SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 04 | Apr 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 782
ATM Security System Based on the Video Surveillance Using Neural
Networks
Prof. Manjunath Raikar
1
, Ms. Meghana S
2
, Mr. Prajesh
3
, Mr. Srichandan
4
, Mr. Zuhair Ahmed
5
1Professor, Dept. of CSE, YIT Moodbidri, Mangalore, Karnataka, India
2B.E Student, Dept. of CSE, YIT Moodbidri, Mangalore, Karnataka, India
3B.E Student, Dept. of CSE, YIT Moodbidri, Mangalore, Karnataka, India
4B.E Student, Dept. of CSE, YIT Moodbidri, Mangalore, Karnataka, India
5B.E Student, Dept. of CSE, YIT Moodbidri, Mangalore, Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Since many years ago, an unexpected or
uncommon event detection has been utilized to identify
strange elements in the collected data. The most popular
method is machine learning, which plays a significant role in
this field. In this essay, we've performed a review. on research
that examines the machine learning model that uses these
techniques to identify uncommon events. Ourreviewis divided
into four sections: usage of unusual detection, machine
learning techniques, overall model performance, and
classification of odd event detection. About 170 publications
from research that was published between the years2000and
2021 and provides information on machine learning
approaches have been recognized. After analyzingsomeofthe
research articles, we present 08 data sets which are included
our experiment on odd detection as well as many additional
datasets. By incorporating machine learning's unsupervised
odd detection method, it is made more complex. Through this
study paper, we encourage more studies based on the
recommendations made by this review. There are numerous
other experiments that use machine learning to identify odd
events.
Key Words: Neural Network, Security,Objectdetection,
Yolo, Haar Cascade
1.INTRODUCTION
For a long time, finding odd happenings was a big concern
and problem. For various kinds of operations, there are
numerous other ways being developed to identify odd
events. The challenge of identifying patterns in data that
weren't anticipated is known as unusual detection. The
importance of identifying uncommonoccurrencesinvarious
operational states aids in the identification of significant,
sensitive, imperative, and practicableinformation. Thereisa
need for automatic security warning systems in the current
ATM systems, It makes it possible for users to entertheATM
safely. Even though the governmentandfinancial authorities
have taken numerous measures to ensure safety, it is still
costing fees for the human security system that are extra.
The approach suggested here is a low-cost, real-time
automatic ATM security system that is based solely on video
surveillance detection. The research seeks to check for
several unusual activities, such as many people entering the
ATM, removing cameras from the system, even if some
camera masking is done, and even detecting peopleentering
the system while wearing a helmet. When any of these
circumstances arise at the ATM, the system immediately
sends a notification to the closest station and locks the ATM
door.
1.1 Objective Of Research
The major goal of this system is to be proactive in ensuring
public safety and preventing physical assaults by for seeing
events. Traditional video surveillance systems rely too
heavily on humanoversight,whichisexhaustingandproneto
mistakes. The sectors that require constant monitoring are
expanding, and the danger of not spotting anomalies in time
couldlead to serious disasters. We were also inspired totake
on this project to show how this extremelyimportantactivity
can be automated and increase the efficiency of the
surveillance system to alert any risks arising from the non-
detection of anomalies in time as and when they occur. This
id due to the advancement in the availability of sophisticated
video cameras, technologies for continuous streaming of
video data, and Deep learning techniques.
2. LITERATURE REVIEW
[1]Using Neural Networks, anomaly detection in videos
for video surveillance applications:
Video labelers, image processing, and activity detection are
the three layers that make up the entire process of anomaly
detection in video surveillance. In light of real-time
circumstances, anomaly detection in videos for video
surveillance application provides reliable findings.
Advantages include a 98.5% [1] accuracy rate at which the
abnormality was found in photos and videos. The main
drawback of this project is that it focuses on anomaly
detection in terms of people's security
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 04 | Apr 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 783
[2] ATM security system based on face detection and
running on embedded Linux:
The system is put into operation using a Raspberry Pi board
the size of a credit card that has expanded open-source
computer vision software capabilities. Consecutive
operations, like the initial system capture of the human face
and check to see if the human face is detected correctly or
not, give a high-level security mechanism [2]. It alerts the
user to adjust himself or herself adequatelyto detecttheface
if the face is not properly detected. The system will lock the
ATM cabin door if the face is still not properly detected for
security reasons. The system will automatically produce a
three-digit OTP code as soon as the door is locked.
[3] Smart ATM Surveillance System:
This paper describes an Automated Teller Machine (ATM)
surveillance system, a smart system based on embedded
technology that integrates various sensors to continuously
monitor its surroundings for suspicious activities like
physical attack, fraud, and theftthatcouldendangertheATM
and people nearby [3]. The security and safety precautions
that can be put in place to stop such raids through effective
surveillance are also covered. This study examines the
various physical assaults against ATMs andsuggestsways to
foresee them, take preventative action, and alert authorities
via the GSM network.
[4] Detection of Unusual Events in Low ResolutionUsing
video to improve ATM security:
Signal Processing and Integrated Networks International
Conference (SPIN) An algorithm that can find odd events in
low resolution video is presented in this research. Our
suggested method is frequently used to increase ATM
security without removing the existing poor resolution
cameras. By simply using morphological operationswiththe
appropriate structuring element, it may divide foreground
objects from scenes with changing backgrounds and
maintain [4] object attributestosomeextent.Thistechnique
uses rolling average background subtraction.Thissuggested
algorithm might be useful for boosting ATM security. The
outcomes demonstratethatthea forementionedtechniqueis
effective when used on low resolution video. The
disadvantages Could not find evidence of theft within the
ATM or damage to the screen.
3. PROPOSED WORK
The proposed system can employ a USB camera with low
resolution, but we have used a web camera for the
prototype. Live video will be streamed from the webcam,
and frames will be recorded for image processing. For our
design, we are utilizing Open CV, an open-source image
processing technique. Using the technique outlined below,
the unexpected activity inside the ATM is detected for the
proposed design. The listed approach can be improved by
adding more features as needed by training our own
classifiers. It is pretty straightforward.
The algorithms lead to:
1. Face recognition characteristics allow identification of
the person who entered the ATM.
2. It will be seen as odd conduct if the person using the
ATM has a helmet on or is wearing anything else that
would obscure his face.
3. If a person remains within an ATM without engaging in
any activity for a predetermined period of time, a
threshold time is set, and if the person remains inside
the ATM room for longer than the threshold time, an
alarm message is sent to the security guard so they can
keep an eye on him on screen.
4. If multiple faces are found, it is regarded as Unusual
Activity. This prevents robberies from occurring within
the ATM room.
Methodology:
The methodology employed in this paper is comprised of 8
phases. Before the data is saved or processed, the initial
stage of the process, known as video acquisition, entails
obtaining data from a variety of sources in order to capture
the video using any available video capturing equipment.
The second stage is frame conversion, which transforms the
captured video into frames suitable for further processing.
Pre-processing, which is used to reduce the noise in video
frames, is the third phase. Background modeling, which
develops the ideal background based on environmental
changes, is the fourth phase. The foreground images are
focused while background images are removed and
converted to pixels for further processing in the fifth phase,
known as background subtraction.at order to improve the
results, post-processing is carried out at the sixthphase.The
seventh and last stage, known as foreground extraction, is
eliminating only the moving subject from the frame. It helps
determine how effective the background subtraction is.
After finishing all these steps of unusual event
identification, we use Trading view alert system to receive
alert messages through SMS, Email, etc. It will send
notifications to the concerned officer as well as the police
station
Algorithms Used:
A. Convolution Neural Network (CNN)
A deep learning system called a convolutional neural
network (CNN) is able to recognize different objects in an
input image by assigning them weights and biases that can
be learned. In comparison to other classification methods, it
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 04 | Apr 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 784
requires significantly less setup. Convolutional layers,
pooling layers, and fully connected layers make up the
foundation of a CNN. To extract features from the input
image, a series of learnable filters are convolved with the
image in the convolutional layer. Thepoolinglayerkeepsthe
most crucial data while reducing the spatial size of the
convolutional layer's output. The convolutional and pooling
layers' outputs are fed into the fully connected layer, which
creates the final result.
B.Haar Cascade Algorithm
In order to identify objects, the Haar cascade method first
finds features in an image. These features are rectangular
areas with edges, lines, or corners that have specific pixel
values. Each classifier in the algorithm has been taught to
recognise a certaincharacteristic.Morecomplicatedfeatures
are layered on top of simpler ones in this hierarchical
framework of classifiers. A sliding window that sweeps over
the full image is used to scan the image throughout the
detecting phase. A score is given depending on how well the
features within the window fit the patterns of the object
being detected at each place after the classifiers have
analyzed the features within the window. The window is
labelled as containing the object if the score rises beyond a
predetermined threshold.
C.Yolo
A real-time object detection technique called YOLO (You
Only Look Once) combines detection and classification in a
single phase. The algorithm creates a grid from the input
image and forecasts bounding boxes and class probabilities
for each grid cell. Once integrated across many grid cells,
these predictions result in a complete set of object
detections. YOLO is renowned for its accuracy and speed; it
can process images at a rate of over 45 frames per second on
a typical GPU and excels at handling cluttered and small-
scale environments. Numerous practical uses of YOLO exist,
including automated drivingandvideosurveillance. Because
YOLO has a low false positive rate, it is less likely to wrongly
identify things that are not visible in the image. YOLO has
several drawbacks, like the inability to recognise tiny items
or those that are substantially obscured, yet it has been
demonstrated to outperform other cutting-edge object
detection algorithms in many situations.
D. ImageNet
Using the deep convolutional neural network architectureis
what the ImageNet algorithm does. A deep neural network
called AlexNet has 3 fully connected layers, 5 convolutional
layers, some of which are followed by max-pooling layers,
and 5 convolutional layers. It makesuseofthelocal response
normalization, dropout regularization, and rectified linear
unit (ReLU) activation function. The weights of the AlexNet
model are adjusted during training using the ImageNet
dataset, which has approximately14millionlabelledimages.
The goal is to develop a system of weights that can correctly
categorize photos into one of a thousand different item
categories. In the 2012 ILSVRC, AlexNet was able to obtain a
top-5 error rate of 15.3%, which wasa notableimprovement
over earlier state-of-the-art technique. Since then, many
additional deep neural network architectures, like as VGG,
ResNet, and Inception, have been created and tested on the
ImageNet dataset.
4. RESULTS
Automated Teller Machines(ATMs)area convenientway for
people to access their money and perform financial
transactions. However, due to their nature of dispensing
cash, they are a prime target for criminals. Therefore, ATM
security is of utmost importance to ensure the safety and
security of customers and their transactions. Our team has
created a method that will secure the ATM. We have
developed certain scenarios where security will determine
some unique operations because it is a crucial requirement
for society.
First, when the video stream starts, it begins counting
how many faces are in the atm room. If more than two faces
are counted, some strange behavior will be assumed to be
taking place. The notice will be issued to the affected
individuals or banks as soon as it has been determined that
sending more than two faces will prevent the same.
Fig-1: Identification of more than two faces
The review has addressed a variety of use cases and
testcases for object detection using open-cv, python, and
YOLO for sending messages to police stations, kitchen knife
identification, and helmet detection, closing the ATM door
automatically, and detecting multiple people using
convolution neural network, Haarcascade algorithm, and
Background Subtraction. Convolutional neural networksare
a type of deep learning system that may assign importance
to certain items in a system that may assign importance to
certain items in a picture as well as differentiate between
them. We may transform images into frames using cascade
classifiers, resize them, and use the yolo technique to
determine anticipated classes.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 04 | Apr 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 785
Fig -2: Detection of mask
Fig-3: Detection of Helmet
The motion detection technique for face recognition also
employs cascade classifiers. In the future, by utilizing this
model in ATMs, we will be able to create effective machine
learning models with improved security systems wherever
security is crucial. These modelswillalsohavegoodaccuracy
for results. The ultimate goal of a fully automated video
surveillance system is event recognition. Identifyingthekind
of motion that is significant ina videosurveillancesystemisa
difficult challenge. Background subtraction is used to detect
the objects in event recognition before their In order to
create a skeleton, boundaries are extracted. This skeleton
structure offers crucial motion clues, such as posture and
body language. The motion patterns of segmented blobs can
be used to recognise and detect events like fights, theft,
overcrowding, and more.
Fig-4: Detection of knife
Through the Telegram application, users may sign up to
receive notifications as soon as any unusual events are
recorded, such as in an ATM, so that they can get in touch
with local police officials and file, a report.
Fig-5: Sending message to concerned authority
5. CONCLUSION
This research investigates the detection of abnormal
occurrences in ATMs using machine learning algorithms.
The ATM type is designed to provide more reliable security
by incorporating facial recognition technology. We even try
to maintain the functionality of this ATM machine to a
greater extent by minimizing the time delay of the
verification mechanism. By identifying and authenticating
owners' accounts at the ATM withbiometrics,theproblem of
unpredictable transactions can be remedied. We attempted
to advance a solution to the issue of falsetransactions,which
is a frequent issue, by utilizing ATM biometrics. This
strategy, though, would only work if the account holder was
present. The unauthorized ATM transactions that happen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 04 | Apr 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 786
without the knowledge of the true owner can be stopped.
Using a biometric feature for identityisrobustandsafe, even
when other characteristics are used at the authentication
level. We invite researchers to carry out additional studies
on machine learning methods for identifying rare events in
order to increase the model's effectiveness in light of our
work. Another issue that needs to be addressed is the
model's precision. As a result, we createdanATMmodel that
uses facial recognition software to more reliably provide
security. We even attempt to retain the effectiveness of this
ATM system to a larger extent by minimizing the time spent
in the verification procedure to a minimum. The much-
needed and much awaited answer to the issue of
unauthorized transactions is provided by biometrics as a
method of identifying and validating account owners at the
Automated Teller Machines. Through biometrics, which can
only be used when the account holder is physically present,
we have attempted to give a solution to the feared problem
of fraudulent transactions through automated teller
machines. As a result, it eliminatesinstancesofunauthorised
transactions at ATM locations.
6. REFERENCES
[1] Ruben J Franklin,Mohana,VidyashreeDabbagol,Anomaly
Detection in VideosforVideo SurveillanceApplicationsusing
Neural Networks, IEEE Journal paper 2020.
[2] Saleem Ulla Shariff; MaheboobHussain; Mohammed
FarhaanShariff, “Smart unusual event detection using low
resolution camera for enhanced security”, 2017
International Conference on Innovations in Information,
Embedded and Communication Systems (ICIIECS), 17-18
March 2017
[3] Jignesh J. Patoliya; Miral M. Desai, “Face detection-based
ATM security system using embeddedLinux platform”,2017
2nd International ConferenceforConvergenceinTechnology
(I2CT), 7-9 April 2017.
[4]SudhirGoswami, JyotiGoswami,NagreshKumar,“Unusual
Event Detection in Low Resolution Videofor enhancingATM
security”, 2nd International ConferenceonSignal Processing
and Integrated Networks (SPIN), 2015.

More Related Content

Similar to ATM Security System Based on the Video Surveillance Using Neural Networks

Advance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCVAdvance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCVIRJET Journal
 
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET Journal
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IRJET Journal
 
An Overview of Various Techniques Involved in Detection of Anomalies from Sur...
An Overview of Various Techniques Involved in Detection of Anomalies from Sur...An Overview of Various Techniques Involved in Detection of Anomalies from Sur...
An Overview of Various Techniques Involved in Detection of Anomalies from Sur...ijcseit
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEOIRJET Journal
 
Object Detection and Localization for Visually Impaired People using CNN
Object Detection and Localization for Visually Impaired People using CNNObject Detection and Localization for Visually Impaired People using CNN
Object Detection and Localization for Visually Impaired People using CNNIRJET Journal
 
Real-time Anomaly Detection and Alert System for Video Surveillance
Real-time Anomaly Detection and Alert System for Video SurveillanceReal-time Anomaly Detection and Alert System for Video Surveillance
Real-time Anomaly Detection and Alert System for Video SurveillanceIRJET Journal
 
Abnormal activity detection in surveillance video scenes
Abnormal activity detection in surveillance video scenesAbnormal activity detection in surveillance video scenes
Abnormal activity detection in surveillance video scenesTELKOMNIKA JOURNAL
 
A Review on Motion Detection Techniques
A Review on Motion Detection TechniquesA Review on Motion Detection Techniques
A Review on Motion Detection Techniquesijtsrd
 
IRJET- A Survey on Human Action Recognition
IRJET- A Survey on Human Action RecognitionIRJET- A Survey on Human Action Recognition
IRJET- A Survey on Human Action RecognitionIRJET Journal
 
IRJET- Border Security using Computer Vision
IRJET- Border Security using Computer VisionIRJET- Border Security using Computer Vision
IRJET- Border Security using Computer VisionIRJET Journal
 
Object and Currency Detection for the Visually Impaired
Object and Currency Detection for the Visually ImpairedObject and Currency Detection for the Visually Impaired
Object and Currency Detection for the Visually ImpairedIRJET Journal
 
Safety Helmet Detection in Engineering and Management
Safety Helmet Detection in Engineering and ManagementSafety Helmet Detection in Engineering and Management
Safety Helmet Detection in Engineering and ManagementIRJET Journal
 
IRJET- Moving Object Detection with Shadow Compression using Foreground Segme...
IRJET- Moving Object Detection with Shadow Compression using Foreground Segme...IRJET- Moving Object Detection with Shadow Compression using Foreground Segme...
IRJET- Moving Object Detection with Shadow Compression using Foreground Segme...IRJET Journal
 
PERSONAL PROTECTIVE EQUIPMENT DETECTION AND MACHINE POWER CONTROL USING IMAGE...
PERSONAL PROTECTIVE EQUIPMENT DETECTION AND MACHINE POWER CONTROL USING IMAGE...PERSONAL PROTECTIVE EQUIPMENT DETECTION AND MACHINE POWER CONTROL USING IMAGE...
PERSONAL PROTECTIVE EQUIPMENT DETECTION AND MACHINE POWER CONTROL USING IMAGE...IRJET Journal
 
IRJET- Applications of Object Detection System
IRJET-  	  Applications of Object Detection SystemIRJET-  	  Applications of Object Detection System
IRJET- Applications of Object Detection SystemIRJET Journal
 
Event Detection Using Background Subtraction For Surveillance Systems
Event Detection Using Background Subtraction For Surveillance SystemsEvent Detection Using Background Subtraction For Surveillance Systems
Event Detection Using Background Subtraction For Surveillance SystemsIRJET Journal
 
IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...
IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...
IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...IRJET Journal
 

Similar to ATM Security System Based on the Video Surveillance Using Neural Networks (20)

Advance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCVAdvance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCV
 
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert Management
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
 
An Overview of Various Techniques Involved in Detection of Anomalies from Sur...
An Overview of Various Techniques Involved in Detection of Anomalies from Sur...An Overview of Various Techniques Involved in Detection of Anomalies from Sur...
An Overview of Various Techniques Involved in Detection of Anomalies from Sur...
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
 
Object Detection and Localization for Visually Impaired People using CNN
Object Detection and Localization for Visually Impaired People using CNNObject Detection and Localization for Visually Impaired People using CNN
Object Detection and Localization for Visually Impaired People using CNN
 
Real-time Anomaly Detection and Alert System for Video Surveillance
Real-time Anomaly Detection and Alert System for Video SurveillanceReal-time Anomaly Detection and Alert System for Video Surveillance
Real-time Anomaly Detection and Alert System for Video Surveillance
 
Abnormal activity detection in surveillance video scenes
Abnormal activity detection in surveillance video scenesAbnormal activity detection in surveillance video scenes
Abnormal activity detection in surveillance video scenes
 
A Review on Motion Detection Techniques
A Review on Motion Detection TechniquesA Review on Motion Detection Techniques
A Review on Motion Detection Techniques
 
best pharma journals
best pharma journals best pharma journals
best pharma journals
 
IRJET- A Survey on Human Action Recognition
IRJET- A Survey on Human Action RecognitionIRJET- A Survey on Human Action Recognition
IRJET- A Survey on Human Action Recognition
 
IRJET- Border Security using Computer Vision
IRJET- Border Security using Computer VisionIRJET- Border Security using Computer Vision
IRJET- Border Security using Computer Vision
 
Smart surveillance using deep learning
Smart surveillance using deep learningSmart surveillance using deep learning
Smart surveillance using deep learning
 
Object and Currency Detection for the Visually Impaired
Object and Currency Detection for the Visually ImpairedObject and Currency Detection for the Visually Impaired
Object and Currency Detection for the Visually Impaired
 
Safety Helmet Detection in Engineering and Management
Safety Helmet Detection in Engineering and ManagementSafety Helmet Detection in Engineering and Management
Safety Helmet Detection in Engineering and Management
 
IRJET- Moving Object Detection with Shadow Compression using Foreground Segme...
IRJET- Moving Object Detection with Shadow Compression using Foreground Segme...IRJET- Moving Object Detection with Shadow Compression using Foreground Segme...
IRJET- Moving Object Detection with Shadow Compression using Foreground Segme...
 
PERSONAL PROTECTIVE EQUIPMENT DETECTION AND MACHINE POWER CONTROL USING IMAGE...
PERSONAL PROTECTIVE EQUIPMENT DETECTION AND MACHINE POWER CONTROL USING IMAGE...PERSONAL PROTECTIVE EQUIPMENT DETECTION AND MACHINE POWER CONTROL USING IMAGE...
PERSONAL PROTECTIVE EQUIPMENT DETECTION AND MACHINE POWER CONTROL USING IMAGE...
 
IRJET- Applications of Object Detection System
IRJET-  	  Applications of Object Detection SystemIRJET-  	  Applications of Object Detection System
IRJET- Applications of Object Detection System
 
Event Detection Using Background Subtraction For Surveillance Systems
Event Detection Using Background Subtraction For Surveillance SystemsEvent Detection Using Background Subtraction For Surveillance Systems
Event Detection Using Background Subtraction For Surveillance Systems
 
IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...
IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...
IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 

Recently uploaded (20)

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 

ATM Security System Based on the Video Surveillance Using Neural Networks

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 04 | Apr 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 782 ATM Security System Based on the Video Surveillance Using Neural Networks Prof. Manjunath Raikar 1 , Ms. Meghana S 2 , Mr. Prajesh 3 , Mr. Srichandan 4 , Mr. Zuhair Ahmed 5 1Professor, Dept. of CSE, YIT Moodbidri, Mangalore, Karnataka, India 2B.E Student, Dept. of CSE, YIT Moodbidri, Mangalore, Karnataka, India 3B.E Student, Dept. of CSE, YIT Moodbidri, Mangalore, Karnataka, India 4B.E Student, Dept. of CSE, YIT Moodbidri, Mangalore, Karnataka, India 5B.E Student, Dept. of CSE, YIT Moodbidri, Mangalore, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Since many years ago, an unexpected or uncommon event detection has been utilized to identify strange elements in the collected data. The most popular method is machine learning, which plays a significant role in this field. In this essay, we've performed a review. on research that examines the machine learning model that uses these techniques to identify uncommon events. Ourreviewis divided into four sections: usage of unusual detection, machine learning techniques, overall model performance, and classification of odd event detection. About 170 publications from research that was published between the years2000and 2021 and provides information on machine learning approaches have been recognized. After analyzingsomeofthe research articles, we present 08 data sets which are included our experiment on odd detection as well as many additional datasets. By incorporating machine learning's unsupervised odd detection method, it is made more complex. Through this study paper, we encourage more studies based on the recommendations made by this review. There are numerous other experiments that use machine learning to identify odd events. Key Words: Neural Network, Security,Objectdetection, Yolo, Haar Cascade 1.INTRODUCTION For a long time, finding odd happenings was a big concern and problem. For various kinds of operations, there are numerous other ways being developed to identify odd events. The challenge of identifying patterns in data that weren't anticipated is known as unusual detection. The importance of identifying uncommonoccurrencesinvarious operational states aids in the identification of significant, sensitive, imperative, and practicableinformation. Thereisa need for automatic security warning systems in the current ATM systems, It makes it possible for users to entertheATM safely. Even though the governmentandfinancial authorities have taken numerous measures to ensure safety, it is still costing fees for the human security system that are extra. The approach suggested here is a low-cost, real-time automatic ATM security system that is based solely on video surveillance detection. The research seeks to check for several unusual activities, such as many people entering the ATM, removing cameras from the system, even if some camera masking is done, and even detecting peopleentering the system while wearing a helmet. When any of these circumstances arise at the ATM, the system immediately sends a notification to the closest station and locks the ATM door. 1.1 Objective Of Research The major goal of this system is to be proactive in ensuring public safety and preventing physical assaults by for seeing events. Traditional video surveillance systems rely too heavily on humanoversight,whichisexhaustingandproneto mistakes. The sectors that require constant monitoring are expanding, and the danger of not spotting anomalies in time couldlead to serious disasters. We were also inspired totake on this project to show how this extremelyimportantactivity can be automated and increase the efficiency of the surveillance system to alert any risks arising from the non- detection of anomalies in time as and when they occur. This id due to the advancement in the availability of sophisticated video cameras, technologies for continuous streaming of video data, and Deep learning techniques. 2. LITERATURE REVIEW [1]Using Neural Networks, anomaly detection in videos for video surveillance applications: Video labelers, image processing, and activity detection are the three layers that make up the entire process of anomaly detection in video surveillance. In light of real-time circumstances, anomaly detection in videos for video surveillance application provides reliable findings. Advantages include a 98.5% [1] accuracy rate at which the abnormality was found in photos and videos. The main drawback of this project is that it focuses on anomaly detection in terms of people's security
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 04 | Apr 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 783 [2] ATM security system based on face detection and running on embedded Linux: The system is put into operation using a Raspberry Pi board the size of a credit card that has expanded open-source computer vision software capabilities. Consecutive operations, like the initial system capture of the human face and check to see if the human face is detected correctly or not, give a high-level security mechanism [2]. It alerts the user to adjust himself or herself adequatelyto detecttheface if the face is not properly detected. The system will lock the ATM cabin door if the face is still not properly detected for security reasons. The system will automatically produce a three-digit OTP code as soon as the door is locked. [3] Smart ATM Surveillance System: This paper describes an Automated Teller Machine (ATM) surveillance system, a smart system based on embedded technology that integrates various sensors to continuously monitor its surroundings for suspicious activities like physical attack, fraud, and theftthatcouldendangertheATM and people nearby [3]. The security and safety precautions that can be put in place to stop such raids through effective surveillance are also covered. This study examines the various physical assaults against ATMs andsuggestsways to foresee them, take preventative action, and alert authorities via the GSM network. [4] Detection of Unusual Events in Low ResolutionUsing video to improve ATM security: Signal Processing and Integrated Networks International Conference (SPIN) An algorithm that can find odd events in low resolution video is presented in this research. Our suggested method is frequently used to increase ATM security without removing the existing poor resolution cameras. By simply using morphological operationswiththe appropriate structuring element, it may divide foreground objects from scenes with changing backgrounds and maintain [4] object attributestosomeextent.Thistechnique uses rolling average background subtraction.Thissuggested algorithm might be useful for boosting ATM security. The outcomes demonstratethatthea forementionedtechniqueis effective when used on low resolution video. The disadvantages Could not find evidence of theft within the ATM or damage to the screen. 3. PROPOSED WORK The proposed system can employ a USB camera with low resolution, but we have used a web camera for the prototype. Live video will be streamed from the webcam, and frames will be recorded for image processing. For our design, we are utilizing Open CV, an open-source image processing technique. Using the technique outlined below, the unexpected activity inside the ATM is detected for the proposed design. The listed approach can be improved by adding more features as needed by training our own classifiers. It is pretty straightforward. The algorithms lead to: 1. Face recognition characteristics allow identification of the person who entered the ATM. 2. It will be seen as odd conduct if the person using the ATM has a helmet on or is wearing anything else that would obscure his face. 3. If a person remains within an ATM without engaging in any activity for a predetermined period of time, a threshold time is set, and if the person remains inside the ATM room for longer than the threshold time, an alarm message is sent to the security guard so they can keep an eye on him on screen. 4. If multiple faces are found, it is regarded as Unusual Activity. This prevents robberies from occurring within the ATM room. Methodology: The methodology employed in this paper is comprised of 8 phases. Before the data is saved or processed, the initial stage of the process, known as video acquisition, entails obtaining data from a variety of sources in order to capture the video using any available video capturing equipment. The second stage is frame conversion, which transforms the captured video into frames suitable for further processing. Pre-processing, which is used to reduce the noise in video frames, is the third phase. Background modeling, which develops the ideal background based on environmental changes, is the fourth phase. The foreground images are focused while background images are removed and converted to pixels for further processing in the fifth phase, known as background subtraction.at order to improve the results, post-processing is carried out at the sixthphase.The seventh and last stage, known as foreground extraction, is eliminating only the moving subject from the frame. It helps determine how effective the background subtraction is. After finishing all these steps of unusual event identification, we use Trading view alert system to receive alert messages through SMS, Email, etc. It will send notifications to the concerned officer as well as the police station Algorithms Used: A. Convolution Neural Network (CNN) A deep learning system called a convolutional neural network (CNN) is able to recognize different objects in an input image by assigning them weights and biases that can be learned. In comparison to other classification methods, it
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 04 | Apr 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 784 requires significantly less setup. Convolutional layers, pooling layers, and fully connected layers make up the foundation of a CNN. To extract features from the input image, a series of learnable filters are convolved with the image in the convolutional layer. Thepoolinglayerkeepsthe most crucial data while reducing the spatial size of the convolutional layer's output. The convolutional and pooling layers' outputs are fed into the fully connected layer, which creates the final result. B.Haar Cascade Algorithm In order to identify objects, the Haar cascade method first finds features in an image. These features are rectangular areas with edges, lines, or corners that have specific pixel values. Each classifier in the algorithm has been taught to recognise a certaincharacteristic.Morecomplicatedfeatures are layered on top of simpler ones in this hierarchical framework of classifiers. A sliding window that sweeps over the full image is used to scan the image throughout the detecting phase. A score is given depending on how well the features within the window fit the patterns of the object being detected at each place after the classifiers have analyzed the features within the window. The window is labelled as containing the object if the score rises beyond a predetermined threshold. C.Yolo A real-time object detection technique called YOLO (You Only Look Once) combines detection and classification in a single phase. The algorithm creates a grid from the input image and forecasts bounding boxes and class probabilities for each grid cell. Once integrated across many grid cells, these predictions result in a complete set of object detections. YOLO is renowned for its accuracy and speed; it can process images at a rate of over 45 frames per second on a typical GPU and excels at handling cluttered and small- scale environments. Numerous practical uses of YOLO exist, including automated drivingandvideosurveillance. Because YOLO has a low false positive rate, it is less likely to wrongly identify things that are not visible in the image. YOLO has several drawbacks, like the inability to recognise tiny items or those that are substantially obscured, yet it has been demonstrated to outperform other cutting-edge object detection algorithms in many situations. D. ImageNet Using the deep convolutional neural network architectureis what the ImageNet algorithm does. A deep neural network called AlexNet has 3 fully connected layers, 5 convolutional layers, some of which are followed by max-pooling layers, and 5 convolutional layers. It makesuseofthelocal response normalization, dropout regularization, and rectified linear unit (ReLU) activation function. The weights of the AlexNet model are adjusted during training using the ImageNet dataset, which has approximately14millionlabelledimages. The goal is to develop a system of weights that can correctly categorize photos into one of a thousand different item categories. In the 2012 ILSVRC, AlexNet was able to obtain a top-5 error rate of 15.3%, which wasa notableimprovement over earlier state-of-the-art technique. Since then, many additional deep neural network architectures, like as VGG, ResNet, and Inception, have been created and tested on the ImageNet dataset. 4. RESULTS Automated Teller Machines(ATMs)area convenientway for people to access their money and perform financial transactions. However, due to their nature of dispensing cash, they are a prime target for criminals. Therefore, ATM security is of utmost importance to ensure the safety and security of customers and their transactions. Our team has created a method that will secure the ATM. We have developed certain scenarios where security will determine some unique operations because it is a crucial requirement for society. First, when the video stream starts, it begins counting how many faces are in the atm room. If more than two faces are counted, some strange behavior will be assumed to be taking place. The notice will be issued to the affected individuals or banks as soon as it has been determined that sending more than two faces will prevent the same. Fig-1: Identification of more than two faces The review has addressed a variety of use cases and testcases for object detection using open-cv, python, and YOLO for sending messages to police stations, kitchen knife identification, and helmet detection, closing the ATM door automatically, and detecting multiple people using convolution neural network, Haarcascade algorithm, and Background Subtraction. Convolutional neural networksare a type of deep learning system that may assign importance to certain items in a system that may assign importance to certain items in a picture as well as differentiate between them. We may transform images into frames using cascade classifiers, resize them, and use the yolo technique to determine anticipated classes.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 04 | Apr 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 785 Fig -2: Detection of mask Fig-3: Detection of Helmet The motion detection technique for face recognition also employs cascade classifiers. In the future, by utilizing this model in ATMs, we will be able to create effective machine learning models with improved security systems wherever security is crucial. These modelswillalsohavegoodaccuracy for results. The ultimate goal of a fully automated video surveillance system is event recognition. Identifyingthekind of motion that is significant ina videosurveillancesystemisa difficult challenge. Background subtraction is used to detect the objects in event recognition before their In order to create a skeleton, boundaries are extracted. This skeleton structure offers crucial motion clues, such as posture and body language. The motion patterns of segmented blobs can be used to recognise and detect events like fights, theft, overcrowding, and more. Fig-4: Detection of knife Through the Telegram application, users may sign up to receive notifications as soon as any unusual events are recorded, such as in an ATM, so that they can get in touch with local police officials and file, a report. Fig-5: Sending message to concerned authority 5. CONCLUSION This research investigates the detection of abnormal occurrences in ATMs using machine learning algorithms. The ATM type is designed to provide more reliable security by incorporating facial recognition technology. We even try to maintain the functionality of this ATM machine to a greater extent by minimizing the time delay of the verification mechanism. By identifying and authenticating owners' accounts at the ATM withbiometrics,theproblem of unpredictable transactions can be remedied. We attempted to advance a solution to the issue of falsetransactions,which is a frequent issue, by utilizing ATM biometrics. This strategy, though, would only work if the account holder was present. The unauthorized ATM transactions that happen
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 04 | Apr 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 786 without the knowledge of the true owner can be stopped. Using a biometric feature for identityisrobustandsafe, even when other characteristics are used at the authentication level. We invite researchers to carry out additional studies on machine learning methods for identifying rare events in order to increase the model's effectiveness in light of our work. Another issue that needs to be addressed is the model's precision. As a result, we createdanATMmodel that uses facial recognition software to more reliably provide security. We even attempt to retain the effectiveness of this ATM system to a larger extent by minimizing the time spent in the verification procedure to a minimum. The much- needed and much awaited answer to the issue of unauthorized transactions is provided by biometrics as a method of identifying and validating account owners at the Automated Teller Machines. Through biometrics, which can only be used when the account holder is physically present, we have attempted to give a solution to the feared problem of fraudulent transactions through automated teller machines. As a result, it eliminatesinstancesofunauthorised transactions at ATM locations. 6. REFERENCES [1] Ruben J Franklin,Mohana,VidyashreeDabbagol,Anomaly Detection in VideosforVideo SurveillanceApplicationsusing Neural Networks, IEEE Journal paper 2020. [2] Saleem Ulla Shariff; MaheboobHussain; Mohammed FarhaanShariff, “Smart unusual event detection using low resolution camera for enhanced security”, 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), 17-18 March 2017 [3] Jignesh J. Patoliya; Miral M. Desai, “Face detection-based ATM security system using embeddedLinux platform”,2017 2nd International ConferenceforConvergenceinTechnology (I2CT), 7-9 April 2017. [4]SudhirGoswami, JyotiGoswami,NagreshKumar,“Unusual Event Detection in Low Resolution Videofor enhancingATM security”, 2nd International ConferenceonSignal Processing and Integrated Networks (SPIN), 2015.