SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
ยฉ 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2753
Computer Vision-Based Early Fire Detection Using Machine Learning
Asan Nainar M1, Ishwariya P2, Lakshmi Prabha R3, Mythireyeni P V4, Neelaveni M5
1Assistant Professor, Department of IT, SRM Valliammai Engineering College, Tamilnadu, India
2,3,4,5 UG Students, Department of IT, SRM Valliammai Engineering College, Tamilnadu, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The project aimed to detect fire by using the
image processing technology will alert people by early
detection of fire. The automatic fire alarm systems already
existed the sensor method has limitations and designed to
sense fire with the smoke, limited areas. To reduce limitations
and to optimize with present technology, Computer Vision
Based Early Fire Detection using machine learning is
proposed. The implementation is done by using PyCharm IDE
and primary or secondary camera is used. Webcamistakenas
an input source, which captures the video feed from the
surrounding and feeds into the system for analysis. Thecodeis
written in python language using the open CV2 library for
image processing. The theoretical parts emphasize more in
computer vision, machine learning, image processing, color
model, and the working algorithm of the project to detect the
fire. The project uses algorithms such as Morphological
Transformation, Simple Thresholding and Image Processing
which is used in the object detection through the image or
video. Morphological transformation is used for the accuracy
of detecting the fire. Simple Thresholding is used in the
detection of intensity of the fire .The libraries and operatorsin
OpenCV such as Matplot library is used to convert the color
forms , comparison operators and bitwise operators are used
to mask the layers of the fire.
Key Words: Fire Detection, Image Processing, Color Model,
Alarm, Notification Mail
1. INTRODUCTION
Computer Vision basedfiredetectionusingimageprocessing
has the potential to be useful in conditions in which
conventional methods cannot be adopted. The firedetection
algorithm uses visual characteristics of fires like brightness,
color, spectral texture, spectral flicker,andedgetremblingto
discriminate them from other visible stimuli. There are
various fire detection techniques such as infrared sensor, a
thermal detector,smokedetector,flamedetector,andoptical
smoke detector. These methods are not always reliable as
they do not always detect the fire itself but detect one or
more phenomena resulting from fire, such as smoke, heat,
infrared, ultraviolet light radiation or gas, which could be
produced in other ways and hence, produces many false
alarms. By the help of computer vision andimageprocessing
techniques, it is possible to get better results than
conventional systems because images can provide more
reliable information.
2. LITERATURE SURVEY
This proposed system has gone through various references
and research over different journals and conference papers
that are evolved for the past 10 years. The research and
referrals of survey is conducted on different domainslike AI,
NLP, Home environments that helped to develop the
proposed system of AI based Control AAS.
Those references and the detailed report on the references
are listed as follows.
1. KB Deve, GP Hancke and BJ Silva , (2016), โ€œDesign of
a Smart Fire Detection System.โ€ The problem that was
addressed by this work was to detect fires and reduce the
occurrence of false positives in a kitchen environment.
2. Khan Muhammad, Jamil Ahmad, Zhihan ,Paolo
Bellavist, Transactions on Systems, Man, and Cybernetics:
โ€œSystems Efficient Deep CNN-Based Fire Detection and
Localization in Video Surveillance Applications.โ€ Their
application in fire detection systems will substantially
improve detection accuracy, which will eventuallyminimize
fire disasters and reduce the ecological and social
ramifications.
3. Avi Bar-Massada , Todd J. Hawbaker, Susan I.
Stewart, and Volker C. Radeloff โ€œCombining Satellite-Based
Fire ObservationsandGround-BasedLightningDetectionsto
Identify Lightning Fires Across the Conterminous USA.โ€ The
algorithm searches for spatiotemporal conjunctions of
MODIS fire clusters and NLDN detected lightning strikes,
given a spatiotemporal lag between lightning strike and fire
ignition. The algorithm revealed distinctive spatial patterns
of lightning fires in the conterminous US While a sensitivity
analysis revealed that the algorithm is highlysensitivetothe
two thresholds that are used to determine conjunction.
4. Tian Qiu, Yong Yan, Gang Lu โ€œAn Auto adaptive Edge-
Detection Algorithm for Flame and Fire Image Processingโ€.
The algorithm detects the coarse and superfluous edges in a
flame/fire image first and then identifies the edges of the
flame/fire and removes the irrelevant artifacts. The auto
adaptive feature of the algorithm ensures that the primary
symbolic flame/fire edges are identified for different
scenarios. Experimental results for different flame images
and video frames proved the effectivenessandrobustnessof
the algorithm.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072
ยฉ 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2754
3. PROPOSED WORK
The proposed system is based on the Image Processing,
Morphological Transformation, Simple Thresholding and
OpenCV which is very popular in object detection through
the image or any other video feeds.
The process is divided into 3 differentphaseswhichemploys
various algorithms and methods for implementation.
3.1 FIRE DETECTION MODULE
The procedure for detecting fire classifies images based on
the value of simple features from an image. To detectthefire
the image have to be converted to RGB. As the OpenCV as
the ability to convert the image to BGR, Matplot library is
used to convert the image to RGB. The flow of detection is
shown in fig-2.1.The captured video is converted into 2D
images using imshow module. The captured pixels are
arranged in rows and columns. Then in order to convert the
image to BGR the pixels are arranged in the x,y,z matrix.
Then the matrix pixels are comparedwith eachotherandthe
layers are masked using bitwise_ AND. Using Morphological
transformation the imperfections are corrected by the
process of Dilation and Erosion. The Absolute difference of
the color models are found. The Simple thresholding is
applied to find the intensity.
Fig-2.1: Flow of detection process
3.2 ALARM MODULE
A siren is a noisy noise-makingdevice.Civil protectionsirens
Are established in constant places and used to warn of
natural failures or attacks. If the hearth place is detected the
alarm is performed and notifies the monitor.Puttingaheada
while loop which takes the argument of the time, the
consumer wants to set the alarm on and routinely breaks
while the time is up, with sound refer fig-2.2.
Fig-2.2: Alarm
3.3 NOTIFICATION MAIL
When you click on send, the message is transmitted from
your laptop to the server related to the recipient's address.
This procedure generally takes place thru numerous other
Servers earlier than the message receives to its supposed
recipient's mailbox. The flow of notification mail is shown in
fig-2.3. Electronic mailboxes are imperative to how emails
paintings for the end-user.Thewell-knownprotocol used for
sending Internet e mail is referred to as SMTP (Simple Mail
Transfer Protocol). The SMTP protocol is used to each send
and acquire e-mail messages over the Internet. When a
message is sent, the e-mail patron sends the message to the
SMTP server.
Fig-2.3: Shows the flow of E-Mail
4. SYSTEM ARCHITECTURE
The first step is the surrounding cameras will capture the
video in real time refer fig-3 for the flow of system
architecture. Then in the next step the video is converted
into frames and the frames are sent for conversion, eachand
every frames are converted into BGR using CV2. To convert
into RGB Matplot library is used. Imshow moduleofMatplot
library is used to convert the raw dataโ€™s into 2D images. The
Image Processing algorithms are used. And next step is
comparison of the frames using CV comparison. Then the
mask is layered using Bitwise_AND. The image is compared
using the operators of CV2, i.e. source 1 is greater than
source 2. The Morphological Transformation is used to
remove the imperfections from the images. It is carried out
by Erosion and Dilation. It adds or removes the pixels from
object to boundaries. The removal and addition of pixels
depends on the size of the Structuring Elements. The BGR is
converted to YCR_CB, the Luma component and Blue-Red
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072
ยฉ 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2755
difference of the chroma components. The frame is splitted
as Y,Cr,Cb . After splitting the frames the mean of those
elements is found. The Absolute difference between the
pixels of two images are calculated. Simple Thresholding
technique is also a Binary Thresholding. If the pixel intensity
is greater than the set threshold, value set to 255, else set to
zero (black). In the final step if the value of dt is greater than
0.3 then the fire is detected and if it is less than 0.2, then the
fire is not detected. After the detection the mail is sent with
an image with fire.
Fig-3: System Architecture
5. METHODOLOGY
5.1 DETECTION
The procedure for detecting fire classifies pics primarily
based totally at the value of easy features from an picture.
The frames are then converted into BGR using CV2 and with
using Matplot library the image is converted into RGB. The
detected fire images are stored in a folder and the fire
images are sent via mail. Along with small steps, the box
detects the features like edges, brightness level from the
image of fire, and then data collected by pixels are put
together, which helps to determine where the fire is located.
5.2 MATPLOT
OpenCV has the ability to change the image into BGR but to
process the frames the image has to be converted into RGB.
In order to work on the color models the Matplaot library is
used. First of all the frames are converted to BGR.The BGR is
then converted to YCR_CB, the luma componentandtheCb,Cr
are the blue-red difference of thechroma components.Inthe
final stage the YCR_CB is converted to RGB. Comparing the
source1 and source 2 of the images. If the source1 is greater
than source2 then the operations are proceeded.
5.3 MASKING THE LAYERS
Masking means limiting a certain layer or adjustment is
visible areas. A mask allows an image to adjust a certain
portion of your image while leaving the rest completely
aside. It is masking a brighter subject while leaving the
background unedited. The bitwise_AND operator computes
bitwise conjunction of the two arrays.
5.4 MORPHOLOGICAL TRANSFORMATION
Morphological transformation is used to remove all the
imperfections from the binary image. It helps to achieve the
smoothness in the image. The two operations are Opening
operation and Closing operations. Morphological
transformation is shown in fig-4.1. The operations are
carried away in two steps i.e. Erode and Dilation refer fig 4.2
Fig-4.1: Morphological Transformation
๏‚ท ERODE: The Erode operation removes the pixels
from the edge of the objects.
๏‚ท DILATE: The Dilate operation adds extra pixels to
the edges.
Fig-4.2: Erode and Dilate
5.5 THRESHOLDING
The basic thresholding is the technique is known as Binary
thresholding. For every pixel, the same threshold value is
applied. If the pixel value is smaller than the threshold it is
set to zero, otherwise it is to the maximum value i.e. 255.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072
ยฉ 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2756
6. RESULTS
Fire is detected and the output is displayed in the
application. The result is shown in fig-5
Fig-5: Fire is detected
7. CONCLUSIONS AND FUTURE ENHANCEMENT
The project aimed to detect fire with a different approach
rather than using an existing system. As technology is
getting better and better as to keep it up with thetechnology
and to minimize the limitations also, the new system has
created. By using image processing technologyfordetecting
the fire, these limitations can be reduced because in this
system camera acts like a human eye, as it detects a fire, the
video is captured, and the image is processed using the
software alert user. It can be used everywhere e.g. Hospital,
railway station, forest etc. The designed prototype
successfully detects fire gives the review analysis, designing
system, and algorithm, test, and result. Currently, we not
used the systems like a smoke detector and sprinkler water
discharge systems, but in future it can be included.
Quantitative evaluation to evaluate the overall performance
of various strategies. We in comparison our technique with
famous fire detection algorithms, which might be primarily
based totally on YOLO networks and DL approaches. We
used the consequences of their papers for comparison,
however we aren't positive whether or not they're real due
to the fact supply codes and datasets of those techniques
aren't publicly to be had to test the actual overall
performance. We computed metrics which includes F-
measure (FM), precision, and consider, as in our in advance
study. The FM rating is the weighted common that balances
measurements among the manner of precision andconsider
rates. Hence, this rating considers each false positives and
false negatives. Intuitively, it isn't always smooth to
apprehend accuracy, however FM is greater not unusual
place than accuracy. Accuracy worksqualityiffalsepositives
and false negatives have comparable charges. If the charges
of false positives and false negatives are different, it's far
higher to don't forget each precision and recall Precision is
the ratio of correctly predicted positive observationstototal
predicted positive observations. Recall is the ratio o
correctly predicted positive observations toall observations
withinside the real class. The proposed techniqueโ€™s common
of FM, consider, and precision became 98.9%. False
detection took place in 1.1% of cases, attributable to the
blurring of gadgets at night.
8. REFERENCES
[1] N. Dziengel, G. Wittenburg, and J. Schiller, "Towards
distributed event detection in Wireless Sensor
Networks," in Adjunct Proc. of 4th IEEEfACM IntI. Conf.
on Distributed Computing in Sensor Systems
(DCOSSa:AZ'08), Santorini Island, Greece, 2020.
[2] S. Jarupadung, "Distributed event detection and
semantic event processing," in The 6th ACM
International Conference on Distributed Event- Based
Systems (DEBS 2020)(Doctoral Symposium), 2020.
[3] Y. Li and L. E. Parker, "Detecting and monitoring time-
related abnormal events using a Wireless Sensor
Networks and mobile robot," in Intelligent Robots and
Systems, 2019. IROS 2019. IEEEfRSJ International
Conference on. IEEE, 2019.
[4] P. Radivojac, U. Korad, K. M. Sivalingam, and Z.
Obradovic, "Learning from class-imbalanced data in
Wireless Sensor Networks," in Vehicular Technology
Conference, 2020. VTC 2020-Fall. 2020 IEEE 58th, vol.
5,IEEE, 2020.
[5] P. V. K. Borges, J. Mayer, and E. Izquierdo, โ€œEffificient
visual fifire detection applied for video retrieval,โ€ in
Proc. 16th Eur. Signal Process. Conf., Aug. 2008.
[6] B. U. Toreyin and A. E. Cetin, โ€œOnline detection of fifire
in video,โ€ in Proc. IEEE Conf. Comput. Vision Pattern
Recognit., Jun. 2007, pp. 1โ€“5.

More Related Content

Similar to Computer Vision-Based Early Fire Detection Using Machine Learning

Similar to Computer Vision-Based Early Fire Detection Using Machine Learning (20)

Sensor Fault Detection in IoT System Using Machine Learning
Sensor Fault Detection in IoT System Using Machine LearningSensor Fault Detection in IoT System Using Machine Learning
Sensor Fault Detection in IoT System Using Machine Learning
ย 
IRJET- Matlab based Multi Feature Extraction in Image and Video Analysis ...
IRJET-  	  Matlab based Multi Feature Extraction in Image and Video Analysis ...IRJET-  	  Matlab based Multi Feature Extraction in Image and Video Analysis ...
IRJET- Matlab based Multi Feature Extraction in Image and Video Analysis ...
ย 
IRJET- A Non Uniformity Process using High Picture Range Quality
IRJET-  	  A Non Uniformity Process using High Picture Range QualityIRJET-  	  A Non Uniformity Process using High Picture Range Quality
IRJET- A Non Uniformity Process using High Picture Range Quality
ย 
LOW ILLUMINATION VIDEO-IMAGE ENHANCEMENT
LOW ILLUMINATION VIDEO-IMAGE ENHANCEMENTLOW ILLUMINATION VIDEO-IMAGE ENHANCEMENT
LOW ILLUMINATION VIDEO-IMAGE ENHANCEMENT
ย 
IRJET- Fire Detector using Deep Neural Network
IRJET-  	  Fire Detector using Deep Neural NetworkIRJET-  	  Fire Detector using Deep Neural Network
IRJET- Fire Detector using Deep Neural Network
ย 
IRJET - Object Detection and Translation for Blind People using Deep Learning
IRJET - Object Detection and Translation for Blind People using Deep LearningIRJET - Object Detection and Translation for Blind People using Deep Learning
IRJET - Object Detection and Translation for Blind People using Deep Learning
ย 
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert Management
ย 
Ai4103203205
Ai4103203205Ai4103203205
Ai4103203205
ย 
IRJET- A Review on Fake Biometry Detection
IRJET- A Review on Fake Biometry DetectionIRJET- A Review on Fake Biometry Detection
IRJET- A Review on Fake Biometry Detection
ย 
IRJET- Confidential Data Access through Deep Learning Iris Biometrics
IRJET- Confidential Data Access through Deep Learning Iris BiometricsIRJET- Confidential Data Access through Deep Learning Iris Biometrics
IRJET- Confidential Data Access through Deep Learning Iris Biometrics
ย 
FIRE DETECTION AND EXTINGUISHER SYSTEM USING IMAGE PROCESSING
FIRE DETECTION AND EXTINGUISHER SYSTEM USING IMAGE PROCESSINGFIRE DETECTION AND EXTINGUISHER SYSTEM USING IMAGE PROCESSING
FIRE DETECTION AND EXTINGUISHER SYSTEM USING IMAGE PROCESSING
ย 
IRJET- Design and Development of IoT based Geiger Muller Counter
IRJET- Design and Development of IoT based Geiger Muller CounterIRJET- Design and Development of IoT based Geiger Muller Counter
IRJET- Design and Development of IoT based Geiger Muller Counter
ย 
IRJET- Advanced Control Strategies for Mold Level Process
IRJET- Advanced Control Strategies for Mold Level ProcessIRJET- Advanced Control Strategies for Mold Level Process
IRJET- Advanced Control Strategies for Mold Level Process
ย 
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
ย 
Design And Development of Fire Fighting Robot
Design And Development of Fire Fighting RobotDesign And Development of Fire Fighting Robot
Design And Development of Fire Fighting Robot
ย 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
ย 
Irjet v7 i3475
Irjet v7 i3475Irjet v7 i3475
Irjet v7 i3475
ย 
Real Time & Automated Meter Reading using Image Processing Reducing Human Error
Real Time & Automated Meter Reading using Image Processing Reducing Human ErrorReal Time & Automated Meter Reading using Image Processing Reducing Human Error
Real Time & Automated Meter Reading using Image Processing Reducing Human Error
ย 
Ladies Compartment Intruder Alert
Ladies Compartment Intruder AlertLadies Compartment Intruder Alert
Ladies Compartment Intruder Alert
ย 
AUTOMATED WASTE MANAGEMENT SYSTEM
AUTOMATED WASTE MANAGEMENT SYSTEMAUTOMATED WASTE MANAGEMENT SYSTEM
AUTOMATED WASTE MANAGEMENT SYSTEM
ย 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
ย 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
ย 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
ย 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
ย 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
ย 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
ย 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
ย 
A Review of โ€œSeismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of โ€œSeismic Response of RC Structures Having Plan and Vertical Irreg...A Review of โ€œSeismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of โ€œSeismic Response of RC Structures Having Plan and Vertical Irreg...
ย 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
ย 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
ย 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
ย 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
ย 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
ย 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
ย 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
ย 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
ย 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
ย 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
ย 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
ย 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
ย 

Recently uploaded

Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
SUHANI PANDEY
ย 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
ย 
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
ย 

Recently uploaded (20)

Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
ย 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
ย 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
ย 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ย 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
ย 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
ย 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
ย 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
ย 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
ย 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
ย 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ย 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
ย 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
ย 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
ย 
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
ย 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
ย 

Computer Vision-Based Early Fire Detection Using Machine Learning

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 ยฉ 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2753 Computer Vision-Based Early Fire Detection Using Machine Learning Asan Nainar M1, Ishwariya P2, Lakshmi Prabha R3, Mythireyeni P V4, Neelaveni M5 1Assistant Professor, Department of IT, SRM Valliammai Engineering College, Tamilnadu, India 2,3,4,5 UG Students, Department of IT, SRM Valliammai Engineering College, Tamilnadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The project aimed to detect fire by using the image processing technology will alert people by early detection of fire. The automatic fire alarm systems already existed the sensor method has limitations and designed to sense fire with the smoke, limited areas. To reduce limitations and to optimize with present technology, Computer Vision Based Early Fire Detection using machine learning is proposed. The implementation is done by using PyCharm IDE and primary or secondary camera is used. Webcamistakenas an input source, which captures the video feed from the surrounding and feeds into the system for analysis. Thecodeis written in python language using the open CV2 library for image processing. The theoretical parts emphasize more in computer vision, machine learning, image processing, color model, and the working algorithm of the project to detect the fire. The project uses algorithms such as Morphological Transformation, Simple Thresholding and Image Processing which is used in the object detection through the image or video. Morphological transformation is used for the accuracy of detecting the fire. Simple Thresholding is used in the detection of intensity of the fire .The libraries and operatorsin OpenCV such as Matplot library is used to convert the color forms , comparison operators and bitwise operators are used to mask the layers of the fire. Key Words: Fire Detection, Image Processing, Color Model, Alarm, Notification Mail 1. INTRODUCTION Computer Vision basedfiredetectionusingimageprocessing has the potential to be useful in conditions in which conventional methods cannot be adopted. The firedetection algorithm uses visual characteristics of fires like brightness, color, spectral texture, spectral flicker,andedgetremblingto discriminate them from other visible stimuli. There are various fire detection techniques such as infrared sensor, a thermal detector,smokedetector,flamedetector,andoptical smoke detector. These methods are not always reliable as they do not always detect the fire itself but detect one or more phenomena resulting from fire, such as smoke, heat, infrared, ultraviolet light radiation or gas, which could be produced in other ways and hence, produces many false alarms. By the help of computer vision andimageprocessing techniques, it is possible to get better results than conventional systems because images can provide more reliable information. 2. LITERATURE SURVEY This proposed system has gone through various references and research over different journals and conference papers that are evolved for the past 10 years. The research and referrals of survey is conducted on different domainslike AI, NLP, Home environments that helped to develop the proposed system of AI based Control AAS. Those references and the detailed report on the references are listed as follows. 1. KB Deve, GP Hancke and BJ Silva , (2016), โ€œDesign of a Smart Fire Detection System.โ€ The problem that was addressed by this work was to detect fires and reduce the occurrence of false positives in a kitchen environment. 2. Khan Muhammad, Jamil Ahmad, Zhihan ,Paolo Bellavist, Transactions on Systems, Man, and Cybernetics: โ€œSystems Efficient Deep CNN-Based Fire Detection and Localization in Video Surveillance Applications.โ€ Their application in fire detection systems will substantially improve detection accuracy, which will eventuallyminimize fire disasters and reduce the ecological and social ramifications. 3. Avi Bar-Massada , Todd J. Hawbaker, Susan I. Stewart, and Volker C. Radeloff โ€œCombining Satellite-Based Fire ObservationsandGround-BasedLightningDetectionsto Identify Lightning Fires Across the Conterminous USA.โ€ The algorithm searches for spatiotemporal conjunctions of MODIS fire clusters and NLDN detected lightning strikes, given a spatiotemporal lag between lightning strike and fire ignition. The algorithm revealed distinctive spatial patterns of lightning fires in the conterminous US While a sensitivity analysis revealed that the algorithm is highlysensitivetothe two thresholds that are used to determine conjunction. 4. Tian Qiu, Yong Yan, Gang Lu โ€œAn Auto adaptive Edge- Detection Algorithm for Flame and Fire Image Processingโ€. The algorithm detects the coarse and superfluous edges in a flame/fire image first and then identifies the edges of the flame/fire and removes the irrelevant artifacts. The auto adaptive feature of the algorithm ensures that the primary symbolic flame/fire edges are identified for different scenarios. Experimental results for different flame images and video frames proved the effectivenessandrobustnessof the algorithm.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 ยฉ 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2754 3. PROPOSED WORK The proposed system is based on the Image Processing, Morphological Transformation, Simple Thresholding and OpenCV which is very popular in object detection through the image or any other video feeds. The process is divided into 3 differentphaseswhichemploys various algorithms and methods for implementation. 3.1 FIRE DETECTION MODULE The procedure for detecting fire classifies images based on the value of simple features from an image. To detectthefire the image have to be converted to RGB. As the OpenCV as the ability to convert the image to BGR, Matplot library is used to convert the image to RGB. The flow of detection is shown in fig-2.1.The captured video is converted into 2D images using imshow module. The captured pixels are arranged in rows and columns. Then in order to convert the image to BGR the pixels are arranged in the x,y,z matrix. Then the matrix pixels are comparedwith eachotherandthe layers are masked using bitwise_ AND. Using Morphological transformation the imperfections are corrected by the process of Dilation and Erosion. The Absolute difference of the color models are found. The Simple thresholding is applied to find the intensity. Fig-2.1: Flow of detection process 3.2 ALARM MODULE A siren is a noisy noise-makingdevice.Civil protectionsirens Are established in constant places and used to warn of natural failures or attacks. If the hearth place is detected the alarm is performed and notifies the monitor.Puttingaheada while loop which takes the argument of the time, the consumer wants to set the alarm on and routinely breaks while the time is up, with sound refer fig-2.2. Fig-2.2: Alarm 3.3 NOTIFICATION MAIL When you click on send, the message is transmitted from your laptop to the server related to the recipient's address. This procedure generally takes place thru numerous other Servers earlier than the message receives to its supposed recipient's mailbox. The flow of notification mail is shown in fig-2.3. Electronic mailboxes are imperative to how emails paintings for the end-user.Thewell-knownprotocol used for sending Internet e mail is referred to as SMTP (Simple Mail Transfer Protocol). The SMTP protocol is used to each send and acquire e-mail messages over the Internet. When a message is sent, the e-mail patron sends the message to the SMTP server. Fig-2.3: Shows the flow of E-Mail 4. SYSTEM ARCHITECTURE The first step is the surrounding cameras will capture the video in real time refer fig-3 for the flow of system architecture. Then in the next step the video is converted into frames and the frames are sent for conversion, eachand every frames are converted into BGR using CV2. To convert into RGB Matplot library is used. Imshow moduleofMatplot library is used to convert the raw dataโ€™s into 2D images. The Image Processing algorithms are used. And next step is comparison of the frames using CV comparison. Then the mask is layered using Bitwise_AND. The image is compared using the operators of CV2, i.e. source 1 is greater than source 2. The Morphological Transformation is used to remove the imperfections from the images. It is carried out by Erosion and Dilation. It adds or removes the pixels from object to boundaries. The removal and addition of pixels depends on the size of the Structuring Elements. The BGR is converted to YCR_CB, the Luma component and Blue-Red
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 ยฉ 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2755 difference of the chroma components. The frame is splitted as Y,Cr,Cb . After splitting the frames the mean of those elements is found. The Absolute difference between the pixels of two images are calculated. Simple Thresholding technique is also a Binary Thresholding. If the pixel intensity is greater than the set threshold, value set to 255, else set to zero (black). In the final step if the value of dt is greater than 0.3 then the fire is detected and if it is less than 0.2, then the fire is not detected. After the detection the mail is sent with an image with fire. Fig-3: System Architecture 5. METHODOLOGY 5.1 DETECTION The procedure for detecting fire classifies pics primarily based totally at the value of easy features from an picture. The frames are then converted into BGR using CV2 and with using Matplot library the image is converted into RGB. The detected fire images are stored in a folder and the fire images are sent via mail. Along with small steps, the box detects the features like edges, brightness level from the image of fire, and then data collected by pixels are put together, which helps to determine where the fire is located. 5.2 MATPLOT OpenCV has the ability to change the image into BGR but to process the frames the image has to be converted into RGB. In order to work on the color models the Matplaot library is used. First of all the frames are converted to BGR.The BGR is then converted to YCR_CB, the luma componentandtheCb,Cr are the blue-red difference of thechroma components.Inthe final stage the YCR_CB is converted to RGB. Comparing the source1 and source 2 of the images. If the source1 is greater than source2 then the operations are proceeded. 5.3 MASKING THE LAYERS Masking means limiting a certain layer or adjustment is visible areas. A mask allows an image to adjust a certain portion of your image while leaving the rest completely aside. It is masking a brighter subject while leaving the background unedited. The bitwise_AND operator computes bitwise conjunction of the two arrays. 5.4 MORPHOLOGICAL TRANSFORMATION Morphological transformation is used to remove all the imperfections from the binary image. It helps to achieve the smoothness in the image. The two operations are Opening operation and Closing operations. Morphological transformation is shown in fig-4.1. The operations are carried away in two steps i.e. Erode and Dilation refer fig 4.2 Fig-4.1: Morphological Transformation ๏‚ท ERODE: The Erode operation removes the pixels from the edge of the objects. ๏‚ท DILATE: The Dilate operation adds extra pixels to the edges. Fig-4.2: Erode and Dilate 5.5 THRESHOLDING The basic thresholding is the technique is known as Binary thresholding. For every pixel, the same threshold value is applied. If the pixel value is smaller than the threshold it is set to zero, otherwise it is to the maximum value i.e. 255.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 ยฉ 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2756 6. RESULTS Fire is detected and the output is displayed in the application. The result is shown in fig-5 Fig-5: Fire is detected 7. CONCLUSIONS AND FUTURE ENHANCEMENT The project aimed to detect fire with a different approach rather than using an existing system. As technology is getting better and better as to keep it up with thetechnology and to minimize the limitations also, the new system has created. By using image processing technologyfordetecting the fire, these limitations can be reduced because in this system camera acts like a human eye, as it detects a fire, the video is captured, and the image is processed using the software alert user. It can be used everywhere e.g. Hospital, railway station, forest etc. The designed prototype successfully detects fire gives the review analysis, designing system, and algorithm, test, and result. Currently, we not used the systems like a smoke detector and sprinkler water discharge systems, but in future it can be included. Quantitative evaluation to evaluate the overall performance of various strategies. We in comparison our technique with famous fire detection algorithms, which might be primarily based totally on YOLO networks and DL approaches. We used the consequences of their papers for comparison, however we aren't positive whether or not they're real due to the fact supply codes and datasets of those techniques aren't publicly to be had to test the actual overall performance. We computed metrics which includes F- measure (FM), precision, and consider, as in our in advance study. The FM rating is the weighted common that balances measurements among the manner of precision andconsider rates. Hence, this rating considers each false positives and false negatives. Intuitively, it isn't always smooth to apprehend accuracy, however FM is greater not unusual place than accuracy. Accuracy worksqualityiffalsepositives and false negatives have comparable charges. If the charges of false positives and false negatives are different, it's far higher to don't forget each precision and recall Precision is the ratio of correctly predicted positive observationstototal predicted positive observations. Recall is the ratio o correctly predicted positive observations toall observations withinside the real class. The proposed techniqueโ€™s common of FM, consider, and precision became 98.9%. False detection took place in 1.1% of cases, attributable to the blurring of gadgets at night. 8. REFERENCES [1] N. Dziengel, G. Wittenburg, and J. Schiller, "Towards distributed event detection in Wireless Sensor Networks," in Adjunct Proc. of 4th IEEEfACM IntI. Conf. on Distributed Computing in Sensor Systems (DCOSSa:AZ'08), Santorini Island, Greece, 2020. [2] S. Jarupadung, "Distributed event detection and semantic event processing," in The 6th ACM International Conference on Distributed Event- Based Systems (DEBS 2020)(Doctoral Symposium), 2020. [3] Y. Li and L. E. Parker, "Detecting and monitoring time- related abnormal events using a Wireless Sensor Networks and mobile robot," in Intelligent Robots and Systems, 2019. IROS 2019. IEEEfRSJ International Conference on. IEEE, 2019. [4] P. Radivojac, U. Korad, K. M. Sivalingam, and Z. Obradovic, "Learning from class-imbalanced data in Wireless Sensor Networks," in Vehicular Technology Conference, 2020. VTC 2020-Fall. 2020 IEEE 58th, vol. 5,IEEE, 2020. [5] P. V. K. Borges, J. Mayer, and E. Izquierdo, โ€œEffificient visual fifire detection applied for video retrieval,โ€ in Proc. 16th Eur. Signal Process. Conf., Aug. 2008. [6] B. U. Toreyin and A. E. Cetin, โ€œOnline detection of fifire in video,โ€ in Proc. IEEE Conf. Comput. Vision Pattern Recognit., Jun. 2007, pp. 1โ€“5.