SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3095
A Social Distancing Monitoring System Using OpenCV to Ensure Social
Distancing in Public Areas
Anukirti Yadav1, Aditya Pratap Singh Rana2, Amritesh Singh3, Mitali Jain4, Nidhi Gupta5
1 Student, Department of Computer Science & Engineering, RKGIT Ghaziabad, Uttar Pradesh, India
2
Student, Department of Computer Science & Engineering, RKGIT Ghaziabad, Uttar Pradesh, India
5
Assistant Professor, Department of Computer Science & Engineering, RKGIT Ghaziabad, Uttar Pradesh, India
------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Social distancing measures are important to scale back Covid spread. To interrupt the chain of spread, social
distancing must be strictly followed. This paper demonstrates a system that is useful in monitoring public places with regular,
high people density like Banks, malls, and hospitals for any social distancing violations. With the assistance of this proposed
system, it might be conveniently possible to watch individuals whether they are maintaining the social distancing within the
area under surveillance and also to alert the individuals as and when there are any violations from the predefined limits. The
proposed deep learning technology- based system is installed for coverage within a particularly limited distance. The
algorithm can be implemented on live images from CCTV cameras to perform operations. The simulated model uses a deep
learning algorithm with the OpenCV library to estimate distances between people in frames, and a YOLO model trained on the
COCO dataset identifies people within the frames. The system must be configured depending on where it is.
Keywords: YOLO model, COCO dataset, Image processing,Deeplearning,OpenCV,Social Distancing.
1.INTRODUCTION
In the current scenario of the COVID-19 pandemic, peopleare advised totake care of a distancetoconfirm thatvirusesdo
not spread from one host to different [1]. Considering the sociocultural environment in India, enforcing the prescribed
social distancing measures among varied categories of people could be a challenging task, where manual supervision is
also impossible. To search for a remedy for this issue, an automatedmonitoringsystemhasbeen designed that may analyze a
little area with the assistance of 2D cameras andin turn, will detect any socialdistance violations. We propose an automated
monitoring system with 2D camera technology to detect and alert social distancing violations from a little area. It will
calculate the relative distance between everyone in its viewand can give an alert if social distancing is violated. It willalso
display the full number of individuals present in its sight. This monitoring system may be installed in places withless dense
crowds like ATMs, banks, smallshops,foodstalls, offices, etc. The system must be configured per thelocation to be installed to
supply better results.
Corona Virus outbreak has proven to be deadly to everyone including all age groups, gender, and people from
different climate regions. Hence, it's vital to scale back thespeed at which COVID-19 is spreading. One of the most effective
ways to try that's through social distancing. Contagious diseases and viruses like corona spread from contact within a specific
distance. A single affected person could affect the spread exponentially.
In this paper, a comprehensive Social DistanceMonitoring System (SDMS) provides a true-time solution tokeep up
and ensure social distancing publicly areas. Itensures that no one, whether unintentionally or intentionally, doesn't
violate social distancing. This methodwill be applied in places like malls, ATM lines, offices,shops, and other small places.
This may help in effectivelystopping the spreading of contagious diseases and viruseslike Covid-19[2][3]. Few exceptions to
SDMS exist such asthe caretaker for a physically challenged person, children,patients, or the elderly. The algorithm may be
extended for suchscenariosbydistinguishing thesortof dots withinthevisual graph.
2.LITERATURE REVIEW
Social distancing is one of the community mitigation measures which will be recommended during Covid-19 pandemics.
Social distancing can reduce virus transmissionby increasing physical distance or reducing the frequency ofcongregation in
socially dense community settings, like ATMs, airports, or the marketplace. Covid-19 pandemics have demonstrated that
we cannot expect to contain geographically the subsequent influenza pandemic in the location it emerges, nor can we
expect to forestall the international spread of infection over a brief period. COVIDvirus infections are believed to spread
mainly through closecontact within the community. Social distancing measures aim to scale back the frequency of contact
and increase thephysical distance between persons, thereby reducing the risks of person- to-person transmission. There
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3096
are theoretical models explaining the necessity of social distancing, which may make a huge difference in slowing thespread
of coronavirus.
During the start of the pandemic, there was an interplay between age, contact patterns, social distancing, and
susceptibility to infection which made the pandemic dynamics to be unclear. After the study of the transmissionmodel, it
was concluded that by practicing social distancingalone, the outbreak could be brought on top of things, thereby reducing
peak incidence by a greater percentage. There are algorithms reported in the literature for the detection of COVID- 19
spread. Deep learning-based CNN (Convolutional Neural Networks) applied algorithm togetherwith geometric techniques
combine to make a model covering three aspects such as detection, tracking, and validation of information. The study
reportssocialdistancingdata to authorities with a 91.7% precision score.
The modeling studies estimated that workplace social distancing measures produced a 23% median reduction in the
cumulative influenza attack rate. Another study analyzes the effect of social distancing on the COVID-19 pandemic inKorea
using a mathematical model. The transmission rate for each epidemic stage by fitting into a model, especially for social
distancing criteria. An aerodynamic- based CFD simulation study investigates whether the gap is 1.5 m or beyond and the
possibility of droplet transfer.
3.METHODOLOGY
3.1System Architecture
The objective is to use object detection employing a YOLO v3model trained on a COCO dataset that has 80 classes. YOLO
uses dark net frameworks to process incoming feed frame by frame. It returns the detections with their IDs, centroids,
corner coordinates, and also the confidences within the styleof multidimensional arrays. Once the knowledge is received,the
IDs that aren't identified as a “person” are removed. Bounding boxes are drawn to highlight the detections in frames.
Subsequently, centroids are calculated to search out the Euclidean distance between required objects in pixels. The
following step is to calculate, whether a calculateddistance between two centroids is less than the configuredvalue. The
system will throw an alert with a beeping soundwhen the condition is satisfied which also turns the bounding boxes of
violators red[7][9][10].
3.2 Experimental Model
Input: Video to be accessed
Output: Detected information displayed in Video withhighlighted boxes
Process: The detailed processing steps are listed below,from which the algorithm is presented.
Import
1. Import all the required modules, libraries, andmethods
2. Parse input, output, YOLO model, threshold,And confidence
Load class names within the list Load trained YOLOobject detector and input the video
1. YOLO object detector is loaded which is trained onthe COCO dataset (80 classes)
2. Input the video with appropriate variables
3. Initialize output video and frame. The number ofviolations are recorded for all frames.
Determine the whole number of frames in the video
1. Loop over the frames and skim every frame untilthe tip
2. Initialize a group called ” violate ”, to store the number of violations in an exceeding frame Process the frame and
store the specified output.
Process the frame and store the required output
1. Grab the scale of this frame say, width and height
2. A blob is constructed from the input frame
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3097
3. Perform an aerial of the YOLO object detector returning with bounding boxes and associatedprobabilities in a
list.
4. Time taken to process one frame is calculated andsaved
5. Initialize internal lists to store the data in theoutput list
6. Loop over the output list for processing eachdetection
7. CollectclassIDsand calculateprobabilitiesfromthedetection within the array, ” scores”,forthepresentobject
8. From ” scores ” get the class ID and confidenceassociated with the class ID.
9. Filter detections for class ID ’person’ as object and valid confidence
10. Calculate Euclidean distance
Calculate Euclidean distance
1. Extractcoordinatesfor centroidsanddimensionsof bounding boxes from “detection” into ” box ”
2. Calculate coordinates for the top left corner ofbounding boxes using centroids and dimensions
3. Verify that a minimum of there are two identifiableobjects
4. Calculate Euclideandistance between thecentroidsof all the objects detected
5. Check if any set of centroids has but the advised distance and add them to the ” violate” set.
6. Apply non-maxima suppression to narrow downdetections in idxs array
7. Ensure a minimum of one violation by the” if ”statement
8. oop over idxs after converting it to a 1-dimensional array Process bounding box entries.
Process bounding box entries
1. Extract bounding box coordinates withrespective centroids.
2. Red color will be assigned to the class ID i.e.,(0,0,255) in BGR when current detection is ” violates”
3. Centroids are marked on the drawn boxes
4. Display class ID and confidence over respective boxes
5. Display the number of violations i.e., length of set ” violate ” at the underside of the frame Write for display
Write for display
1. Initialize Video Writer
2. Display the time taken by one frame to process
3. Display the time to be taken by all frames
4. Write the frame to output the video file
5. finish off and release the pointers
3.2 Algorithm
The following are the steps in the objection detection algorithm based on the detailed steps mentioned in an
experimental model.
1. Input the video
2. Determine the whole numberof frames inthevideo
3. Loop over the frames and skim every frame until the tip
4. Construct a blob from the input frame
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3098
5. Perform a passing game of the YOLO object detection, giving us our bounding boxes andassociated probabilities
in a list
6. Filter detections for persons as objects and valid confidence
7. Extractcoordinatesfor centroidsanddimensionsof bounding boxes from ” detection ” into ” box ”
8. Calculate coordinates for the top left corner ofbounding boxes using centroids and dimensions
9. Calculate Euclideandistance between thecentroidsof all the objects detected
10. Check if any set of centroids have but the adviseddistance
11. Apply non-maxima suppression to narrow downdetections
12. Ensure a minimum of one violation
13. Red color will be assigned to the bounding boxwhen current detection "violates"
14. Centroids are marked and bounding boxes aredrawn
15. Display the number of violations in the currentframe
3.3 Flowchart
The flowchart is depicting the complete algorithmic process is provided. The video is imported for processing. For the
entire number of frames, the processing parameters are computed to calculate the gap. Centroid is calculated. If thereis a
distance violation marked, a box is marked as red otherwise green. Once all the frames are processed for theirdistance, the
program is ended after the video is written forits violation markings.
4. RESULT
If (p1,q1) and (p2,q2) are the coordinates of the Euclidean Distance. The social distance threshold is reported as 0.6. Table
1 presents the number of violations together with centroid and distance. The gap is given in pixels. Distance iscalculated
based on the input frame image threshold in pixels. The violation is calculated supported by the centroidcalculation. All
distance calculations are aggregated to search out the number of violations, which is reported and writtenin video finally.
After processing the frames they're forwarded as real-time output.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3099
The Output displays all the pedestrians detected and highlighted with their Class IDs and therefore the confidence
corresponding to detections. Also, every case in violation of social distancing i.e., when distance in pixelsis over the
configured one, ishigh lighted in an exceedingly red color bounding box. The Total Number of violations detected is
displayed at the bottom of the frame.
The violations are marked in red between two persons and the distance is displayed. Otherwise, the calculated distance is
additionally given. The full video will be analyzed for every and each frame for its contents and calculated violations using
centroid calculations. The importance of this algorithm is very useful in the pandemicperiods to implement in crowded areas,
schools, parks, and other public places. The performance parameter such as detection which there's high as per the
extensive testing.Fig. presents the figures representing before and after theimplementation of the SDMS algorithm. Fig 6b
shows four distancing violations highlighted. Similarly, the results may be interpreted for Fig. where two violations are
reportedbased. The social distance threshold is set as 0.6. The spaceis calculated supported equation. The result clearly implies
the detection of violation scenarios for various real-time images. The objective of highlighting the social distancing
regulation and identifying people within the frame iseffectively attained.
4.CONCLUSION
This concludes the system for social distancing and helping world fight corona virus through non-medical measure.
5. REFERENCES
[1] De Vos, J., “The effect of COVID- 19 and subsequentsocial distancing on travel behavior,” Transportation
Research Interdisciplinary Perspectives, A247, pp. 100121., 2020
[2] A. H. Ahamad, N. Zaini and M. F. A. Latip, “PersonDetection for Social Distancing and Safety Violation Alert
basedon Segmented ROI,” 2020 10th IEEE International Conferenc Eon Control System, Computing
and Engineering (ICCSCE), Penang, Malaysia,pp. 113-118., doi: 10.1109/ICCSCE50387.2020.920493 4,
2020
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3100
[3] M. Cristani, A. D. Bue, V. Murino, F. Setti and A. Vinciarelli “The Visual Social Distancing Problem,” in IEEE
Access, vol. 8, pp. 126876- 126886.,doi: 10.1109/ACCESS.2020.3008370 , 2020
[4] Reluga, T.C., “Game theory of social distancing in response to an epidemic,” PLoS Comput Biol, 6(5), pp.
1000793., 2010
[5] De Vos, J., “Nyabadza, F., Chirove, F., Chukwu, W.C.and Visaya, M.V.,” Modelling the potential impact of social
distancing on the COVID-19 epidemic in South Africa, medRxiv, 2020 Choi, S. and Ki, M., “Analyzing the effects of
social distancing on the COVID-19 pandemic in Korea using mathematical modeling. Epidemiology and health,’ 42,
pp. 2020064., 2020
[6] Zhang, J., Litvinova, M., Liang, Y., Wang, Y., Wang, W., Zhao, S., Wu, Q., Merler, S., Viboud, C., Vespignani, A. and
Ajelli, M., “Age profile of susceptibility, mixing, and social distancing shape the dynamics of the novel coronavirus
disease2019outbreakinChina.medrxiv,’42,pp.2020064.,2020, preprint
[7] Li, K.K., Jarvis, S.A. and Minhas, F., “Elementary Effects Analysis of factors controlling COVID-19 infectionsin
computational simulation reveals the importance of Social Distancing and Mask Usage, 2020, arXiv preprint
arXiv:2011.11381.
[8] Yadav, S., “Deep Learning based Safe Social Distancing and Face Mask Detection in Public Areas for COVID-19
Safety Guidelines Adherence,” International Journal for Research in Applied Science and Engineering Technology,
8(7), pp. 1368-1375., 2020
[9] Ahmed, F., Zviedrite, N. and Uzicanin, A., “Effectiveness of workplace social distancing measures inreducing
influenza transmission: a systematic review,” International BMC public health, 18(1), pp. 1-13, 2018

More Related Content

Similar to Social Distancing Monitoring System Using OpenCV

Face Mask and Social Distance Detection
Face Mask and Social Distance DetectionFace Mask and Social Distance Detection
Face Mask and Social Distance DetectionIRJET Journal
 
A Survey on Person Detection for Social Distancing and Safety Violation Alert...
A Survey on Person Detection for Social Distancing and Safety Violation Alert...A Survey on Person Detection for Social Distancing and Safety Violation Alert...
A Survey on Person Detection for Social Distancing and Safety Violation Alert...IRJET Journal
 
Covid Mask Detection and Social Distancing Using Raspberry pi
Covid Mask Detection and Social Distancing Using Raspberry piCovid Mask Detection and Social Distancing Using Raspberry pi
Covid Mask Detection and Social Distancing Using Raspberry piIRJET Journal
 
COVID-19 FACE MASK DETECTION
COVID-19 FACE MASK DETECTIONCOVID-19 FACE MASK DETECTION
COVID-19 FACE MASK DETECTIONIRJET Journal
 
Social Distancing Detector Management System
Social Distancing Detector Management SystemSocial Distancing Detector Management System
Social Distancing Detector Management SystemIRJET Journal
 
Covid-19 Detection Using Deep Neural Networks
Covid-19 Detection Using Deep Neural NetworksCovid-19 Detection Using Deep Neural Networks
Covid-19 Detection Using Deep Neural NetworksIRJET Journal
 
Deep Learning Assisted Tool for Face Mask Detection
Deep Learning Assisted Tool for Face Mask DetectionDeep Learning Assisted Tool for Face Mask Detection
Deep Learning Assisted Tool for Face Mask DetectionIRJET Journal
 
6’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-196’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-19IRJET Journal
 
6’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-196’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-19IRJET Journal
 
AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...
AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...
AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...IRJET Journal
 
PREDICTION OF COVID-19 USING MACHINE LEARNING APPROACHES
PREDICTION OF COVID-19 USING MACHINE LEARNING APPROACHESPREDICTION OF COVID-19 USING MACHINE LEARNING APPROACHES
PREDICTION OF COVID-19 USING MACHINE LEARNING APPROACHESIRJET Journal
 
Vision-based_Approach_for_Automated_Social_Distance_Violators_Detection.pdf
Vision-based_Approach_for_Automated_Social_Distance_Violators_Detection.pdfVision-based_Approach_for_Automated_Social_Distance_Violators_Detection.pdf
Vision-based_Approach_for_Automated_Social_Distance_Violators_Detection.pdfVINEYCHHILLAR
 
Fake News and Message Detection
Fake News and Message DetectionFake News and Message Detection
Fake News and Message DetectionIRJET Journal
 
Covid-19 Data Analysis and Visualization
Covid-19 Data Analysis and VisualizationCovid-19 Data Analysis and Visualization
Covid-19 Data Analysis and VisualizationIRJET Journal
 
Automatic covid screening and deep learning
Automatic covid screening and deep learningAutomatic covid screening and deep learning
Automatic covid screening and deep learningIRJET Journal
 
Survey on Face Mask Detection with Door Locking and Alert System using Raspbe...
Survey on Face Mask Detection with Door Locking and Alert System using Raspbe...Survey on Face Mask Detection with Door Locking and Alert System using Raspbe...
Survey on Face Mask Detection with Door Locking and Alert System using Raspbe...IRJET Journal
 
Realtime Face mask Detector using YoloV4
Realtime Face mask Detector using YoloV4Realtime Face mask Detector using YoloV4
Realtime Face mask Detector using YoloV4IRJET Journal
 
SOCIAL DISTANCING DETECTION
SOCIAL DISTANCING DETECTIONSOCIAL DISTANCING DETECTION
SOCIAL DISTANCING DETECTIONIRJET Journal
 
Face Mask Detection utilizing Tensorflow, OpenCV and Keras
Face Mask Detection utilizing Tensorflow, OpenCV and KerasFace Mask Detection utilizing Tensorflow, OpenCV and Keras
Face Mask Detection utilizing Tensorflow, OpenCV and KerasIRJET Journal
 
A Novel Method For Evaluation of Automation Dry Fog Disinfecting Unit
A Novel Method For Evaluation of Automation Dry Fog Disinfecting UnitA Novel Method For Evaluation of Automation Dry Fog Disinfecting Unit
A Novel Method For Evaluation of Automation Dry Fog Disinfecting UnitIRJET Journal
 

Similar to Social Distancing Monitoring System Using OpenCV (20)

Face Mask and Social Distance Detection
Face Mask and Social Distance DetectionFace Mask and Social Distance Detection
Face Mask and Social Distance Detection
 
A Survey on Person Detection for Social Distancing and Safety Violation Alert...
A Survey on Person Detection for Social Distancing and Safety Violation Alert...A Survey on Person Detection for Social Distancing and Safety Violation Alert...
A Survey on Person Detection for Social Distancing and Safety Violation Alert...
 
Covid Mask Detection and Social Distancing Using Raspberry pi
Covid Mask Detection and Social Distancing Using Raspberry piCovid Mask Detection and Social Distancing Using Raspberry pi
Covid Mask Detection and Social Distancing Using Raspberry pi
 
COVID-19 FACE MASK DETECTION
COVID-19 FACE MASK DETECTIONCOVID-19 FACE MASK DETECTION
COVID-19 FACE MASK DETECTION
 
Social Distancing Detector Management System
Social Distancing Detector Management SystemSocial Distancing Detector Management System
Social Distancing Detector Management System
 
Covid-19 Detection Using Deep Neural Networks
Covid-19 Detection Using Deep Neural NetworksCovid-19 Detection Using Deep Neural Networks
Covid-19 Detection Using Deep Neural Networks
 
Deep Learning Assisted Tool for Face Mask Detection
Deep Learning Assisted Tool for Face Mask DetectionDeep Learning Assisted Tool for Face Mask Detection
Deep Learning Assisted Tool for Face Mask Detection
 
6’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-196’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-19
 
6’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-196’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-19
 
AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...
AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...
AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...
 
PREDICTION OF COVID-19 USING MACHINE LEARNING APPROACHES
PREDICTION OF COVID-19 USING MACHINE LEARNING APPROACHESPREDICTION OF COVID-19 USING MACHINE LEARNING APPROACHES
PREDICTION OF COVID-19 USING MACHINE LEARNING APPROACHES
 
Vision-based_Approach_for_Automated_Social_Distance_Violators_Detection.pdf
Vision-based_Approach_for_Automated_Social_Distance_Violators_Detection.pdfVision-based_Approach_for_Automated_Social_Distance_Violators_Detection.pdf
Vision-based_Approach_for_Automated_Social_Distance_Violators_Detection.pdf
 
Fake News and Message Detection
Fake News and Message DetectionFake News and Message Detection
Fake News and Message Detection
 
Covid-19 Data Analysis and Visualization
Covid-19 Data Analysis and VisualizationCovid-19 Data Analysis and Visualization
Covid-19 Data Analysis and Visualization
 
Automatic covid screening and deep learning
Automatic covid screening and deep learningAutomatic covid screening and deep learning
Automatic covid screening and deep learning
 
Survey on Face Mask Detection with Door Locking and Alert System using Raspbe...
Survey on Face Mask Detection with Door Locking and Alert System using Raspbe...Survey on Face Mask Detection with Door Locking and Alert System using Raspbe...
Survey on Face Mask Detection with Door Locking and Alert System using Raspbe...
 
Realtime Face mask Detector using YoloV4
Realtime Face mask Detector using YoloV4Realtime Face mask Detector using YoloV4
Realtime Face mask Detector using YoloV4
 
SOCIAL DISTANCING DETECTION
SOCIAL DISTANCING DETECTIONSOCIAL DISTANCING DETECTION
SOCIAL DISTANCING DETECTION
 
Face Mask Detection utilizing Tensorflow, OpenCV and Keras
Face Mask Detection utilizing Tensorflow, OpenCV and KerasFace Mask Detection utilizing Tensorflow, OpenCV and Keras
Face Mask Detection utilizing Tensorflow, OpenCV and Keras
 
A Novel Method For Evaluation of Automation Dry Fog Disinfecting Unit
A Novel Method For Evaluation of Automation Dry Fog Disinfecting UnitA Novel Method For Evaluation of Automation Dry Fog Disinfecting Unit
A Novel Method For Evaluation of Automation Dry Fog Disinfecting Unit
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 

Recently uploaded (20)

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 

Social Distancing Monitoring System Using OpenCV

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3095 A Social Distancing Monitoring System Using OpenCV to Ensure Social Distancing in Public Areas Anukirti Yadav1, Aditya Pratap Singh Rana2, Amritesh Singh3, Mitali Jain4, Nidhi Gupta5 1 Student, Department of Computer Science & Engineering, RKGIT Ghaziabad, Uttar Pradesh, India 2 Student, Department of Computer Science & Engineering, RKGIT Ghaziabad, Uttar Pradesh, India 5 Assistant Professor, Department of Computer Science & Engineering, RKGIT Ghaziabad, Uttar Pradesh, India ------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Social distancing measures are important to scale back Covid spread. To interrupt the chain of spread, social distancing must be strictly followed. This paper demonstrates a system that is useful in monitoring public places with regular, high people density like Banks, malls, and hospitals for any social distancing violations. With the assistance of this proposed system, it might be conveniently possible to watch individuals whether they are maintaining the social distancing within the area under surveillance and also to alert the individuals as and when there are any violations from the predefined limits. The proposed deep learning technology- based system is installed for coverage within a particularly limited distance. The algorithm can be implemented on live images from CCTV cameras to perform operations. The simulated model uses a deep learning algorithm with the OpenCV library to estimate distances between people in frames, and a YOLO model trained on the COCO dataset identifies people within the frames. The system must be configured depending on where it is. Keywords: YOLO model, COCO dataset, Image processing,Deeplearning,OpenCV,Social Distancing. 1.INTRODUCTION In the current scenario of the COVID-19 pandemic, peopleare advised totake care of a distancetoconfirm thatvirusesdo not spread from one host to different [1]. Considering the sociocultural environment in India, enforcing the prescribed social distancing measures among varied categories of people could be a challenging task, where manual supervision is also impossible. To search for a remedy for this issue, an automatedmonitoringsystemhasbeen designed that may analyze a little area with the assistance of 2D cameras andin turn, will detect any socialdistance violations. We propose an automated monitoring system with 2D camera technology to detect and alert social distancing violations from a little area. It will calculate the relative distance between everyone in its viewand can give an alert if social distancing is violated. It willalso display the full number of individuals present in its sight. This monitoring system may be installed in places withless dense crowds like ATMs, banks, smallshops,foodstalls, offices, etc. The system must be configured per thelocation to be installed to supply better results. Corona Virus outbreak has proven to be deadly to everyone including all age groups, gender, and people from different climate regions. Hence, it's vital to scale back thespeed at which COVID-19 is spreading. One of the most effective ways to try that's through social distancing. Contagious diseases and viruses like corona spread from contact within a specific distance. A single affected person could affect the spread exponentially. In this paper, a comprehensive Social DistanceMonitoring System (SDMS) provides a true-time solution tokeep up and ensure social distancing publicly areas. Itensures that no one, whether unintentionally or intentionally, doesn't violate social distancing. This methodwill be applied in places like malls, ATM lines, offices,shops, and other small places. This may help in effectivelystopping the spreading of contagious diseases and viruseslike Covid-19[2][3]. Few exceptions to SDMS exist such asthe caretaker for a physically challenged person, children,patients, or the elderly. The algorithm may be extended for suchscenariosbydistinguishing thesortof dots withinthevisual graph. 2.LITERATURE REVIEW Social distancing is one of the community mitigation measures which will be recommended during Covid-19 pandemics. Social distancing can reduce virus transmissionby increasing physical distance or reducing the frequency ofcongregation in socially dense community settings, like ATMs, airports, or the marketplace. Covid-19 pandemics have demonstrated that we cannot expect to contain geographically the subsequent influenza pandemic in the location it emerges, nor can we expect to forestall the international spread of infection over a brief period. COVIDvirus infections are believed to spread mainly through closecontact within the community. Social distancing measures aim to scale back the frequency of contact and increase thephysical distance between persons, thereby reducing the risks of person- to-person transmission. There
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3096 are theoretical models explaining the necessity of social distancing, which may make a huge difference in slowing thespread of coronavirus. During the start of the pandemic, there was an interplay between age, contact patterns, social distancing, and susceptibility to infection which made the pandemic dynamics to be unclear. After the study of the transmissionmodel, it was concluded that by practicing social distancingalone, the outbreak could be brought on top of things, thereby reducing peak incidence by a greater percentage. There are algorithms reported in the literature for the detection of COVID- 19 spread. Deep learning-based CNN (Convolutional Neural Networks) applied algorithm togetherwith geometric techniques combine to make a model covering three aspects such as detection, tracking, and validation of information. The study reportssocialdistancingdata to authorities with a 91.7% precision score. The modeling studies estimated that workplace social distancing measures produced a 23% median reduction in the cumulative influenza attack rate. Another study analyzes the effect of social distancing on the COVID-19 pandemic inKorea using a mathematical model. The transmission rate for each epidemic stage by fitting into a model, especially for social distancing criteria. An aerodynamic- based CFD simulation study investigates whether the gap is 1.5 m or beyond and the possibility of droplet transfer. 3.METHODOLOGY 3.1System Architecture The objective is to use object detection employing a YOLO v3model trained on a COCO dataset that has 80 classes. YOLO uses dark net frameworks to process incoming feed frame by frame. It returns the detections with their IDs, centroids, corner coordinates, and also the confidences within the styleof multidimensional arrays. Once the knowledge is received,the IDs that aren't identified as a “person” are removed. Bounding boxes are drawn to highlight the detections in frames. Subsequently, centroids are calculated to search out the Euclidean distance between required objects in pixels. The following step is to calculate, whether a calculateddistance between two centroids is less than the configuredvalue. The system will throw an alert with a beeping soundwhen the condition is satisfied which also turns the bounding boxes of violators red[7][9][10]. 3.2 Experimental Model Input: Video to be accessed Output: Detected information displayed in Video withhighlighted boxes Process: The detailed processing steps are listed below,from which the algorithm is presented. Import 1. Import all the required modules, libraries, andmethods 2. Parse input, output, YOLO model, threshold,And confidence Load class names within the list Load trained YOLOobject detector and input the video 1. YOLO object detector is loaded which is trained onthe COCO dataset (80 classes) 2. Input the video with appropriate variables 3. Initialize output video and frame. The number ofviolations are recorded for all frames. Determine the whole number of frames in the video 1. Loop over the frames and skim every frame untilthe tip 2. Initialize a group called ” violate ”, to store the number of violations in an exceeding frame Process the frame and store the specified output. Process the frame and store the required output 1. Grab the scale of this frame say, width and height 2. A blob is constructed from the input frame
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3097 3. Perform an aerial of the YOLO object detector returning with bounding boxes and associatedprobabilities in a list. 4. Time taken to process one frame is calculated andsaved 5. Initialize internal lists to store the data in theoutput list 6. Loop over the output list for processing eachdetection 7. CollectclassIDsand calculateprobabilitiesfromthedetection within the array, ” scores”,forthepresentobject 8. From ” scores ” get the class ID and confidenceassociated with the class ID. 9. Filter detections for class ID ’person’ as object and valid confidence 10. Calculate Euclidean distance Calculate Euclidean distance 1. Extractcoordinatesfor centroidsanddimensionsof bounding boxes from “detection” into ” box ” 2. Calculate coordinates for the top left corner ofbounding boxes using centroids and dimensions 3. Verify that a minimum of there are two identifiableobjects 4. Calculate Euclideandistance between thecentroidsof all the objects detected 5. Check if any set of centroids has but the advised distance and add them to the ” violate” set. 6. Apply non-maxima suppression to narrow downdetections in idxs array 7. Ensure a minimum of one violation by the” if ”statement 8. oop over idxs after converting it to a 1-dimensional array Process bounding box entries. Process bounding box entries 1. Extract bounding box coordinates withrespective centroids. 2. Red color will be assigned to the class ID i.e.,(0,0,255) in BGR when current detection is ” violates” 3. Centroids are marked on the drawn boxes 4. Display class ID and confidence over respective boxes 5. Display the number of violations i.e., length of set ” violate ” at the underside of the frame Write for display Write for display 1. Initialize Video Writer 2. Display the time taken by one frame to process 3. Display the time to be taken by all frames 4. Write the frame to output the video file 5. finish off and release the pointers 3.2 Algorithm The following are the steps in the objection detection algorithm based on the detailed steps mentioned in an experimental model. 1. Input the video 2. Determine the whole numberof frames inthevideo 3. Loop over the frames and skim every frame until the tip 4. Construct a blob from the input frame
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3098 5. Perform a passing game of the YOLO object detection, giving us our bounding boxes andassociated probabilities in a list 6. Filter detections for persons as objects and valid confidence 7. Extractcoordinatesfor centroidsanddimensionsof bounding boxes from ” detection ” into ” box ” 8. Calculate coordinates for the top left corner ofbounding boxes using centroids and dimensions 9. Calculate Euclideandistance between thecentroidsof all the objects detected 10. Check if any set of centroids have but the adviseddistance 11. Apply non-maxima suppression to narrow downdetections 12. Ensure a minimum of one violation 13. Red color will be assigned to the bounding boxwhen current detection "violates" 14. Centroids are marked and bounding boxes aredrawn 15. Display the number of violations in the currentframe 3.3 Flowchart The flowchart is depicting the complete algorithmic process is provided. The video is imported for processing. For the entire number of frames, the processing parameters are computed to calculate the gap. Centroid is calculated. If thereis a distance violation marked, a box is marked as red otherwise green. Once all the frames are processed for theirdistance, the program is ended after the video is written forits violation markings. 4. RESULT If (p1,q1) and (p2,q2) are the coordinates of the Euclidean Distance. The social distance threshold is reported as 0.6. Table 1 presents the number of violations together with centroid and distance. The gap is given in pixels. Distance iscalculated based on the input frame image threshold in pixels. The violation is calculated supported by the centroidcalculation. All distance calculations are aggregated to search out the number of violations, which is reported and writtenin video finally. After processing the frames they're forwarded as real-time output.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3099 The Output displays all the pedestrians detected and highlighted with their Class IDs and therefore the confidence corresponding to detections. Also, every case in violation of social distancing i.e., when distance in pixelsis over the configured one, ishigh lighted in an exceedingly red color bounding box. The Total Number of violations detected is displayed at the bottom of the frame. The violations are marked in red between two persons and the distance is displayed. Otherwise, the calculated distance is additionally given. The full video will be analyzed for every and each frame for its contents and calculated violations using centroid calculations. The importance of this algorithm is very useful in the pandemicperiods to implement in crowded areas, schools, parks, and other public places. The performance parameter such as detection which there's high as per the extensive testing.Fig. presents the figures representing before and after theimplementation of the SDMS algorithm. Fig 6b shows four distancing violations highlighted. Similarly, the results may be interpreted for Fig. where two violations are reportedbased. The social distance threshold is set as 0.6. The spaceis calculated supported equation. The result clearly implies the detection of violation scenarios for various real-time images. The objective of highlighting the social distancing regulation and identifying people within the frame iseffectively attained. 4.CONCLUSION This concludes the system for social distancing and helping world fight corona virus through non-medical measure. 5. REFERENCES [1] De Vos, J., “The effect of COVID- 19 and subsequentsocial distancing on travel behavior,” Transportation Research Interdisciplinary Perspectives, A247, pp. 100121., 2020 [2] A. H. Ahamad, N. Zaini and M. F. A. Latip, “PersonDetection for Social Distancing and Safety Violation Alert basedon Segmented ROI,” 2020 10th IEEE International Conferenc Eon Control System, Computing and Engineering (ICCSCE), Penang, Malaysia,pp. 113-118., doi: 10.1109/ICCSCE50387.2020.920493 4, 2020
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3100 [3] M. Cristani, A. D. Bue, V. Murino, F. Setti and A. Vinciarelli “The Visual Social Distancing Problem,” in IEEE Access, vol. 8, pp. 126876- 126886.,doi: 10.1109/ACCESS.2020.3008370 , 2020 [4] Reluga, T.C., “Game theory of social distancing in response to an epidemic,” PLoS Comput Biol, 6(5), pp. 1000793., 2010 [5] De Vos, J., “Nyabadza, F., Chirove, F., Chukwu, W.C.and Visaya, M.V.,” Modelling the potential impact of social distancing on the COVID-19 epidemic in South Africa, medRxiv, 2020 Choi, S. and Ki, M., “Analyzing the effects of social distancing on the COVID-19 pandemic in Korea using mathematical modeling. Epidemiology and health,’ 42, pp. 2020064., 2020 [6] Zhang, J., Litvinova, M., Liang, Y., Wang, Y., Wang, W., Zhao, S., Wu, Q., Merler, S., Viboud, C., Vespignani, A. and Ajelli, M., “Age profile of susceptibility, mixing, and social distancing shape the dynamics of the novel coronavirus disease2019outbreakinChina.medrxiv,’42,pp.2020064.,2020, preprint [7] Li, K.K., Jarvis, S.A. and Minhas, F., “Elementary Effects Analysis of factors controlling COVID-19 infectionsin computational simulation reveals the importance of Social Distancing and Mask Usage, 2020, arXiv preprint arXiv:2011.11381. [8] Yadav, S., “Deep Learning based Safe Social Distancing and Face Mask Detection in Public Areas for COVID-19 Safety Guidelines Adherence,” International Journal for Research in Applied Science and Engineering Technology, 8(7), pp. 1368-1375., 2020 [9] Ahmed, F., Zviedrite, N. and Uzicanin, A., “Effectiveness of workplace social distancing measures inreducing influenza transmission: a systematic review,” International BMC public health, 18(1), pp. 1-13, 2018