Professional Documents
Culture Documents
On
THIRD EYE
Submitted by:
DECLARATION
We here declare that work which is being presented in the project entitled “THIRD EYE” in
partial fulfillment of degree of Bachelor of Technology is an authentic record of our carried out
under the supervision and guidance of Mr. Rahul Choudhary. The matter embodied in this
project has not been submitted for the award of any other degree.
Date:
2
THIRD EYE
Following team has done the appropriate work related to the “THIRD EYE” in partial
fulfillment for the award of Bachelor of Technology of SHRI VAISHNAV VIDYAPEETH
VISHWAVIDYALAYA, INDORE and is being submitted to SHRI VAISHNAV INSTITUTE
OF INFORMATION TECHNOLOGY, INDORE.
Team:
Date:
3
THIRD EYE
CERTIFICATE
This is to certify that Tanay Choubey, Utsav Maloo and Maghvendra Singh Panwar working
in a team have satisfactorily completed the project entitled “THIRD EYE” under my guidance
in partial fulfillment of degree of Bachelor of Technology awarded by SHRI VAISHNAV
VIDYAPEETH VISHWAVIDYALAYA, INDORE during the academic year 2021-22.
4
THIRD EYE
ACKNOWLEDGEMENT
We are grateful to a number of persons for their advice and support during the time of complete
our project work. First and foremost, our thanks go to Dr. Jigyasu Dubey Head of the
Department of Information Technology and Mr. Rahul Choudhary the mentor of our project
for providing us valuable support and necessary help whenever required and also helping us
explore new technologies by the help of their technical expertise. His direction, supervision and
constructive criticism were indeed the source of inspiration for us.
We would also like to express our sincere gratitude towards our Director Dr. Anand Rajavat for
providing us valuable support.
We are really indebted to Prof. Rahul Choudhary, project coordinator for helping us in each
aspect of our academic’s activities. We also owe our sincere thanks to all the faculty members
of Information Technology Department who have always been helpful.
We forward our sincere thanks to all teaching and non-teaching staff of Information
Technology department, SVVV Indore for providing necessary information and their kind co-
operation.
We would like to thanks our parents and family members, our classmates and our friends for
their motivation and their valuable suggestion during the project. Last, but not the least, we thank
all those people, who have helped us directly or indirectly in accomplishing this work. It has
been a privilege to study at SHRI VAISHNAV VIDYAPEETH VISHWAVIDYALAYA,
INDORE.
5
THIRD EYE
ABSTRACT
Nowadays, we usually say that we live in an open world, where everything is clear and no isolation
among all countries all over the world. I think that the technology revolution is opening the world. We
use the Internet everywhere every awhile; we cannot live without it. You do not have to travel away to
know new technologies, you can learn over the Internet. Internet became our real world that shapes our
social networks. Right now, we cannot drive without traffic and navigation apps that keep us in touch
with new roads status. In this project, we target using the Internet to communicate with our homes, or
our offices by observing whatever happening. When we talk about security of any place, then Video
Surveillance Cameras are the most popular equipment for this purpose.
6
THIRD EYE
LIST OF FIGURES
2 DFD Level 0 30
3 DFD Level 1 31
4 DFD Level 2 31
5 DFD Level 3 32
9 Class diagram 37
10 Sequence Diagram 38
11 Component Diagram 40
12 Home Page UI 41
13 Monitor Page UI 41
14 Identify Page UI 42
15 Record Page UI 42
16 IN /Out Page UI 43
17 In Page Output 43
22 Coding Page 1 46
7
THIRD EYE
23 Coding Page 2 46
24 Coding Page 3 47
25 Coding Page 4 47
27 Test Case 2 52
29 Test Case 3 53
32 Test Case 4 55
8
THIRD EYE
TABLE OF CONTENT
Declaration 2
Certificate 4
Acknowledgement 5
Abstract 6
• Introduction
• Problem Statement
• Objective
• Application
4. DESIGN 26-38
• Design Concept
• Design Technique
• Modeling
➢ DFD Model Level 0 and 1
• UML Diagram
➢ Activity Diagram
➢ Class Diagram
➢ Sequence Diagram
5. IMPLEMENTATION 39-47
• Functional programming
• Component Diagram
• UI Screenshots
• Coding Screenshots
• Testing Objectives
10
THIRD EYE
• Types of Testing
➢ Unit Testing
➢ System Testing
➢ Integration Testing
• Testing Approach
➢ Black Box Testing
➢ White Box Testing
• Validation
• Limitations
• Result
• Test Plans
➢ Test Case Pass/Fail Criteria
➢ Test Cases
7. LIMITATION OF PROJECT 57
8. FUTURE ENHANCEMENT 58
9. CONCLUSION 59
10. REFERENCES 60
11
THIRD EYE
CHAPTER 1 – INTRODUCTION
• Introduction
Nowadays, we usually say that we live in an open world, where everything is clear and no isolation
among all countries all over the world. I think that the technology revolution is opening the world.
We use the Internet everywhere every awhile; we cannot live without it. You do not have to travel
away to know new technologies, you can learn over the Internet. Internet became our real world
that shapes our social networks. Right now, we cannot drive without traffic and navigation apps
that keep us in touch with new roads status. In this project, we target using the Internet to
communicate with our homes, or our offices by observing whatever happening. When we talk
about security of any place, then Video Surveillance Cameras are the most popular equipment for
this purpose.
• Problem Statement
1. Traditional video surveillance was based on analog technology closed circuit television
(CCTV), and then recorded on video tapes.
2. Analog technology at one time served a purpose for security monitoring.
3. The advantage of a digital system over an analog is clear because of better picture quality and
the key feature to see exactly what is happening in the moment.
4. After any crime taken place, it takes a long time to analyze hours of videos.
5. It is a time-consuming procedure and costs the concerned authority valuable time to take quick
action.
6. It is difficult to keep monitor and keep track of people who may enter a restricted place.
1. This system simply recorded in the moment activity for future access. It relied on human
monitoring reliability and changing the tapes regularly.
2. Now digital CCTV is revolutionizing security measures and technology has evolved to
allow for a more diverse security monitoring system.
12
THIRD EYE
3. The advantage of a digital system over an analog is clear because of better picture quality
and the key feature to see exactly what is happening in the moment.
4. There should be a way that can alert the authority when something like this happens.
• Objective
The main objective behind this project is to promote security on different places. When we talk about
security of any place, then Video Surveillance Cameras are the most popular equipment for this
purpose. It has gained immense popularity as an effective security measure. In the near future, most
institutions and organizations will have surveillance cameras installed. Consequently, this will reduce
burglary incidents and enhance social stability.
• Application
This system simply recorded in the moment activity for future access. It relied on human monitoring
reliability and changing the tapes regularly. There should be a way that can alert the authority when
something like this happens. Recording only of suspicious events will be an option in order to reduce
the required storage capacity.
KEY FEATURES
13
THIRD EYE
• Benefits
o This system simply recorded in the moment activity for future access. It relied on human
monitoring reliability and changing the tapes regularly.
o The advantage of a digital system over an analog is clear because of better picture quality and the
key feature to see exactly what is happening in the moment.
o Recording only of suspicious events will be an option in order to reduce the required storage
capacity.
o There should be a way that can alert the authority when something like this happens.
• Proposed Solution
o This system simply recorded in the moment activity for future access. It relied on human
o Now digital CCTV is revolutionizing security measures and technology has evolved to allow for
o The advantage of a digital system over an analog is clear because of better picture quality and the
o There should be a way that can alert the authority when something like this happens.
o We are going to discuss the smart form of security, and with camera system monitoring service,
you can rest assured that any suspicious activities are reported and dealt with quickly.
o Recording only of suspicious events will be an option in order to reduce the required storage
capacity
• Technology used
➢ Software Requirement
▪ Windows/Linux/Mac OS any version, hence it can run on any platform.
▪ Python3, it need python to be installed in your system to run this successfully.
▪ Packages in python -
1. OpenCV
2. Skimage
3. Numpy
4. Tkinter
➢ Hardware Requirement
o System: Multimedia PC
o Processor: Pentium 4 or above
o Memory: 2GB RAM
o Hard Disk: 80GB or above
o Webcam with drivers installed
o Flashlight/ LED if using this at night.
15
THIRD EYE
➢ Description
Agile model believes that every project needs to be handled differently and the existing methods need
to be tailored to best suit the project requirements. In Agile, the tasks are divided to time boxes (small
time frames) to deliver specific features for a release.
Iterative approach is taken and working software build is delivered after each iteration. Each build is
incremental in terms of features; the final build holds all the features required by the customer.
The Agile thought process had started early in the software development and started becoming popular
with time due to its flexibility and adaptability
The two main programming approaches are top-down approach and bottom-up approaches. Here while
doing the software, we use the bottom-up approach
In bottom-up method, the sub modules are designed and developed and these are assembled together to
get the main system. The individual modules are coded and debugged with example data given checks
ready for the minor project design. This project also followed the bottom-up design. The sub modules
are prepared very keenly, and minute notations are made.
In the art street, the sub modules are designed first, these sub modules are integrated into main
modules. Other modules also designed in the same fashion. Each module is tested at the beginning
when they are integrated with the sub-modules.
These checked and corrected modules are integrated to make the main system.
16
THIRD EYE
➢ Advantages
o Customer satisfaction by rapid, continuous delivery of useful software.
o Working software is delivered frequently (weeks rather than months).
o Face-to-face conversation is the best form of communication.
o Close, daily cooperation between businesspeople and developers.
o Continuous attention to technical excellence and good design.
o Regular adaptation to changing circumstances.
o Even late changes in requirements are welcomed
o Disadvantages
o In case of some software deliverables, especially the large ones, it is difficult to assess the
effort required at the beginning of the software development life cycle.
o There is lack of emphasis on necessary designing and documentation.
o The project can easily get taken off track if the customer representative is not clear what final
outcome that they want.
o Only senior programmers are capable of taking the kind of decisions required during the
development process. Hence it has no place for newbie programmers, unless combined with
experienced resources.
The sub modules are designed and developed, and these are assembled together to get the main system.
The individual modules are coded and debugged with example data given checks ready for the minor
project design., the sub modules are designed and developed, and these are assembled together to get
the main system. The individual modules are coded and debugged with example data given checks
ready for the minor project design. the online admission system, the sub modules are designed first,
these sub modules are integrated into main modules. Other modules also designed in the same fashion.
Each module is tested at the beginning when they are integrated with the sub-modules.
17
THIRD EYE
• Requirement Analysis
Requirements Analysis is the process of defining the expectations of the users for an application that is
to be built or modified. Requirement’s analysis involves all the tasks that are conducted to identify the
needs of different stakeholders. Therefore, requirements analysis means to analyze, document, validate
and manage software or system requirements. High-quality requirements are documented, actionable,
measurable, testable, traceable, helps to identify business opportunities, and are defined to a facilitate
system design. Requirement’s analysis process:
o Eliciting requirements
The process of gathering requirements by communicating with the customers is known as eliciting
requirements.
o Analyzing requirements
This step helps to determine the quality of the requirements. It involves identifying whether the
requirements are unclear, incomplete, ambiguous, and contradictory. These issues resolved before
moving to the next step.
o Requirements modeling
In Requirements modeling, the requirements are usually documented in different formats such as
use cases, user stories, natural-language documents, or process specification.
This step is conducted to reflect on the previous iterations of requirements gathering in a bid to
make improvements in the process going forward.
18
THIRD EYE
a) Functional Requirement
R 1: - START
Description: - The existing user will be able to start the system using the Third EYE
application.
R 1. 1. 1: - Monitoring
Input: - Here you can click the Monitor Button.
Output: - Now camera start to monitor the whole room.
R 2: - IDENTIFY
Description: - This module recognition the identical person and non-identical person.
19
THIRD EYE
R 3: IN/OUT
Description: - This is the feature which can detect if someone has entered in the room or
gone out.
R 3. 1: - IN
R 3. 2: - OUT
R 4: - RECORD
R 5: - END
Description: - End means to end access to a computer system and end the current session.
b) Non-Functional Requirement
Non-functional requirements will describe how a system should behave and what limits there are on its
functionality, generally specify the system's quality attributes. Factors like these comes under Non-
Functional Requirements
20
THIRD EYE
3.2.1 Performance
1.Average load time of the start page of website should be less than 5 seconds.
3.Our system should easily accessible on the system having minimum internet speed
of1MB/s
3.2.2 Reliability
3.2.3 Supportability
3.2. Security
Users’ information will be secure and he will be able to access only their own personal
information
The objective of this SRS document is to specify software requirements of the Online Admission for
the college. It is intended to be a complete specification of what functionality the admission provides.
The main purpose of the system is to automate the task carried out by different peoples in the
organization to perform the student admission. Specific design and implementation details will be
specified in a future document.
Overview of SRS
o Overall Description will describe major components of the system, interconnection and
external interfaces.
o Specific Requirements will describe the functions of actors, their role in the system and
constraints.
21
THIRD EYE
Overall Description
The SRS document will give further details on the overall product description, including the hardware,
software, and communications interfaces, product functions, user characteristics, and any assumptions
that will be made.
Specific Requirements
The SRS document will also include the specific requirements needed. These will include the
functions, performance, design, and software attributes. This document is organized in a logical
manner and is easy to follow. Readers should refer to the table of contents, appendices, or index if
looking for something in specific. Otherwise, reading this document from start to finish will start with
a vague description and get more specific and detailed as changing sections and reading further.
Feasibility Study
o Economic Feasibility
Economic analysis is most frequently used for evaluation of the effectiveness of the system. More
commonly known as cost/benefit analysis the procedure is to determine the benefit and saving that
are expected from a system and compare them with costs, decisions is made to design and
implement the system.
This part of feasibility study gives the top management the economic justification for the new
system. This is an important input to the management because very often the top management does
not like to get confounded by the various technicalities that bound to be associated with a project
of this kind. A simple economic analysis that gives the actual comparison of costs and benefits is
much more meaningful in such cases.
Economic analysis is most frequently used for evaluation of the effectiveness of the system. More
commonly known as cost/benefit analysis the procedure is to determine the benefit and saving that
are expected from a system and compare them with costs, decisions is made to design and
implement the system.
22
THIRD EYE
o Technical Feasibility
Technical feasibility centers on the existing manual system of the test management process and to
what extent it can support the system. According to feasibility analysis procedure the technical
feasibility of the system is analyzed and the technical requirements such as software facilities,
procedure, inputs are identified. It is also one of the important phases of the system development
activities It is technically feasible, since the whole system is designed into the latest technologies
like PYTHON which are the most recent technologies.
The system offers greater levels of user friendliness combined with greater processing speed.
Therefore, the cost of maintenance can be reduced. Since processing speed is very high and the
work is reduced in the maintenance point of view management convince that the project is
operationally feasible.
o Operational Feasibility
It is Operational feasible, since the system is providing an attractive GUI interface to the
operator/end user, so he feels very easy to work onto it. Response to operator/end user is very fast
and very good. Since, as we mentioned above that it requires much less amount of cost, it uses
computer work, so it is very fast to operate, and it is very easy for user to work on it.
➢ Glossary
The final output is the requirements specification document (SRS). For smaller problems or problems
that can easily be comprehended; the specification activity might come after the entire analysis is
complete. However, it is more likely that problem analysis and specification are done concurrently. All
the information for specification activity as following the analysis activity.
Analysis of data is a process of inspecting, cleaning, transforming, and modeling data with the goal of
highlighting useful information, suggesting conclusions, and supporting decision making. Data
analysis has multiple facets and approaches, encompassing diverse techniques under a variety of
names, in different business, science, and social science domains.
23
THIRD EYE
A use case diagram is a dynamic or behavior diagram in UML. Use case diagrams model the
functionality of a system using actors and use cases. Use cases are a set of actions, services, and
functions that the system needs to perform. In this context, a system is something being developed or
operated, such as a web site. The actors are people or entities operating under defined roles within the
system.
DESCRIPTION: -
2. ACTOR: - USER
25
THIRD EYE
CHAPTER 4 – DESIGN
Software design is the process of conceptualizing the software requirements into software
implementation. This is the initial phase within the software development life cycle (SDLC) shifting
the concentration from the problem to the solution.
When conceptualizing the software, the design process establishes a plan that takes the user
requirements as challenges and works to identify optimum solutions. The plan should determine the
best possible design for implementing the intended solution.
• Design Concept
➢ System Design
The system design develops the architectural detail required to build a system or product. As in the
case of any systematic approach, this software too has undergone the best possible design phase fine
tuning all efficiency, performance and accuracy levels. The first step in system designing is to
determine how the output is to be produced and in what format. In the second step, input data and
master files are to be designed to meet requirement of the proposed output. The processing phases are
handled through program construction and testing, including a list of the programs needed to meet the
system's objectives and complete documentation.
System design is the solution to the creation of a new system. This phase is composed of several
systems. This phase focuses on the detailed implementation of the feasible system. It emphasis on
translating design specifications to performance specification. System design has two phases of
development logical and physical design.
During logical design phase the analyst describes inputs (sources), outputs (destinations), databases
(data stores) and procedures (data flows) all in a format that meats the uses requirements. The analyst
also specifies the user needs and at a level that virtually determines the information flow into and out
of the system and the data resources. Here the logical design is done through data flow diagrams and
database design.
26
THIRD EYE
The physical design is followed by physical design or coding. Physical design produces the working
system by defining the design specifications, which tell the programmers exactly what the candidate
system must do. The programmers write the necessary programs that accept input from the user,
perform necessary processing on accepted data through call and produce the required report on a hard
copy or display it on the screen.
• Design Technique
➢ Logical Design
Logical design of an information system shows the major features and also how they are related to one
another. The first step of the system design is to design logical design elements. This is the most
creative and challenging phase and important too. Design of proposed system produces the details of
the state how the system will meet the requirements identified during the system analysis that is, in the
design phase we have to find how to solve the difficulties faced by the existing system. The logical
design of the proposed system should include the details that contain how the solutions can be
implemented. It also specifies how the database is to be built for storing and retrieving data, what kind
of reports are to be created and what are the inputs to be given to the system. The logical design
includes input design, output design, and database design and physical design.
➢ Physical Design
The process of developing the program software is referred to as physical design. We have to design
the process by identifying reports and the other outputs the system will produce. Coding the program
for each module with its logic is performed in this step. Proper software specification is also done in
this step.
➢ Input Design
The input design is the link between the information system and the user. It comprises the developing
specification and procedures for data preparation and those steps are necessary to put transaction data
into a usable form for processing data entry. The activity of putting data into the computer for
27
THIRD EYE
processing can be achieved by inspecting the computer to read data from a written or printed document
or it can occur by having people keying the data directly into the system. The design of input focuses
on controlling the amount of input required, controlling errors, avoiding delay, avoiding extra steps
and keeping the process simple.
The system needs the data regarding the asset items, depreciation rates, asset transfer, physical
verification for various validation, checking, calculation and report generation. The error raising
method is also included in the software, which helps to raise error message while wrong entry of input
is done. So, in input design the following things are considered:
➢ Output Design
Computer output is the most important and direct information source to the user. Output design is a
process that involves designing necessary outputs in the form of reports that should be given to the
users according to the requirements. Efficient, intelligible output design should improve the system's
relationship with the user and help in decision making. Since the reports are directing referred by the
management for taking decisions and to draw conclusions, they must be designed with almost care and
the details in the reports must be simple, descriptive and clear to the user. So, while designing output
the following things are to be considered:
28
THIRD EYE
• Modeling
System modeling is the process of developing abstract models of a system, with each model presenting
a different view or perspective of that system. System modeling has now come to mean representing a
system using some kind of graphical notation, which is now almost always based on notations in the
Unified Modeling Language (UML). System modeling helps the analyst to understand the
functionality of the system and models are used to communicate with customers.
A Data Flow Diagram termed as DFD, graphically representing the functions, or processes, which
capture, manipulate, store, and distribute data between a system and its environment and between
components of a system. The visual representation makes it a good communication tool between User
and System designer. Structure of DFD allows starting from a broad overview and expand it to a
hierarchy of detailed diagrams. DFD has often been used due to the following reasons:
Data flow diagrams can be divided into logical and physical. The logical data flow diagram
describes flow of data through a system to perform certain functionality of a business. The physical
data flow diagram describes the implementation of the logical data flow.
DESCRIPTION: -
1. Circle: A circle (bubble) shows a process that transforms data inputs into data outputs.
(Third EYE)
2. Source or Sink: Source or Sink is an external entity and acts as a source of system inputs or
sink of system outputs.
External Entity: - (User; Camera)
3. Data Flow: A line shows the flow of data into or out of a process or data store.
29
THIRD EYE
DESCRIPTION: -
1. Circle: A circle (bubble) shows a process that transforms data inputs into data
outputs.
(7 Process in upper diagram)
2. Source or Sink: Source or Sink is an external entity and acts as a source of system
inputs or sink of system outputs.
External Entity: - (User; Camera)
3. Data Flow: A line shows the flow of data into or out of a process or data store.
4. Data Store: A set of parallel lines shows a place for the collection of data items. A
data store indicates that the data is stored which can be used at a later stage or by the
other processes in a different order. The data store can have an element or group of
elements.
30
THIRD EYE
31
THIRD EYE
32
THIRD EYE
• UML Diagram
The UML diagrams are categorized into structural diagrams, behavioral diagrams, and also interaction
overview diagrams.
Structural diagrams depict a static view or structure of a system. It is widely used in the documentation
of software architecture. It embraces class diagrams, composite structure diagrams, component
diagrams, deployment diagrams, object diagrams, and package diagrams. It presents an outline for the
system. It stresses the elements to be present that are to be modeled.
Behavioral diagrams portray a dynamic view of a system or the behavior of a system, which describes
the functioning of the system. It includes use case diagrams, state diagrams, and activity diagrams. It
defines the interaction within the system.
➢ Activity Diagram
An activity diagram is used to model a large activity's sequential workflow by focusing on action
sequences and respective action initiating conditions. The state of an activity relates to the performance
of each workflow step.
An activity diagram is represented by shapes that are connected by arrows. Arrows run from activity
start to completion and represent the sequential order of performed activities. Black circles represent
an initial workflow state. A circled black circle indicates an end state. Rounded rectangles represent
performed actions, which are described by text inside each rectangle.
A diamond shape is used to represent a decision, which is a key activity diagram concept. Upon
activity completion, a transition (or set of sequential activities) must be selected from a set of
alternative transitions for all use cases. Synchronization bars indicating the start or completion of
concurrent activities are used to represent parallel sub flows.
33
THIRD EYE
➢ Monitoring Diagram
➢ Identification Diagram
35
THIRD EYE
➢ In / Out Diagram
36
THIRD EYE
➢ Class Diagram
A class diagram is primarily designed for developers to provide the conceptual model and architecture
of the system being developed. Typically, a class diagram consists of more than one class or all the
created classes for a system. It is a type of structure diagram and looks similar to a flow chart having
three main parts illustrated in rectangular boxes. The first or top part specifies the class name, the
second or middle specifies attributes of that class and the third or bottom section lists the methods or
operations that specific class can perform.
37
THIRD EYE
➢ Sequence Diagram
The sequence diagram represents the flow of messages in the system and is also termed as an event
diagram. It helps in envisioning several dynamic scenarios. It portrays the communication between any
two lifelines as a time-ordered sequence of events, such that these lifelines took part at the run time. In
UML, the lifeline is represented by a vertical bar, whereas the message flow is represented by a vertical
dotted line that extends across the bottom of the page. It incorporates the iterations as well as branching.
38
THIRD EYE
CHAPTER 5 – IMPLEMENTATION
In the process of coding, the lines of code keep multiplying, thus, size of the software increases.
Gradually, it becomes next to impossible to remember the flow of program. If one forgets how
software and its underlying programs, files, procedures are constructed it then becomes very difficult
to share, debug and modify the program. The solution to this is structured programming. It encourages
the developer to use subroutines and loops instead of using simple jumps in the code, thereby bringing
clarity in the code and improving its efficiency Structured programming also helps programmer to
reduce coding time and organize code properly.
• Functional Programming
Functional programming is style of programming language, which uses the concepts of mathematical
functions. A function in mathematics should always produce the same result on receiving the same
argument. In procedural languages, the flow of the program runs through procedures, i.e., the control
of program is transferred to the called procedure. While control flow is transferring from one
procedure to another, the program changes its state.
In procedural programming, it is possible for a procedure to produce different results when it is called
with the same argument, as the program itself can be in different state while calling it. This is a
property as well as a drawback of procedural programming, in which the sequence or timing of the
procedure execution becomes important.
39
THIRD EYE
• Component Diagram
40
THIRD EYE
• UI Screenshots
Monitor Page
41
THIRD EYE
Identify Page
Record
42
THIRD EYE
In/Out
IN Output
43
THIRD EYE
Out Output
Record Output
44
THIRD EYE
Monitor Output
Identify Output
Coding Screenshots
Software testing is a critical element of the software development cycle. The testing is essential for
ensuring the Quality of the software developed and represents the ultimate view of specification,
design and code generation. Software testing is defined as the process by which one detects the defects
in the software. Testing is a set of activities that work towards the integration of entire computer-based
system. A good test case is one that has a high probability of finding an as-yet undiscovered error. A
successful test is one such uncovers or finds such errors. If testing is conducted successfully, it will
uncover errors in the software. It also demonstrates that software functions are being performed
according to specifications and also behavioral and performance requirements are satisfied. For this,
test plans have to be prepared. The implementation of a computer system requires that test data has to
be prepared and that all the elements in the system are tested in a planned and efficient manner.
Nothing is complete without testing, as it is vital success of the system.
• Testing Objectives
There are several rules that can serve as testing objectives. They are:
o Testing is process of executing a program and finding a bug.
o A good test case is one that has a high probability of finding an undiscovered.
o A successful test is one that uncovers an undiscovered error.
If testing is conducted successfully according to the objectives as stated above, it would uncover errors
in the software. Also testing demonstrates that software functions appear to the working according to
the specification, that performance requirements appear to have been met.
• Types of Testing
➢ Unit Testing
Unit testing is carried out screen-wise, each screen being identified as an object. Attention is diverted
to individual modules, independently to one another to locate errors. This has enabled the detection of
48
THIRD EYE
errors in coding and logic. This is the first level of testing. In this, codes are written such that from one
module, we can move on to the next module according to the choice we enter.
➢ System Testing
In this, the entire system was tested as a whole with all forms, code, modules and class modules.
System testing is the stage of implementation, which is aimed at ensuring that the system works
accurately and efficiently before live operation commences. It is a series of different tests that verifies
that all system elements have been properly integrated and perform allocated functions. System testing
makes logical assumptions that if all parts of the system are correct, the goal will be successfully
achieved. Testing is the process of executing the program with the intent of finding errors. Testing
cannot show the absence of defects, it can only show that software errors are present.
➢ Integration Testing
This testing strategies combines all the modules involved in the system. After the independent modules
are tested, dependent modules that use the independent modules are tested. This sequence of testing
layers of dependent modules continues until the entire system is constructed.
Though each module individually, they should work after linking them together. Data may be lost
across interface and one module can have adverse effect on another. Subroutines, after linking, may
not do the desired function expected by the main routine. Integration testing is a systematic technique
for constructing program structure while at the same time, conducting test to uncover errors associated
with the interface. In the testing the programs are constructed and tested in the small segments.
• Testing Approach
➢ White Box Testing
White box testing is the detailed investigation of internal logic and structure of the Code. To perform
white box testing on an application, the tester needs to possess knowledge of the internal working of
the code. The tester needs to have a look inside the source code and find out which unit/chunk of the
code is behaving inappropriately.
49
THIRD EYE
• Validation
All the levels in the testing (unit, integration, system) and methods (black box, white box) are
implemented on our application successfully and the results obtained as expected.
• Limitation
The execution time for support vector machine is more so that the user may not receive the result fast.
• Test Result
The testing is done among the team members and by the end users. It satisfies the specified
requirements and finally we obtained the results as expected.
• Test Plans
The test plan covers the details of the testing process of the project, i.e., “Third EYE”. It deals with all
the testing needs for our project that are required at present.
50
THIRD EYE
➢ Test Cases
51
THIRD EYE
53
THIRD EYE
Click on identify button New GUI for add and identify member appears Pass
55
THIRD EYE
Click on record button Camera will open and start recording Pass
56
THIRD EYE
o No backup option is available since all the images are stored in local drive
57
THIRD EYE
o Improvements can be appended by changing the existing modules or adding new modules. One
important development that can be added to the project in future is file level backup, which is
o We can use this script and can integrate it with Arduino or raspberry pi board.
58
THIRD EYE
CHAPTER 9 – CONCLUSION
This survey has explored almost all published fraud detection studies. It defines the adversary, the types
and subtypes of fraud, the technical nature of data, performance metrics, and the methods and
techniques. After identifying the limitations in methods and techniques of fraud detection, this paper
shows that this field can benefit from other related fields. Specifically, unsupervised approaches from
counterterrorism work, actual monitoring systems and text mining from law enforcement, and semi
supervised and game-theoretic approaches from intrusion and spam detection communities can
contribute to future fraud detection research. However, Fawcett and Provost (1999) show that there are
no guarantees when they successfully applied their fraud detection method to news story monitoring
59
THIRD EYE
CHAPTER 10 - REFERENCES
1) https://docs.python.org/3.12/
2) https://pypi.org/project/opencv-python/
3) https://ijrest.net/downloads/volume-4/issue-4/pid-ijrest-44201715.pdf
4) Introduction of security camera system with privacy protection into a residential area
https://pdf.sciencedirectassets.com/
60