In these sections, a literature
review is conducted for the proposed project technique. The review will
investigate the usage of the technology to recognize the criminals by facial
recognition technique. In the early days the facial recognition system was used
for the photo sessions to enhance the quality of the picture. The features of
the literature review on various aspects related to the technology used to make
the companies secure and safer such as the security of the devices which are
working on the internet.
The literature review on the
proposed is providing you vast area which tells about what the technique
actually is as well as where we can use it and how it does properly works. The
literature review highlights some important aspects and related issues which
were in the previous related products. The items like hardware, programming
languages, information storing methods are also discussed in this report.
Raspberry Pi is Linux based device is used in this project as the hardware as
well as a camera is also used that will be fixed in the Raspberry Pi device to
capture the picture of the suspicious person, process on that picture, extract
and then match that picture with those pictures that are saved in the Raspberry
Pi database.
Python programming language is
used in the development of this project which will give the instructions to the
Raspberry Pi and the attached camera that fixed in the device to capture the
picture to process on that picture. The SQLite is the internal database that
python offers in the projects to save the data. In any case, the SQLite is
damaged, the system will use the Apache server to overcome this problem. For
example, there is no need to worry because the important data is also saved on
MySQL.
Furthermore, in this literature
review, all methods are also discussed related to the proposed project and
technique. All kinds of methodologies that will be used in the whole projects
like the software engineering processes such as software development life cycle
(SDLC), waterfall model, agility as well as other engineering processes. The
testing technique such as functional requirement and nonfunctional requirement
as well as the validation and verifications process and another kind of process
like use cases, architecture diagrams and the test cases are also discussed in
this literature.
Moreover, the effects of the use
of technology on the people and suspicious persons are also described in this
report. In the effects, all of the related components like electricity, Wi-Fi,
type of communication devices which are using in this project are also
discussed as well as their effects too. In short, in this report, all aspect
and related information and the hardware and software languages are discussed
in this report the reader's convenience to take better understanding by reading
the introduction that what the techniques and the elements are used in this
project as well as what the project will do.