SlideShare a Scribd company logo
1 of 2
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
Suspicious Activity Detection
ABSTRACT
With the increasing in the number of anti-social activates that have been taking place, security
has been given utmost importance lately. Many Organizations have installed CCTVs for constant
Monitoring of people and their interactions. For a developed Country with a population of 64
million, every person is captured by a camera 30 times a day. A lot of video data generated and
stored for a certain time duration. A 704x576 resolution image recorded at 25fps will generate
roughly 20GB per day. Constant Monitoring of data by humans to judge if the events are
abnormal is near impossible task as requires a workforce and their constant attention. This
creates a need to automate the same. Also , there is need to show in which frame and which part
of it contain the unusual activity which aid the faster judgment of the unusual activity being
abnormal. This is done by converting video into frames and analyzing the persons and their
activates from the processed frame .Machine learning and Deep Learning Algorithms and
techniques support us in a wide accept to make Possible.
EXISTING SYSTEM:
Video Surveillance system is a collection of video, electronic and wireless components to ensure the
continuousorperiodicvideorecordingformonitoringthe various importantpubliclocations.Due to the
increased crime rate and instable incidents are happening around the world many organizations are
deploying video surveillance systems at their locations with CCTV cameras. Now a day we can notice
these camerasat variouspubliclocationslikebusstops,shoppingmalls,holyplaces,streets,educational
institutes,publicmeetingsetc.The capturedvideodataisuseful topreventthe threat before crime and
becoming a good forensic evidence to identify criminals after crime.
Disadvantages:
PROPOSED SYSTEM
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
In this project we need to detect person behaviour as suspicious or not, now a day’s
every where CCTV cameras are installed which capture videos and store at
centralized server and manually scanning those videos to detect suspicious activity
from human required lots of human efforts and time. To overcome from such issue
author is asking to automate such process using Machine Learning Algorithms.
To automate that process first we need to build training model using huge amount
of images (all possible images which describe features of suspicious activities) and
‘Convolution Neural Network’ using TENSOR FLOW Python module.
Then we can upload any video and then application will extract frames from
uploaded video and then that frame will be applied on train model to predict its
class such as ‘suspicious or normal’.

More Related Content

What's hot

Human activity recognition
Human activity recognition Human activity recognition
Human activity recognition
srikanthgadam
 
Vehicle Theft control system
Vehicle Theft control systemVehicle Theft control system
Vehicle Theft control system
Ankush Jamthikar
 

What's hot (20)

Eye mouse
Eye mouseEye mouse
Eye mouse
 
Facial Emotion Recognition: A Deep Learning approach
Facial Emotion Recognition: A Deep Learning approachFacial Emotion Recognition: A Deep Learning approach
Facial Emotion Recognition: A Deep Learning approach
 
Criminal Record Management
Criminal Record ManagementCriminal Record Management
Criminal Record Management
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Driver Drowsiness Detection report
Driver Drowsiness Detection reportDriver Drowsiness Detection report
Driver Drowsiness Detection report
 
Human activity recognition
Human activity recognition Human activity recognition
Human activity recognition
 
Introduction to Computer Vision.pdf
Introduction to Computer Vision.pdfIntroduction to Computer Vision.pdf
Introduction to Computer Vision.pdf
 
Presentation slides on Child Tracking System
Presentation slides on Child Tracking SystemPresentation slides on Child Tracking System
Presentation slides on Child Tracking System
 
face detection
face detectionface detection
face detection
 
Automated attendance system using Face recognition
Automated attendance system using Face recognitionAutomated attendance system using Face recognition
Automated attendance system using Face recognition
 
Lecture 1 for Digital Image Processing (2nd Edition)
Lecture 1 for Digital Image Processing (2nd Edition)Lecture 1 for Digital Image Processing (2nd Edition)
Lecture 1 for Digital Image Processing (2nd Edition)
 
Online crime reporting system ppt
Online crime reporting system  pptOnline crime reporting system  ppt
Online crime reporting system ppt
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and Python
 
Attendance Management System using Face Recognition
Attendance Management System using Face RecognitionAttendance Management System using Face Recognition
Attendance Management System using Face Recognition
 
Vehicle Theft control system
Vehicle Theft control systemVehicle Theft control system
Vehicle Theft control system
 
Secured vehicle control system
Secured vehicle control systemSecured vehicle control system
Secured vehicle control system
 
IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...
 
seminar on invisible eye
seminar on invisible eyeseminar on invisible eye
seminar on invisible eye
 
Gesture Recognition
Gesture RecognitionGesture Recognition
Gesture Recognition
 

Similar to Suspicious Activity Detection python Project Abstract

Broucher Soft copy
Broucher Soft copyBroucher Soft copy
Broucher Soft copy
evsrao
 
Video Liveness Verification
Video Liveness VerificationVideo Liveness Verification
Video Liveness Verification
ijtsrd
 
A Thorough Study on Video Integrity using Blockchain
A Thorough Study on Video Integrity using BlockchainA Thorough Study on Video Integrity using Blockchain
A Thorough Study on Video Integrity using Blockchain
ijtsrd
 
Implementation of-a-motion-detection-system
Implementation of-a-motion-detection-systemImplementation of-a-motion-detection-system
Implementation of-a-motion-detection-system
Cemal Ardil
 
MINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptxMINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptx
swathiravishankar3
 

Similar to Suspicious Activity Detection python Project Abstract (20)

IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
 
Background Subtraction Algorithm Based Human Behavior Detection
Background Subtraction Algorithm Based Human Behavior DetectionBackground Subtraction Algorithm Based Human Behavior Detection
Background Subtraction Algorithm Based Human Behavior Detection
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
 
Broucher Soft copy
Broucher Soft copyBroucher Soft copy
Broucher Soft copy
 
IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...
IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...
IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...
 
VORTEX
VORTEXVORTEX
VORTEX
 
A Review on Motion Detection Techniques
A Review on Motion Detection TechniquesA Review on Motion Detection Techniques
A Review on Motion Detection Techniques
 
ATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural NetworksATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural Networks
 
Video Liveness Verification
Video Liveness VerificationVideo Liveness Verification
Video Liveness Verification
 
REAL-TIME VIDEO SURVEILLANCE USING RASPBERRY PI
REAL-TIME VIDEO SURVEILLANCE USING RASPBERRY PIREAL-TIME VIDEO SURVEILLANCE USING RASPBERRY PI
REAL-TIME VIDEO SURVEILLANCE USING RASPBERRY PI
 
Advanced Intelligent Video Surveillance System In Elevators By Using OpenCV
Advanced Intelligent Video Surveillance System In Elevators By Using OpenCVAdvanced Intelligent Video Surveillance System In Elevators By Using OpenCV
Advanced Intelligent Video Surveillance System In Elevators By Using OpenCV
 
A Thorough Study on Video Integrity using Blockchain
A Thorough Study on Video Integrity using BlockchainA Thorough Study on Video Integrity using Blockchain
A Thorough Study on Video Integrity using Blockchain
 
Implementation of-a-motion-detection-system
Implementation of-a-motion-detection-systemImplementation of-a-motion-detection-system
Implementation of-a-motion-detection-system
 
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural NetworksIRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
 
MINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptxMINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptx
 
foot crime final for awareness site .pptx
foot crime final for awareness site .pptxfoot crime final for awareness site .pptx
foot crime final for awareness site .pptx
 
CREATING CCTV CAMERA SYSTEM USING ARTIFICIAL INTELLIGENCE, IMAGE PROCESSING, ...
CREATING CCTV CAMERA SYSTEM USING ARTIFICIAL INTELLIGENCE, IMAGE PROCESSING, ...CREATING CCTV CAMERA SYSTEM USING ARTIFICIAL INTELLIGENCE, IMAGE PROCESSING, ...
CREATING CCTV CAMERA SYSTEM USING ARTIFICIAL INTELLIGENCE, IMAGE PROCESSING, ...
 
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCECRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
 
Face Recognition System using OpenCV
Face Recognition System using OpenCVFace Recognition System using OpenCV
Face Recognition System using OpenCV
 

More from Venkat Projects

More from Venkat Projects (20)

1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
 
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
 
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
 
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
 
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
 
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docxImage Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
 
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
 
WATERMARKING IMAGES
WATERMARKING IMAGESWATERMARKING IMAGES
WATERMARKING IMAGES
 
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
 
Application and evaluation of a K-Medoidsbased shape clustering method for an...
Application and evaluation of a K-Medoidsbased shape clustering method for an...Application and evaluation of a K-Medoidsbased shape clustering method for an...
Application and evaluation of a K-Medoidsbased shape clustering method for an...
 
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
 
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
 
2022 PYTHON MAJOR PROJECTS LIST.docx
2022 PYTHON MAJOR  PROJECTS LIST.docx2022 PYTHON MAJOR  PROJECTS LIST.docx
2022 PYTHON MAJOR PROJECTS LIST.docx
 
2022 PYTHON PROJECTS LIST.docx
2022 PYTHON PROJECTS LIST.docx2022 PYTHON PROJECTS LIST.docx
2022 PYTHON PROJECTS LIST.docx
 
2021 PYTHON PROJECTS LIST.docx
2021 PYTHON PROJECTS LIST.docx2021 PYTHON PROJECTS LIST.docx
2021 PYTHON PROJECTS LIST.docx
 
2021 python projects list
2021 python projects list2021 python projects list
2021 python projects list
 
10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni
 
9.data analysis for understanding the impact of covid–19 vaccinations on the ...
9.data analysis for understanding the impact of covid–19 vaccinations on the ...9.data analysis for understanding the impact of covid–19 vaccinations on the ...
9.data analysis for understanding the impact of covid–19 vaccinations on the ...
 
6.iris recognition using machine learning technique
6.iris recognition using machine learning technique6.iris recognition using machine learning technique
6.iris recognition using machine learning technique
 
5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster
 

Recently uploaded

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 

Suspicious Activity Detection python Project Abstract

  • 1. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com Suspicious Activity Detection ABSTRACT With the increasing in the number of anti-social activates that have been taking place, security has been given utmost importance lately. Many Organizations have installed CCTVs for constant Monitoring of people and their interactions. For a developed Country with a population of 64 million, every person is captured by a camera 30 times a day. A lot of video data generated and stored for a certain time duration. A 704x576 resolution image recorded at 25fps will generate roughly 20GB per day. Constant Monitoring of data by humans to judge if the events are abnormal is near impossible task as requires a workforce and their constant attention. This creates a need to automate the same. Also , there is need to show in which frame and which part of it contain the unusual activity which aid the faster judgment of the unusual activity being abnormal. This is done by converting video into frames and analyzing the persons and their activates from the processed frame .Machine learning and Deep Learning Algorithms and techniques support us in a wide accept to make Possible. EXISTING SYSTEM: Video Surveillance system is a collection of video, electronic and wireless components to ensure the continuousorperiodicvideorecordingformonitoringthe various importantpubliclocations.Due to the increased crime rate and instable incidents are happening around the world many organizations are deploying video surveillance systems at their locations with CCTV cameras. Now a day we can notice these camerasat variouspubliclocationslikebusstops,shoppingmalls,holyplaces,streets,educational institutes,publicmeetingsetc.The capturedvideodataisuseful topreventthe threat before crime and becoming a good forensic evidence to identify criminals after crime. Disadvantages: PROPOSED SYSTEM
  • 2. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com In this project we need to detect person behaviour as suspicious or not, now a day’s every where CCTV cameras are installed which capture videos and store at centralized server and manually scanning those videos to detect suspicious activity from human required lots of human efforts and time. To overcome from such issue author is asking to automate such process using Machine Learning Algorithms. To automate that process first we need to build training model using huge amount of images (all possible images which describe features of suspicious activities) and ‘Convolution Neural Network’ using TENSOR FLOW Python module. Then we can upload any video and then application will extract frames from uploaded video and then that frame will be applied on train model to predict its class such as ‘suspicious or normal’.