SlideShare a Scribd company logo
1 of 14
NoxEye: An AI based threat detector for
Intelligence Surveillance and Alert System
Objective
• The main objective of this project is to provide crime detection and
proactive alerts using edge-and fog-integrated approaches.
• To provide intelligent applications with AI.
• Provides an alert by sending the crime data instantly to the police or
protective service, and thus, it ensures a quick response.
Abstract
• Nowadays, theft has become a major issue to be dealt with.
• It is not possible for a human to monitor for several hours continuously.
• To overcome the complication in thefts, surveillance cameras are used.
• The main ability of surveillance camera is to just record the act of theft from
which only the knowledge of the intruders will be gained.
• This project presents NoxEye, a lightweight AI-powered threat detector for
intelligent surveillance cameras, which can be deployed on-site at the edge.
Existing System
• Framing and Blob recognition (FBD) for Input video preparing and (HON)
Human tracking.
• HOG is in charge of pulling back shape data of question in picture utilizing
force angles and edge headings.
• General purpose computing on graphics processing units (GPGPU) that is
appropriate for use in human stance estimation, and accomplishes constant
execution. A diminishing calculation iteratively expels limit voxels from a
question create a topologically identical skeleton.
• K-nearest neighbor is a strategy for grouping objects in view of
nearest preparing cases in the component space.
• Scale Invariant Feature Transform (SIFT) has been turned out to be the
most powerful nearby invariant element descriptor.
• SVM kernel functions based classifiers to distinguish the malicious
nodes from benign ones via evaluating the variance in their Driving
Pattern Matrices (DPMs).
Disadvantages
• The project or system was unable to detect motion in case of moving
camera.
• The risk of outliers and ghost points, reduces the performance of the
motion detection system.
• Target harden to find
• Reduce provocation
• IoT-cloud architecture has issues regarding bandwidth, energy, and
latency in real-time video surveillance applications.
• Delayed multimedia IoT tasks.
Proposed System
• This paper presented the design and implementation of Nox-Eye, an
AI-enabled threat detector for realtime video surveillance.
• With the help of AI, each fog node can detect and identify a possible
crime event and crime object by processing the motion-captured
images sent by an edge node.
• FRCNN model running at a fog node detects and labels the images
with the name of the crime objects having the highest probability, and
saves those images.
Advantages
• The proposed system is far more efficient even without the video
compression algorithm.
• Proved the superiority of our proposed system in terms of agility,
scalability, energy, and CPU and memory usage.
• Efficient crime predictive system
• Real-time crime event detection, ensuring resource efficiency and
good distribution of the processing load in an IoT-based video
surveillance system.
System Architecture
Crime Data
Set
Robbery Data Set acquisition
Preprocessing
Action Detection
Feature Extraction
Classified Result
Matching
Police Station
Crime
Database
Server
Classification
Classified Result
Live Crime
Modules Split Up
1. NoxEye Control Panel
2. Threat Detector Learning Phase
2.1. Suspicious Video Annotation
2.2. Frame Extraction
2.3. Preprocessing
2.4. RNN Object Detection
2.5. Feature Extraction
2.6. FRCNN Classification
3. Threat Detector unit
3.1. Live Video Annotation
3.2. Threat Detection
4. Custom Notification
5. Performance Analysis
Algorithms/Techniques
• Faster Region Convolutional Neural Network
Expected Outcome
• High prediction accuracy and response time.
• System would create a better opportunity for security personnel to
detect various types of weapons in real-time.
• Prevent a potential crime.
• A user-friendly interface was developed on top of both models to
allow users to interact with the system conveniently at the camera and
cloud sides.
• Motion detection module that can detect moving objects in
surveillance videos in realtime.
References
1. G. F. Shidik, E. Noersasongko, A. Nugraha, P. N. Andono, J. Jumanto, and E. J. and Kusuma,
``A systematic review of intelligence video surveillance: Trends, techniques, frameworks, and
datasets,'' IEEE Access, vol. 7, pp. 457-473, 2019.
2. J. Lim, M. I. Al Jobayer, V. M. Baskaran, J. M. Lim, K. Wong, and J. See, ``Gun detection in
surveillance videos using deep neural networks,‘’ in Proc. Asia Pacific Signal Inf. Process.
Assoc. Annu. Summit Conf. (APSIPAASC), Nov. 2019, pp. 1998-2002.
3. Y.-X. Liu, Y. Yang, A. Shi, P. Jigang, and L. Haowei, ``Intelligent monitoring of indoor
surveillance video based on deep learning,'' in Proc. 21st Int. Conf. Adv. Commun. Technol.
(ICACT), Feb. 2019, pp. 648-653.
4. S. Ren, K. He, R. Girshick, and J. Sun, ``Faster R-CNN: Towards realtime object detection with
region proposal networks,'' IEEE Trans. Pattern Anal. Mach. Intell., vol. 39, no. 6, pp. 1137-
1149, Jun. 2017.

More Related Content

Similar to NoxEye.pptx

Object Detetcion using SSD-MobileNet
Object Detetcion using SSD-MobileNetObject Detetcion using SSD-MobileNet
Object Detetcion using SSD-MobileNetIRJET Journal
 
IRJET - Automatic Gun Control using Motion Detection System
IRJET - Automatic Gun Control using Motion Detection SystemIRJET - Automatic Gun Control using Motion Detection System
IRJET - Automatic Gun Control using Motion Detection SystemIRJET Journal
 
Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...Venkat Projects
 
Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...Venkat Projects
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEOIRJET Journal
 
A Review on Motion Detection Techniques
A Review on Motion Detection TechniquesA Review on Motion Detection Techniques
A Review on Motion Detection Techniquesijtsrd
 
Object Detection and Localization for Visually Impaired People using CNN
Object Detection and Localization for Visually Impaired People using CNNObject Detection and Localization for Visually Impaired People using CNN
Object Detection and Localization for Visually Impaired People using CNNIRJET Journal
 
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...IRJET Journal
 
Presentation for min project
Presentation for min projectPresentation for min project
Presentation for min projectaraya kiros
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET Journal
 
ASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOTASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOTIRJET Journal
 
Motion based security alarm
Motion based security alarmMotion based security alarm
Motion based security alarmAkshay Surve
 
Real Time Object Dectection using machine learning
Real Time Object Dectection using machine learningReal Time Object Dectection using machine learning
Real Time Object Dectection using machine learningpratik pratyay
 
A Deep Learning algorithm for automatic detection of unexpected accidents und...
A Deep Learning algorithm for automatic detection of unexpected accidents und...A Deep Learning algorithm for automatic detection of unexpected accidents und...
A Deep Learning algorithm for automatic detection of unexpected accidents und...19520SaiSree
 
Surveillance using Video Analytics
Surveillance using Video AnalyticsSurveillance using Video Analytics
Surveillance using Video Analyticsidescitation
 
GUARDIAN:AI Supervision Patrol Drone For Defence And FederalSector
GUARDIAN:AI Supervision Patrol Drone For Defence And FederalSectorGUARDIAN:AI Supervision Patrol Drone For Defence And FederalSector
GUARDIAN:AI Supervision Patrol Drone For Defence And FederalSectorIRJET Journal
 

Similar to NoxEye.pptx (20)

Object Detetcion using SSD-MobileNet
Object Detetcion using SSD-MobileNetObject Detetcion using SSD-MobileNet
Object Detetcion using SSD-MobileNet
 
IRJET - Automatic Gun Control using Motion Detection System
IRJET - Automatic Gun Control using Motion Detection SystemIRJET - Automatic Gun Control using Motion Detection System
IRJET - Automatic Gun Control using Motion Detection System
 
Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...
 
Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
 
A Review on Motion Detection Techniques
A Review on Motion Detection TechniquesA Review on Motion Detection Techniques
A Review on Motion Detection Techniques
 
slide-171212080528.pptx
slide-171212080528.pptxslide-171212080528.pptx
slide-171212080528.pptx
 
Object Detection and Localization for Visually Impaired People using CNN
Object Detection and Localization for Visually Impaired People using CNNObject Detection and Localization for Visually Impaired People using CNN
Object Detection and Localization for Visually Impaired People using CNN
 
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
 
Presentation for min project
Presentation for min projectPresentation for min project
Presentation for min project
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert Management
 
ASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOTASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOT
 
Motion based security alarm
Motion based security alarmMotion based security alarm
Motion based security alarm
 
Real Time Object Dectection using machine learning
Real Time Object Dectection using machine learningReal Time Object Dectection using machine learning
Real Time Object Dectection using machine learning
 
A Deep Learning algorithm for automatic detection of unexpected accidents und...
A Deep Learning algorithm for automatic detection of unexpected accidents und...A Deep Learning algorithm for automatic detection of unexpected accidents und...
A Deep Learning algorithm for automatic detection of unexpected accidents und...
 
Surveillance using Video Analytics
Surveillance using Video AnalyticsSurveillance using Video Analytics
Surveillance using Video Analytics
 
GUARDIAN:AI Supervision Patrol Drone For Defence And FederalSector
GUARDIAN:AI Supervision Patrol Drone For Defence And FederalSectorGUARDIAN:AI Supervision Patrol Drone For Defence And FederalSector
GUARDIAN:AI Supervision Patrol Drone For Defence And FederalSector
 
smarthome
smarthomesmarthome
smarthome
 
Smart surveillance using deep learning
Smart surveillance using deep learningSmart surveillance using deep learning
Smart surveillance using deep learning
 

Recently uploaded

Training Methods and Training Objectives
Training Methods and Training ObjectivesTraining Methods and Training Objectives
Training Methods and Training Objectivesmintusiprd
 
LPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business SectorLPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business Sectorthomas851723
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Roomdivyansh0kumar0
 
LPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations ReviewLPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations Reviewthomas851723
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girladitipandeya
 
Risk management in surgery (bailey and love).pptx
Risk management in surgery (bailey and love).pptxRisk management in surgery (bailey and love).pptx
Risk management in surgery (bailey and love).pptxSaujanya Jung Pandey
 
Fifteenth Finance Commission Presentation
Fifteenth Finance Commission PresentationFifteenth Finance Commission Presentation
Fifteenth Finance Commission Presentationmintusiprd
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyHafizMuhammadAbdulla5
 
LPC Facility Design And Re-engineering Presentation
LPC Facility Design And Re-engineering PresentationLPC Facility Design And Re-engineering Presentation
LPC Facility Design And Re-engineering Presentationthomas851723
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Pooja Nehwal
 
LPC User Requirements for Automated Storage System Presentation
LPC User Requirements for Automated Storage System PresentationLPC User Requirements for Automated Storage System Presentation
LPC User Requirements for Automated Storage System Presentationthomas851723
 
Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampPLCLeadershipDevelop
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, MumbaiPooja Nehwal
 
GENUINE Babe,Call Girls IN Badarpur Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Badarpur  Delhi | +91-8377087607GENUINE Babe,Call Girls IN Badarpur  Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Badarpur Delhi | +91-8377087607dollysharma2066
 
Introduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-EngineeringIntroduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-Engineeringthomas851723
 
Board Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch PresentationBoard Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch Presentationcraig524401
 

Recently uploaded (20)

Training Methods and Training Objectives
Training Methods and Training ObjectivesTraining Methods and Training Objectives
Training Methods and Training Objectives
 
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
LPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business SectorLPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business Sector
 
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Servicesauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
 
LPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations ReviewLPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations Review
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
 
Risk management in surgery (bailey and love).pptx
Risk management in surgery (bailey and love).pptxRisk management in surgery (bailey and love).pptx
Risk management in surgery (bailey and love).pptx
 
Fifteenth Finance Commission Presentation
Fifteenth Finance Commission PresentationFifteenth Finance Commission Presentation
Fifteenth Finance Commission Presentation
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biography
 
Becoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette ThompsonBecoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette Thompson
 
LPC Facility Design And Re-engineering Presentation
LPC Facility Design And Re-engineering PresentationLPC Facility Design And Re-engineering Presentation
LPC Facility Design And Re-engineering Presentation
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
 
LPC User Requirements for Automated Storage System Presentation
LPC User Requirements for Automated Storage System PresentationLPC User Requirements for Automated Storage System Presentation
LPC User Requirements for Automated Storage System Presentation
 
Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC Bootcamp
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
 
GENUINE Babe,Call Girls IN Badarpur Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Badarpur  Delhi | +91-8377087607GENUINE Babe,Call Girls IN Badarpur  Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Badarpur Delhi | +91-8377087607
 
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
Introduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-EngineeringIntroduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-Engineering
 
Board Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch PresentationBoard Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch Presentation
 

NoxEye.pptx

  • 1.
  • 2. NoxEye: An AI based threat detector for Intelligence Surveillance and Alert System
  • 3. Objective • The main objective of this project is to provide crime detection and proactive alerts using edge-and fog-integrated approaches. • To provide intelligent applications with AI. • Provides an alert by sending the crime data instantly to the police or protective service, and thus, it ensures a quick response.
  • 4. Abstract • Nowadays, theft has become a major issue to be dealt with. • It is not possible for a human to monitor for several hours continuously. • To overcome the complication in thefts, surveillance cameras are used. • The main ability of surveillance camera is to just record the act of theft from which only the knowledge of the intruders will be gained. • This project presents NoxEye, a lightweight AI-powered threat detector for intelligent surveillance cameras, which can be deployed on-site at the edge.
  • 5. Existing System • Framing and Blob recognition (FBD) for Input video preparing and (HON) Human tracking. • HOG is in charge of pulling back shape data of question in picture utilizing force angles and edge headings. • General purpose computing on graphics processing units (GPGPU) that is appropriate for use in human stance estimation, and accomplishes constant execution. A diminishing calculation iteratively expels limit voxels from a question create a topologically identical skeleton.
  • 6. • K-nearest neighbor is a strategy for grouping objects in view of nearest preparing cases in the component space. • Scale Invariant Feature Transform (SIFT) has been turned out to be the most powerful nearby invariant element descriptor. • SVM kernel functions based classifiers to distinguish the malicious nodes from benign ones via evaluating the variance in their Driving Pattern Matrices (DPMs).
  • 7. Disadvantages • The project or system was unable to detect motion in case of moving camera. • The risk of outliers and ghost points, reduces the performance of the motion detection system. • Target harden to find • Reduce provocation • IoT-cloud architecture has issues regarding bandwidth, energy, and latency in real-time video surveillance applications. • Delayed multimedia IoT tasks.
  • 8. Proposed System • This paper presented the design and implementation of Nox-Eye, an AI-enabled threat detector for realtime video surveillance. • With the help of AI, each fog node can detect and identify a possible crime event and crime object by processing the motion-captured images sent by an edge node. • FRCNN model running at a fog node detects and labels the images with the name of the crime objects having the highest probability, and saves those images.
  • 9. Advantages • The proposed system is far more efficient even without the video compression algorithm. • Proved the superiority of our proposed system in terms of agility, scalability, energy, and CPU and memory usage. • Efficient crime predictive system • Real-time crime event detection, ensuring resource efficiency and good distribution of the processing load in an IoT-based video surveillance system.
  • 10. System Architecture Crime Data Set Robbery Data Set acquisition Preprocessing Action Detection Feature Extraction Classified Result Matching Police Station Crime Database Server Classification Classified Result Live Crime
  • 11. Modules Split Up 1. NoxEye Control Panel 2. Threat Detector Learning Phase 2.1. Suspicious Video Annotation 2.2. Frame Extraction 2.3. Preprocessing 2.4. RNN Object Detection 2.5. Feature Extraction 2.6. FRCNN Classification 3. Threat Detector unit 3.1. Live Video Annotation 3.2. Threat Detection 4. Custom Notification 5. Performance Analysis
  • 12. Algorithms/Techniques • Faster Region Convolutional Neural Network
  • 13. Expected Outcome • High prediction accuracy and response time. • System would create a better opportunity for security personnel to detect various types of weapons in real-time. • Prevent a potential crime. • A user-friendly interface was developed on top of both models to allow users to interact with the system conveniently at the camera and cloud sides. • Motion detection module that can detect moving objects in surveillance videos in realtime.
  • 14. References 1. G. F. Shidik, E. Noersasongko, A. Nugraha, P. N. Andono, J. Jumanto, and E. J. and Kusuma, ``A systematic review of intelligence video surveillance: Trends, techniques, frameworks, and datasets,'' IEEE Access, vol. 7, pp. 457-473, 2019. 2. J. Lim, M. I. Al Jobayer, V. M. Baskaran, J. M. Lim, K. Wong, and J. See, ``Gun detection in surveillance videos using deep neural networks,‘’ in Proc. Asia Pacific Signal Inf. Process. Assoc. Annu. Summit Conf. (APSIPAASC), Nov. 2019, pp. 1998-2002. 3. Y.-X. Liu, Y. Yang, A. Shi, P. Jigang, and L. Haowei, ``Intelligent monitoring of indoor surveillance video based on deep learning,'' in Proc. 21st Int. Conf. Adv. Commun. Technol. (ICACT), Feb. 2019, pp. 648-653. 4. S. Ren, K. He, R. Girshick, and J. Sun, ``Faster R-CNN: Towards realtime object detection with region proposal networks,'' IEEE Trans. Pattern Anal. Mach. Intell., vol. 39, no. 6, pp. 1137- 1149, Jun. 2017.