Deep Unified Model for Intrusion Detection Based on Convolutional Neural Network
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2021, Vol 5, Issue 3
Abstract
Indian army has always been subject to military attacks from neighbouring countries. Despite many surveillance devices and border security forces, the enemy finds a way to infiltrate deep into our borders. This is mainly because even now the surveillance in India is largely human assisted. Therefore this automated surveillance can authenticate the authorized persons and alert everyone when an enemy intrusion is detected. In this, we proposed an automated surveillance system that tackles the predicament of recognition of faces subject to different real time scenarios. This model incorporates a camera that captures the input image, an algorithm to detect a face from the input image, recognize the face using a convolution neural network along with transfer learning method, and verifies the detected person. The authorized person’s name and details are stored in CSV format and then into the database. In case of any unauthorized persons face is detected the image of the intruder along with time is stored in the database and warning signal is also given to alert the surrounding members in case of intrusion detection. Dhanu Shree D | Fouzia Fathima A | Madhumita B | Akila G | Thulasiram S "Deep Unified Model for Intrusion Detection Based on Convolutional Neural Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd39976.pdf Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/39976/deep-unified-model-for-intrusion-detection-based-on-convolutional-neural-network/dhanu-shree-d
Authors and Affiliations
Dhanu Shree D | Fouzia Fathima A | Madhumita B | Akila G | Thulasiram S
A Traffic Sign Classifier Model using Sage Maker
Driver assistance technologies that relieve the drivers task, as well as intelligent autonomous vehicles, rely on traffic sign recognition. Normally the classification of traffic signs is a critical challenge for self dr...
Supply Chain and Production Cost of Brewing Plants in South East, Nigeria
The study focused on Supply Chain and Production Cost of Brewing plants in South East, Nigeria. The study sought to ascertain the nature of relationship between Supply Chain and Production Cost of the Brewing plants in t...
Data Prevention from Network Hacking
We are sending data from source node to destination using wireless sensor networks (WSNs), In wireless sensor networks, it is a typical threat to source privacy that an attacker performs back tracing strategy to locate s...
Effects of English on Pattern of Education System in India
This Study deals with the impact of the English and the changing example of the instructive framework. For a comprehension of the improvement of the western instruction in India, exertion must be made to touch the record...
Forecasting Stock Market using Multiple Linear Regression
Regression is one of the most powerful statistical methods used in business and marketing researches. This paper shows the important instance of regression methodology called Multiple Linear Regression MLR and proposes a...