,
Face detection, and
Automated door access control.
The door will be opened only if the image is an
authenticated one.
8/10/15
WORKFLOW
FACE
RECOGNITION
AUTHENTICATED
IMAGE
DOOR ACCESS
YES
OPEN
NO
CLOSE
8/10/15
BLOCK DIAGRAM
CAMERA
CAPTURING IMAGE
CORREC
T
IMAGE?
?
DETECTING IMAGE
RECOGNIZING IMAGE
YES
OPEN
NO
DOOR ACCESS
CLOSE
8/10/15
TOOLS USED
1. NI 17XX SMART CAMERA.
2. NI LABVIEW SYSTEM DESIGN SOFTWARE.
3. NI myRIO MECHATRONICS KIT.
4. DOOR CONTROL RELAY MAGNETIC SWITCH.
8/10/15
REFERENCES
[1]
RADHEY
SHYAM
AND
YOGENDRA
NARAIN
SINGH,
IDENTIFYING
CONFERENCE
ON
INTELLIGENT
COMPUTING,
HTEIK HTAR LWIN, AUNG SOE KHAING, HLA MYO TUN, AUTOMATIC DOOR ACCESS
8/10/15
INTERNATIONAL JOURNAL OF
8/10/15
OF
DEMOGRAPHIC
INFORMATION
IEEE
TRANSACTIONS
ON
8/10/15
10
THANK YOU
8/10/15
11