SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
International Journal of Managing Information Technology (IJMIT) Vol.14, No.3, August 2022
DOI: 10.5121/ijmit.2022.14302 23
DEEP LEARNING APPROACH FOR
EVENT MONITORING SYSTEM
Kummari Vikas, Thipparthi Rajabrahmam, Ponnam Venu,
and Shanmugasundaram Hariharan
Department of CSE, Vardhaman College of Engineering, Hyderabad, India
ABSTRACT
With an increasing number of extreme events and complexity, more alarms are being used to monitor
control rooms. Operators in the control rooms need to monitor and analyze these alarms to take suitable
actions to ensure the system’s stability and security. Security is the biggest concern in the modern world. It
is important to have a rigid surveillance that should guarantee protection from any sought of hazard.
Considering security, Closed Circuit TV (CCTV) cameras are being utilized for reconnaissance, but these
CCTV cameras require a person for supervision. As a human being, there can be a possibility to be tired
off in supervision at any point of time. So, we need a system to detect automatically. Thus, we came up with
a solution using YOLO V5. We have taken a data set and used robo-flow framework to enhance the existing
images into numerous variations where it will create a copy of grey scale image, a copy of its rotation and
a copy of its blurred version which will be used to get an enlarged data set. This work mainly focuses on
providing a secure environment using CCTV live footage as a source to detect the weapons. Using YOLO
algorithm, it divides an image from the video into grid system and each grid detects an object within itself.
KEYWORDS
Convolutional Neural network (CNN), YOLO algorithm, Kaggle, Support vector machine (SVM).
1. INTRODUCTION
Weapon or Anomaly recognition deals with the concept of detecting items that can be sporadic,
unexpected, and hazardous. Object detection highlights models to recognize cases of shifted
classification of items. Security is the greatest worry in the advanced world. Manual checking of
surveillance cameras isn't sufficient to recognize and respond to any perilous circumstances. In
the past two or three years, profound learning methods and Convolutional Neural Networks
(CNN's) have accomplished extraordinary heights in picture identification, order, division and it's
being utilized in a few applications. The progressions in innovation and furthermore the most
recent imaginative identification models like YOLO [1], Faster R-CNN [2], have accomplished
acceptable outcomes.
Weapon Detection frameworks need Real-time dealing with faster response times considering
their fundamental nature, hence the assessment should find complete methodology that speeds the
stretch of time area models [3]. The principal issues like the enormous number of misdirecting
negatives and counterfeit up-sides happen due to the challenges like relative shape and treatment
of non-weapon objects which are consistently handheld. Another critical test is ensuring that the
model doesn't forget to distinguish the weapon and solidifies an incredibly low counterfeit
negatives rate. The model should attempt to have the choice to avoid misdirecting up-sides from
the underpinning of those photos and accounts [4].
International Journal of Managing Information Technology (IJMIT) Vol.14, No.3, August 2022
24
Figure 1. Weapon Detection
To achieve this goal, this review progresses a model that could benefit models like YOLO which
take less time in distinguishing proof velocities. The responsibilities of this work integrate
diminishing how much counterfeit up-sides and negatives inside the space of Weapon Detection
by using Gaussian cloudiness to discard the establishment and simply address significant expert
in the space of Interest and its solidified use with YOLO v5 by SGD (Stochastic inclination
plummet) [5].
2. LITERATURE SURVEY
2.1. Existing System
In the existing system, there are few systems which are based on weapon detection, security-
based literature and other are irregular shaped object Detection and supporting literature. Weapon
detection and Security based literature are practically identical investigation prompted for
weapon area consolidates the work done RCNN and VGG-16 [6] on different informational
collections, accounts from YouTube and test the window approach. The speed of
acknowledgment shows up at 0.19 s per frame with the high precision rate. While other
examination works attempt client pre-processing utilizing double cameras to obscure the
foundation using Global Block Matching calculation, following the area of premium procedure
which builds their precision and brings down the bogus positive rate that adds velocity of the
model. The investigation work presented by CNN based model, on the speed of acknowledgment
to the extent that weapons like knives and blades [7], this was strong for indoor applications at
any rate extraordinary lighting conditions and reflections cut down the precision inside the
external application.
Irregular Shaped Object Detection and Supporting Literature is Utilization of different strategies
and profound learning approaches for the identification of different articles, among the one
research centers around the smoke delivered by the Gunfire to distinguish the arrangement of the
discharged gun. Other examination work incorporates utilizing the Faster-RCNN model to
recognize items and people on foot. Support vector machine (SVM) [8][9] was implemented to
do continuous apparel acknowledgment from reconnaissance recordings. The assessment work
revolves around face disclosure of terrible quality pictures using the facial credits presents inside
the image [10]. Other evaluation bases on multi-facet CNN consolidates and taking advantage of
the equivalent attributes to incorporate it for picture retrieval.
International Journal of Managing Information Technology (IJMIT) Vol.14, No.3, August 2022
25
3. PROPOSED METHODOLOGY
We propose video-based perception structure that might perform steady event recognizable proof.
We intend to diminish the speed of bogus negatives and misleading up-sides in weapon
identification while keeping the speed of recognition as a main boundary. The proposed approach
is implemented using You Only Look Once (YOLO) and Area of Interest (AOI). At first, the
models take pre-handled outlines where the foundation is eliminated by the usage of the Gaussian
haze calculation. It's promising to be utilized in the circle of safety and weapon identification.
Figure 2. Flow Chart
We have implemented weapon detection as one of the events from several event detection. In
this, we used the YOLO v5 algorithm for object detection, and the process flows as follows:
Once the user login, the user is redirected to the home page then the user can be able to see two
buttons those are start monitoring and stop monitoring. Once user clicks on Start monitoring, it
takes the video, processes in the real time frame and detects the object(weapon). [11] Once the
International Journal of Managing Information Technology (IJMIT) Vol.14, No.3, August 2022
26
object is detected, it sends a notification to the user and timer start from the mail sent. The
processing of video continues if the object is detected once again and if the time is less than 3
minutes then it won’t notify to the user, whereas if the time is greater than 3 minutes then it
notifies to the user again. It continues unless the user clicks on stop monitoring. You Only Look
Once is referred to as YOLO in an abbreviation. Version 5, released in June 2020, is now the
most sophisticated object detection algorithm on the market. It is a cutting-edge convolutional
neural network that accurately detects objects in real-time. This method processes the entire
image using a single neural network, then divides it into parts, forecasts bounding boxes and
probabilities for each component. The predicted probability weighs these bounding boxes. The
technique "only looks once" at the image means that it only does one forward propagation loop
through the neural network before making predictions. After non-max suppression (which
guarantees that the object detection method is working properly), it then delivers discovered
objects.
4. IMPLEMENTATION
4.1. Introduction to YOLO Algorithm
YOLO is a framework that utilizes brain organizations to supply constant item discovery. This
detection is famous because of its speed and exactness. It's been used in different applications to
identify traffic lights, individuals, stopping meters, and creatures. Object discovery could be a
peculiarity in PC vision that includes the location of differed objects in computerized pictures or
recordings. some of the items identified incorporate individuals, vehicles, seats, stones,
structures, and creatures. [12] YOLO is an abbreviation for the term ‘You Only Look Once’. This
is an algorithm that distinguishes and perceives different items in an image (progressively).
Object identification in YOLO is done as a relapse issue and gives the class probabilities of the
recognized pictures. YOLO calculation utilizes Convolutional Neural Network (CNN) to
recognize objects progressively. As the name recommends, the calculation requires just a solitary
forward proliferation through a brain organization to recognize objects. This implies that
expectation in the whole picture is done in a solitary calculation run. The CNN is utilized to
anticipate different class probabilities and bouncing boxes all the while.
4.2. Residual Blocks
To begin with, the picture is partitioned into different matrices. Every network has an element of
N x N. The accompanying portrait shows how an info picture is separated into matrices. In the
picture below, there are numerous lattice cells of equivalent aspect. Each network cell will
identify objects that show up inside them.
Figure 3. Residual Blocks
International Journal of Managing Information Technology (IJMIT) Vol.14, No.3, August 2022
27
4.3. Predict Localization Boxes
Figure 4. Localized Blocks
The figure above shows an illustration of a jumping box. The predict localization box has been
addressed by a yellow framework. The predict localization box is a diagram that features an item
in figure.
Each predict localization box confine the picture comprises of the accompanying credits:
Breadth (bw)
Tallness (bh)
Class (for instance, individual, vehicle, traffic signal, and so on)- This is addressed by letter c.
Predict localization box focus (px, py).
4.4. Intersection Over Union (IOU)
Intersection over union (IOU) is a peculiarity in object discovery that portrays how boundaries
cross-over [13]. YOLO purposes IOU to impeccably give a result box that encompasses the
articles. Every framework cell is liable for anticipating the bounding boxes and their certainty
scores [14]. The IOU is equivalent to 1 if the anticipated bouncing box is equivalent to the
genuine box. This component disposes predict localization boxes that are not equivalent to the
genuine box [15].
Figure 5. Intersection Over Union
International Journal of Managing Information Technology (IJMIT) Vol.14, No.3, August 2022
28
4.5. Mix of Three Methods
The accompanying picture shows how the three procedures are applied to deliver the end results.
Figure 6. YOLO Detection
5. EXPERIMENTAL RESULTS
Figure 7. Object Detection
Figure 8. Email Notification
International Journal of Managing Information Technology (IJMIT) Vol.14, No.3, August 2022
29
6. CONCLUSION AND FUTURE WORK
In this work, we have proposed a model to distinguish the weapons by handling the ongoing
video and advising the client by means of an email and this can be utilized with caution-based
frameworks in utilization of observation. We exploited one of the most up to date models, for
example, YOLO v5s which had extremely powerful outcomes and speed, we involved them for
the undertaking of weapon recognition. We further utilized the pre-handling strategy of obscuring
the foundation with Gaussian haze to improve our F1 score. The most encouraging outcomes are
acquired from the YOLO-v5 model prepared on the 3000-gun picture data-set with the option of
12,000 negative class pictures further as tried on YouTube recordings, our most prominent
outcomes accomplished 93% accuracy and 94% review on the video, these outcomes are superior
to the outcomes accomplished by comparative exploration, particularly the review score of our
model, moreover in light of the fact that the speed per outline with 0.01s which is quicker than
the Faster R-CNN model utilized by any other examination. This exploration is utilized in mix
with an email notice to supply powerful weapon recognition. In future, we will pivot upon this
model by utilizing other pre-processing methods like splendor control, we additionally found few
regions where the presentation of the model is frequently expanded by taking care of the issues
such as weapons which fluctuate from the nonexclusive look of guns, for which we can develop
strategies that help recognize moulded objects which are key difficulties inside the area of
weapon location.
We framed the title of the project as "Deep Learning Approach for Event Monitoring System"
because there may be several events where we can use the proposed model by YOLO v5. One of
the events is Weapon detection which we implemented at present. Some other events such as car
theft detection, unauthorized presence in restricted area can be implemented in future.
REFERENCES
[1] A. Sarda, S. Dixit and A. Bhan, "Object Detection for Autonomous Driving using YOLO [You Only
Look Once] algorithm," 2021 Third International Conference on Intelligent Communication
Technologies and Virtual Mobile Networks (ICICV), 2021, pp. 1370-1374, doi:
10.1109/ICICV50876.2021.9388577.
[2] Y. Qian, H. Zheng, D. He, Z. Zhang and Z. Zhang, "R-CNN Object Detection Inference With Deep
Learning Accelerator," 2018 IEEE/CIC International Conference on Communications in China
(ICCC Workshops), 2018, pp. 297-302, doi: 10.1109/ICCChinaW.2018.8674519.
[3] J. Kapur and J. Baregar, A, “Security Using Image Processing. International Journal of Managing
Information Technology”, 5(2), 13–21. doi:10.5121/ijmit.2013.5202 , 2013.
[4] J. Mishra & A. Sharma and K. Chaturvedi, “An Unsupervised Cluster-based Image Retrieval
Algorithm using Relevance Feedback”, International Journal of Managing Information Technology.
3. 10.5121/ijmit.2011.3202, 2011.
[5] R. G. J. Wijnhoven and P. H. N. de With, "Fast Training of Object Detection Using Stochastic
Gradient Descent," 2010 20th International Conference on Pattern Recognition, 2010, pp. 424-427,
doi: 10.1109/ICPR.2010.112. M. Grega, A. Matiolałski, P. Guzik, and M. Leszczuk, ‘‘Automated
detection of firearms and knives in a CCTV image,’’ Sensors, vol. 16, no. 1, p. 47, Jan. 2016.
[6] H. Qassim, A. Verma and D. Feinzimer, "Compressed residual-VGG16 CNN model for big data
places image recognition," 2018 IEEE 8th Annual Computing and Communication Workshop and
Conference (CCWC), 2018, pp. 169-175, doi: 10.1109/CCWC.2018.8301729.
[7] M. Grega, A. Matiolałski, P. Guzik, and M. Leszczuk, ‘‘Automated detection of firearms and knives
in a CCTV image,’’ Sensors, vol. 16, no. 1, p. 47, Jan. 2016.
[8] M. Pontil and A. Verri, "Support vector machines for 3D object recognition," in IEEE Transactions
on Pattern Analysis and Machine Intelligence, vol. 20, no. 6, pp. 637-646, June, doi:
10.1109/34.683777, 1998.
International Journal of Managing Information Technology (IJMIT) Vol.14, No.3, August 2022
30
[9] S. Conlon, L. Simmons and F. Liu, “Predicting Tech Employee Job Satisfaction Using Machine
Learning Techniques”, International Journal of Managing Information Technology, Vol. 16, pp. 72–
88, Jun. 2021.
[10] R.Z Khan and H. Allamy, “Training Algorithms for Supervised Machine Learning: Comparative
Study”, International Journal of Managing Information Technology, Vol.4, pp 354-360.
10.24297/ijmit.v4i3.773, 2013.
[11] LMuhammad Tahir Bhatti, Muhammad Gufran Khan, Masood Aslam, and Muhammad Junaid Fiaz.
“Weapon Detection in Real-Time CCTV Videos Using Deep Learning”. In: IEEE Access 9, pp.
34366–34382, 2021.
[12] C. L. Li and C. Y. Su, "Multi-Connection of Double Residual Block for YOLOv5 Object Detection,"
2022 8th International Conference on Applied System Innovation (ICASI), pp. 13-16, doi:
10.1109/ICASI55125.2022.9774468, 2022.
[13] A. N. Gajjar and J. Jethva, "Intersection over Union based analysis of Image detection/segmentation
using CNN model," 2022 Second International Conference on Power, Control and Computing
Technologies (ICPC2T), pp. 1-6, doi: 10.1109/ICPC2T53885.2022.9776896, 2022.
[14] V. B. S. Mahalleh, T. A. ALQutami and I. A. Mahmood, "YOLO-Based Valve Type Recognition and
Localization," 2019 IEEE 6th International Conference on Industrial Engineering and Applications
(ICIEA), pp. 37-40, doi: 10.1109/IEA.2019.8715012, 2019.
[15] S. Du, B. Zhang, P. Zhang and P. Xiang, "An Improved Bounding Box Regression Loss Function
Based on CIOU Loss for Multi-scale Object Detection," 2021 IEEE 2nd International Conference on
Pattern Recognition and Machine Learning (PRML), pp. 92-98, doi:
10.1109/PRML52754.2021.9520717, 2021.

Contenu connexe

Similaire à DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM

IRJET- A Review Analysis to Detect an Object in Video Surveillance System
IRJET- A Review Analysis to Detect an Object in Video Surveillance SystemIRJET- A Review Analysis to Detect an Object in Video Surveillance System
IRJET- A Review Analysis to Detect an Object in Video Surveillance SystemIRJET Journal
 
Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...IJECEIAES
 
SENSITIVITY OF A VIDEO SURVEILLANCE SYSTEM BASED ON MOTION DETECTION
SENSITIVITY OF A VIDEO SURVEILLANCE SYSTEM BASED ON MOTION DETECTIONSENSITIVITY OF A VIDEO SURVEILLANCE SYSTEM BASED ON MOTION DETECTION
SENSITIVITY OF A VIDEO SURVEILLANCE SYSTEM BASED ON MOTION DETECTIONsipij
 
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET Journal
 
Analysis of Human Behavior Based On Centroid and Treading Track
Analysis of Human Behavior Based On Centroid and Treading  TrackAnalysis of Human Behavior Based On Centroid and Treading  Track
Analysis of Human Behavior Based On Centroid and Treading TrackIJMER
 
Object Detetcion using SSD-MobileNet
Object Detetcion using SSD-MobileNetObject Detetcion using SSD-MobileNet
Object Detetcion using SSD-MobileNetIRJET Journal
 
Paper id 25201468
Paper id 25201468Paper id 25201468
Paper id 25201468IJRAT
 
Object and Currency Detection for the Visually Impaired
Object and Currency Detection for the Visually ImpairedObject and Currency Detection for the Visually Impaired
Object and Currency Detection for the Visually ImpairedIRJET Journal
 
IRJET - Direct Me-Nevigation for Blind People
IRJET -  	  Direct Me-Nevigation for Blind PeopleIRJET -  	  Direct Me-Nevigation for Blind People
IRJET - Direct Me-Nevigation for Blind PeopleIRJET Journal
 
APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...
APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...
APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...ijitcs
 
You only look once model-based object identification in computer vision
You only look once model-based object identification in computer visionYou only look once model-based object identification in computer vision
You only look once model-based object identification in computer visionIAESIJAI
 
Abnormal activity detection in surveillance video scenes
Abnormal activity detection in surveillance video scenesAbnormal activity detection in surveillance video scenes
Abnormal activity detection in surveillance video scenesTELKOMNIKA JOURNAL
 
IRJET- Prediction of Anomalous Activities in a Video
IRJET-  	  Prediction of Anomalous Activities in a VideoIRJET-  	  Prediction of Anomalous Activities in a Video
IRJET- Prediction of Anomalous Activities in a VideoIRJET Journal
 
ROAD POTHOLE DETECTION USING YOLOV4 DARKNET
ROAD POTHOLE DETECTION USING YOLOV4 DARKNETROAD POTHOLE DETECTION USING YOLOV4 DARKNET
ROAD POTHOLE DETECTION USING YOLOV4 DARKNETIRJET Journal
 
Real Time Crime Detection using Deep Learning
Real Time Crime Detection using Deep LearningReal Time Crime Detection using Deep Learning
Real Time Crime Detection using Deep LearningIRJET Journal
 
Sanjaya: A Blind Assistance System
Sanjaya: A Blind Assistance SystemSanjaya: A Blind Assistance System
Sanjaya: A Blind Assistance SystemIRJET Journal
 
SURVEILLANCE VIDEO BASED ROBUST DETECTION AND NOTIFICATION OF REAL TIME SUSPI...
SURVEILLANCE VIDEO BASED ROBUST DETECTION AND NOTIFICATION OF REAL TIME SUSPI...SURVEILLANCE VIDEO BASED ROBUST DETECTION AND NOTIFICATION OF REAL TIME SUSPI...
SURVEILLANCE VIDEO BASED ROBUST DETECTION AND NOTIFICATION OF REAL TIME SUSPI...cscpconf
 
Surveillance Video Based Robust Detection and Notification of Real Time Suspi...
Surveillance Video Based Robust Detection and Notification of Real Time Suspi...Surveillance Video Based Robust Detection and Notification of Real Time Suspi...
Surveillance Video Based Robust Detection and Notification of Real Time Suspi...csandit
 
Survey on video object detection & tracking
Survey on video object detection & trackingSurvey on video object detection & tracking
Survey on video object detection & trackingijctet
 

Similaire à DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM (20)

IRJET- A Review Analysis to Detect an Object in Video Surveillance System
IRJET- A Review Analysis to Detect an Object in Video Surveillance SystemIRJET- A Review Analysis to Detect an Object in Video Surveillance System
IRJET- A Review Analysis to Detect an Object in Video Surveillance System
 
Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...
 
SENSITIVITY OF A VIDEO SURVEILLANCE SYSTEM BASED ON MOTION DETECTION
SENSITIVITY OF A VIDEO SURVEILLANCE SYSTEM BASED ON MOTION DETECTIONSENSITIVITY OF A VIDEO SURVEILLANCE SYSTEM BASED ON MOTION DETECTION
SENSITIVITY OF A VIDEO SURVEILLANCE SYSTEM BASED ON MOTION DETECTION
 
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
 
Analysis of Human Behavior Based On Centroid and Treading Track
Analysis of Human Behavior Based On Centroid and Treading  TrackAnalysis of Human Behavior Based On Centroid and Treading  Track
Analysis of Human Behavior Based On Centroid and Treading Track
 
Object Detetcion using SSD-MobileNet
Object Detetcion using SSD-MobileNetObject Detetcion using SSD-MobileNet
Object Detetcion using SSD-MobileNet
 
Paper id 25201468
Paper id 25201468Paper id 25201468
Paper id 25201468
 
Object and Currency Detection for the Visually Impaired
Object and Currency Detection for the Visually ImpairedObject and Currency Detection for the Visually Impaired
Object and Currency Detection for the Visually Impaired
 
IRJET - Direct Me-Nevigation for Blind People
IRJET -  	  Direct Me-Nevigation for Blind PeopleIRJET -  	  Direct Me-Nevigation for Blind People
IRJET - Direct Me-Nevigation for Blind People
 
APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...
APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...
APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...
 
Q180305116119
Q180305116119Q180305116119
Q180305116119
 
You only look once model-based object identification in computer vision
You only look once model-based object identification in computer visionYou only look once model-based object identification in computer vision
You only look once model-based object identification in computer vision
 
Abnormal activity detection in surveillance video scenes
Abnormal activity detection in surveillance video scenesAbnormal activity detection in surveillance video scenes
Abnormal activity detection in surveillance video scenes
 
IRJET- Prediction of Anomalous Activities in a Video
IRJET-  	  Prediction of Anomalous Activities in a VideoIRJET-  	  Prediction of Anomalous Activities in a Video
IRJET- Prediction of Anomalous Activities in a Video
 
ROAD POTHOLE DETECTION USING YOLOV4 DARKNET
ROAD POTHOLE DETECTION USING YOLOV4 DARKNETROAD POTHOLE DETECTION USING YOLOV4 DARKNET
ROAD POTHOLE DETECTION USING YOLOV4 DARKNET
 
Real Time Crime Detection using Deep Learning
Real Time Crime Detection using Deep LearningReal Time Crime Detection using Deep Learning
Real Time Crime Detection using Deep Learning
 
Sanjaya: A Blind Assistance System
Sanjaya: A Blind Assistance SystemSanjaya: A Blind Assistance System
Sanjaya: A Blind Assistance System
 
SURVEILLANCE VIDEO BASED ROBUST DETECTION AND NOTIFICATION OF REAL TIME SUSPI...
SURVEILLANCE VIDEO BASED ROBUST DETECTION AND NOTIFICATION OF REAL TIME SUSPI...SURVEILLANCE VIDEO BASED ROBUST DETECTION AND NOTIFICATION OF REAL TIME SUSPI...
SURVEILLANCE VIDEO BASED ROBUST DETECTION AND NOTIFICATION OF REAL TIME SUSPI...
 
Surveillance Video Based Robust Detection and Notification of Real Time Suspi...
Surveillance Video Based Robust Detection and Notification of Real Time Suspi...Surveillance Video Based Robust Detection and Notification of Real Time Suspi...
Surveillance Video Based Robust Detection and Notification of Real Time Suspi...
 
Survey on video object detection & tracking
Survey on video object detection & trackingSurvey on video object detection & tracking
Survey on video object detection & tracking
 

Plus de IJMIT JOURNAL

MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...IJMIT JOURNAL
 
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...IJMIT JOURNAL
 
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedInternational Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedIJMIT JOURNAL
 
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedInternational Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedIJMIT JOURNAL
 
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...IJMIT JOURNAL
 
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...IJMIT JOURNAL
 
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTINTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTIJMIT JOURNAL
 
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...IJMIT JOURNAL
 
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIOD
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIODEFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIOD
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIODIJMIT JOURNAL
 
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedInternational Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedIJMIT JOURNAL
 
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)IJMIT JOURNAL
 
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUE
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUETRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUE
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUEIJMIT JOURNAL
 
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...IJMIT JOURNAL
 
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERING
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERINGBUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERING
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERINGIJMIT JOURNAL
 
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...IJMIT JOURNAL
 
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATIONNETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATIONIJMIT JOURNAL
 
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...IJMIT JOURNAL
 
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...IJMIT JOURNAL
 
Multimodal Course Design and Implementation using LEML and LMS for Instructio...
Multimodal Course Design and Implementation using LEML and LMS for Instructio...Multimodal Course Design and Implementation using LEML and LMS for Instructio...
Multimodal Course Design and Implementation using LEML and LMS for Instructio...IJMIT JOURNAL
 

Plus de IJMIT JOURNAL (20)

MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
 
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...
 
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedInternational Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
 
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedInternational Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
 
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...
 
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
 
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTINTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
 
15223ijmit02.pdf
15223ijmit02.pdf15223ijmit02.pdf
15223ijmit02.pdf
 
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
 
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIOD
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIODEFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIOD
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIOD
 
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedInternational Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
 
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
 
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUE
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUETRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUE
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUE
 
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...
 
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERING
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERINGBUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERING
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERING
 
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
 
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATIONNETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
 
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...
 
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
 
Multimodal Course Design and Implementation using LEML and LMS for Instructio...
Multimodal Course Design and Implementation using LEML and LMS for Instructio...Multimodal Course Design and Implementation using LEML and LMS for Instructio...
Multimodal Course Design and Implementation using LEML and LMS for Instructio...
 

Dernier

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Dernier (20)

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 

DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM

  • 1. International Journal of Managing Information Technology (IJMIT) Vol.14, No.3, August 2022 DOI: 10.5121/ijmit.2022.14302 23 DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM Kummari Vikas, Thipparthi Rajabrahmam, Ponnam Venu, and Shanmugasundaram Hariharan Department of CSE, Vardhaman College of Engineering, Hyderabad, India ABSTRACT With an increasing number of extreme events and complexity, more alarms are being used to monitor control rooms. Operators in the control rooms need to monitor and analyze these alarms to take suitable actions to ensure the system’s stability and security. Security is the biggest concern in the modern world. It is important to have a rigid surveillance that should guarantee protection from any sought of hazard. Considering security, Closed Circuit TV (CCTV) cameras are being utilized for reconnaissance, but these CCTV cameras require a person for supervision. As a human being, there can be a possibility to be tired off in supervision at any point of time. So, we need a system to detect automatically. Thus, we came up with a solution using YOLO V5. We have taken a data set and used robo-flow framework to enhance the existing images into numerous variations where it will create a copy of grey scale image, a copy of its rotation and a copy of its blurred version which will be used to get an enlarged data set. This work mainly focuses on providing a secure environment using CCTV live footage as a source to detect the weapons. Using YOLO algorithm, it divides an image from the video into grid system and each grid detects an object within itself. KEYWORDS Convolutional Neural network (CNN), YOLO algorithm, Kaggle, Support vector machine (SVM). 1. INTRODUCTION Weapon or Anomaly recognition deals with the concept of detecting items that can be sporadic, unexpected, and hazardous. Object detection highlights models to recognize cases of shifted classification of items. Security is the greatest worry in the advanced world. Manual checking of surveillance cameras isn't sufficient to recognize and respond to any perilous circumstances. In the past two or three years, profound learning methods and Convolutional Neural Networks (CNN's) have accomplished extraordinary heights in picture identification, order, division and it's being utilized in a few applications. The progressions in innovation and furthermore the most recent imaginative identification models like YOLO [1], Faster R-CNN [2], have accomplished acceptable outcomes. Weapon Detection frameworks need Real-time dealing with faster response times considering their fundamental nature, hence the assessment should find complete methodology that speeds the stretch of time area models [3]. The principal issues like the enormous number of misdirecting negatives and counterfeit up-sides happen due to the challenges like relative shape and treatment of non-weapon objects which are consistently handheld. Another critical test is ensuring that the model doesn't forget to distinguish the weapon and solidifies an incredibly low counterfeit negatives rate. The model should attempt to have the choice to avoid misdirecting up-sides from the underpinning of those photos and accounts [4].
  • 2. International Journal of Managing Information Technology (IJMIT) Vol.14, No.3, August 2022 24 Figure 1. Weapon Detection To achieve this goal, this review progresses a model that could benefit models like YOLO which take less time in distinguishing proof velocities. The responsibilities of this work integrate diminishing how much counterfeit up-sides and negatives inside the space of Weapon Detection by using Gaussian cloudiness to discard the establishment and simply address significant expert in the space of Interest and its solidified use with YOLO v5 by SGD (Stochastic inclination plummet) [5]. 2. LITERATURE SURVEY 2.1. Existing System In the existing system, there are few systems which are based on weapon detection, security- based literature and other are irregular shaped object Detection and supporting literature. Weapon detection and Security based literature are practically identical investigation prompted for weapon area consolidates the work done RCNN and VGG-16 [6] on different informational collections, accounts from YouTube and test the window approach. The speed of acknowledgment shows up at 0.19 s per frame with the high precision rate. While other examination works attempt client pre-processing utilizing double cameras to obscure the foundation using Global Block Matching calculation, following the area of premium procedure which builds their precision and brings down the bogus positive rate that adds velocity of the model. The investigation work presented by CNN based model, on the speed of acknowledgment to the extent that weapons like knives and blades [7], this was strong for indoor applications at any rate extraordinary lighting conditions and reflections cut down the precision inside the external application. Irregular Shaped Object Detection and Supporting Literature is Utilization of different strategies and profound learning approaches for the identification of different articles, among the one research centers around the smoke delivered by the Gunfire to distinguish the arrangement of the discharged gun. Other examination work incorporates utilizing the Faster-RCNN model to recognize items and people on foot. Support vector machine (SVM) [8][9] was implemented to do continuous apparel acknowledgment from reconnaissance recordings. The assessment work revolves around face disclosure of terrible quality pictures using the facial credits presents inside the image [10]. Other evaluation bases on multi-facet CNN consolidates and taking advantage of the equivalent attributes to incorporate it for picture retrieval.
  • 3. International Journal of Managing Information Technology (IJMIT) Vol.14, No.3, August 2022 25 3. PROPOSED METHODOLOGY We propose video-based perception structure that might perform steady event recognizable proof. We intend to diminish the speed of bogus negatives and misleading up-sides in weapon identification while keeping the speed of recognition as a main boundary. The proposed approach is implemented using You Only Look Once (YOLO) and Area of Interest (AOI). At first, the models take pre-handled outlines where the foundation is eliminated by the usage of the Gaussian haze calculation. It's promising to be utilized in the circle of safety and weapon identification. Figure 2. Flow Chart We have implemented weapon detection as one of the events from several event detection. In this, we used the YOLO v5 algorithm for object detection, and the process flows as follows: Once the user login, the user is redirected to the home page then the user can be able to see two buttons those are start monitoring and stop monitoring. Once user clicks on Start monitoring, it takes the video, processes in the real time frame and detects the object(weapon). [11] Once the
  • 4. International Journal of Managing Information Technology (IJMIT) Vol.14, No.3, August 2022 26 object is detected, it sends a notification to the user and timer start from the mail sent. The processing of video continues if the object is detected once again and if the time is less than 3 minutes then it won’t notify to the user, whereas if the time is greater than 3 minutes then it notifies to the user again. It continues unless the user clicks on stop monitoring. You Only Look Once is referred to as YOLO in an abbreviation. Version 5, released in June 2020, is now the most sophisticated object detection algorithm on the market. It is a cutting-edge convolutional neural network that accurately detects objects in real-time. This method processes the entire image using a single neural network, then divides it into parts, forecasts bounding boxes and probabilities for each component. The predicted probability weighs these bounding boxes. The technique "only looks once" at the image means that it only does one forward propagation loop through the neural network before making predictions. After non-max suppression (which guarantees that the object detection method is working properly), it then delivers discovered objects. 4. IMPLEMENTATION 4.1. Introduction to YOLO Algorithm YOLO is a framework that utilizes brain organizations to supply constant item discovery. This detection is famous because of its speed and exactness. It's been used in different applications to identify traffic lights, individuals, stopping meters, and creatures. Object discovery could be a peculiarity in PC vision that includes the location of differed objects in computerized pictures or recordings. some of the items identified incorporate individuals, vehicles, seats, stones, structures, and creatures. [12] YOLO is an abbreviation for the term ‘You Only Look Once’. This is an algorithm that distinguishes and perceives different items in an image (progressively). Object identification in YOLO is done as a relapse issue and gives the class probabilities of the recognized pictures. YOLO calculation utilizes Convolutional Neural Network (CNN) to recognize objects progressively. As the name recommends, the calculation requires just a solitary forward proliferation through a brain organization to recognize objects. This implies that expectation in the whole picture is done in a solitary calculation run. The CNN is utilized to anticipate different class probabilities and bouncing boxes all the while. 4.2. Residual Blocks To begin with, the picture is partitioned into different matrices. Every network has an element of N x N. The accompanying portrait shows how an info picture is separated into matrices. In the picture below, there are numerous lattice cells of equivalent aspect. Each network cell will identify objects that show up inside them. Figure 3. Residual Blocks
  • 5. International Journal of Managing Information Technology (IJMIT) Vol.14, No.3, August 2022 27 4.3. Predict Localization Boxes Figure 4. Localized Blocks The figure above shows an illustration of a jumping box. The predict localization box has been addressed by a yellow framework. The predict localization box is a diagram that features an item in figure. Each predict localization box confine the picture comprises of the accompanying credits: Breadth (bw) Tallness (bh) Class (for instance, individual, vehicle, traffic signal, and so on)- This is addressed by letter c. Predict localization box focus (px, py). 4.4. Intersection Over Union (IOU) Intersection over union (IOU) is a peculiarity in object discovery that portrays how boundaries cross-over [13]. YOLO purposes IOU to impeccably give a result box that encompasses the articles. Every framework cell is liable for anticipating the bounding boxes and their certainty scores [14]. The IOU is equivalent to 1 if the anticipated bouncing box is equivalent to the genuine box. This component disposes predict localization boxes that are not equivalent to the genuine box [15]. Figure 5. Intersection Over Union
  • 6. International Journal of Managing Information Technology (IJMIT) Vol.14, No.3, August 2022 28 4.5. Mix of Three Methods The accompanying picture shows how the three procedures are applied to deliver the end results. Figure 6. YOLO Detection 5. EXPERIMENTAL RESULTS Figure 7. Object Detection Figure 8. Email Notification
  • 7. International Journal of Managing Information Technology (IJMIT) Vol.14, No.3, August 2022 29 6. CONCLUSION AND FUTURE WORK In this work, we have proposed a model to distinguish the weapons by handling the ongoing video and advising the client by means of an email and this can be utilized with caution-based frameworks in utilization of observation. We exploited one of the most up to date models, for example, YOLO v5s which had extremely powerful outcomes and speed, we involved them for the undertaking of weapon recognition. We further utilized the pre-handling strategy of obscuring the foundation with Gaussian haze to improve our F1 score. The most encouraging outcomes are acquired from the YOLO-v5 model prepared on the 3000-gun picture data-set with the option of 12,000 negative class pictures further as tried on YouTube recordings, our most prominent outcomes accomplished 93% accuracy and 94% review on the video, these outcomes are superior to the outcomes accomplished by comparative exploration, particularly the review score of our model, moreover in light of the fact that the speed per outline with 0.01s which is quicker than the Faster R-CNN model utilized by any other examination. This exploration is utilized in mix with an email notice to supply powerful weapon recognition. In future, we will pivot upon this model by utilizing other pre-processing methods like splendor control, we additionally found few regions where the presentation of the model is frequently expanded by taking care of the issues such as weapons which fluctuate from the nonexclusive look of guns, for which we can develop strategies that help recognize moulded objects which are key difficulties inside the area of weapon location. We framed the title of the project as "Deep Learning Approach for Event Monitoring System" because there may be several events where we can use the proposed model by YOLO v5. One of the events is Weapon detection which we implemented at present. Some other events such as car theft detection, unauthorized presence in restricted area can be implemented in future. REFERENCES [1] A. Sarda, S. Dixit and A. Bhan, "Object Detection for Autonomous Driving using YOLO [You Only Look Once] algorithm," 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), 2021, pp. 1370-1374, doi: 10.1109/ICICV50876.2021.9388577. [2] Y. Qian, H. Zheng, D. He, Z. Zhang and Z. Zhang, "R-CNN Object Detection Inference With Deep Learning Accelerator," 2018 IEEE/CIC International Conference on Communications in China (ICCC Workshops), 2018, pp. 297-302, doi: 10.1109/ICCChinaW.2018.8674519. [3] J. Kapur and J. Baregar, A, “Security Using Image Processing. International Journal of Managing Information Technology”, 5(2), 13–21. doi:10.5121/ijmit.2013.5202 , 2013. [4] J. Mishra & A. Sharma and K. Chaturvedi, “An Unsupervised Cluster-based Image Retrieval Algorithm using Relevance Feedback”, International Journal of Managing Information Technology. 3. 10.5121/ijmit.2011.3202, 2011. [5] R. G. J. Wijnhoven and P. H. N. de With, "Fast Training of Object Detection Using Stochastic Gradient Descent," 2010 20th International Conference on Pattern Recognition, 2010, pp. 424-427, doi: 10.1109/ICPR.2010.112. M. Grega, A. Matiolałski, P. Guzik, and M. Leszczuk, ‘‘Automated detection of firearms and knives in a CCTV image,’’ Sensors, vol. 16, no. 1, p. 47, Jan. 2016. [6] H. Qassim, A. Verma and D. Feinzimer, "Compressed residual-VGG16 CNN model for big data places image recognition," 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), 2018, pp. 169-175, doi: 10.1109/CCWC.2018.8301729. [7] M. Grega, A. Matiolałski, P. Guzik, and M. Leszczuk, ‘‘Automated detection of firearms and knives in a CCTV image,’’ Sensors, vol. 16, no. 1, p. 47, Jan. 2016. [8] M. Pontil and A. Verri, "Support vector machines for 3D object recognition," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 20, no. 6, pp. 637-646, June, doi: 10.1109/34.683777, 1998.
  • 8. International Journal of Managing Information Technology (IJMIT) Vol.14, No.3, August 2022 30 [9] S. Conlon, L. Simmons and F. Liu, “Predicting Tech Employee Job Satisfaction Using Machine Learning Techniques”, International Journal of Managing Information Technology, Vol. 16, pp. 72– 88, Jun. 2021. [10] R.Z Khan and H. Allamy, “Training Algorithms for Supervised Machine Learning: Comparative Study”, International Journal of Managing Information Technology, Vol.4, pp 354-360. 10.24297/ijmit.v4i3.773, 2013. [11] LMuhammad Tahir Bhatti, Muhammad Gufran Khan, Masood Aslam, and Muhammad Junaid Fiaz. “Weapon Detection in Real-Time CCTV Videos Using Deep Learning”. In: IEEE Access 9, pp. 34366–34382, 2021. [12] C. L. Li and C. Y. Su, "Multi-Connection of Double Residual Block for YOLOv5 Object Detection," 2022 8th International Conference on Applied System Innovation (ICASI), pp. 13-16, doi: 10.1109/ICASI55125.2022.9774468, 2022. [13] A. N. Gajjar and J. Jethva, "Intersection over Union based analysis of Image detection/segmentation using CNN model," 2022 Second International Conference on Power, Control and Computing Technologies (ICPC2T), pp. 1-6, doi: 10.1109/ICPC2T53885.2022.9776896, 2022. [14] V. B. S. Mahalleh, T. A. ALQutami and I. A. Mahmood, "YOLO-Based Valve Type Recognition and Localization," 2019 IEEE 6th International Conference on Industrial Engineering and Applications (ICIEA), pp. 37-40, doi: 10.1109/IEA.2019.8715012, 2019. [15] S. Du, B. Zhang, P. Zhang and P. Xiang, "An Improved Bounding Box Regression Loss Function Based on CIOU Loss for Multi-scale Object Detection," 2021 IEEE 2nd International Conference on Pattern Recognition and Machine Learning (PRML), pp. 92-98, doi: 10.1109/PRML52754.2021.9520717, 2021.