SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 929
Improving AI surveillance using Edge Computing
Neha Saxena1, Mr. Harsh Chauhan2, Mr. Dhruv Khara3, Mr. Rutvik Joshi4
1 A.P., Dept. of Computer Engineering Universal College of Engineering, Mumbai university
2,3,4 Dept. of Computer Engineering Universal College of Engineering, Mumbai university
----------------------------------------------------------------------------***--------------------------------------------------------------------------
Abstract - Surveillance is a key part of security, assisting
in the needs of the things to be protected. Oftentimes it
happens that the human eye ignores essential key
components while monitoring security throughout the
campus which can result in an uncalled incident. Teachers
often in classrooms are focused on teaching and assuring
that students understand the concepts but eventually miss
out on the overall gestures students indicate during the
class. Using four powerful deep learning models namely
person action detection, face recognition, landmarks-
recognition and face re-identification recognition for smart
classroom features combined with Mask-RCNN model for
instance segmentation on object detection, particularly
weapons, leverages the power of Artificial Intelligence to be
deployed on the edge reducing the greater amount of
resources required in case of cloud inferences. The real-Time
monitoring system will help the users, particularly security
personnel in understanding the on-ground situation of the
campus. The system also warns on screen with a red border
about the situation turning violent.
Keywords: Edge Computing, Mask-RCNN,
Surveillance, Smart Classroom, Intel OpenVino toolkit.
1. INTRODUCTION
Surveillance is an integral part of security and patrol. For
the most part, the job entails extended periods of looking
out for something undesirable to happen. Most of the
criminal activities today take place using handheld arms,
particularly guns, pistols and revolvers. The crime and
social offense can be reduced by monitoring and
identifying such activities of antisocial behavior which will
allow law enforcement agencies to take appropriate action
in the early stage. It is crucial that we do this, but also it is
a very mundane task. Would not life be much simpler if
there was something that could do the “watching and
waiting” for us? With the advancements in technology over
the past few years, Artificial Intelligence can help us
automate the task of surveillance to a maximum level
requiring only minimal effort of attention from the manual
task force on the ground.
Deep learning is highly successful in machine learning
across a variety of applications, including computer vision,
natural language processing, and big data analysis.
However, deep learning’s high accuracy comes at the
expense of high computational and memory requirements
for both training and inference purposes. Training a deep
learning model is space and computationally expensive
due to the vast number of parameters that need to be
iteratively refined over multiple time periods. High
accuracy and high resource consumption are
characteristics of deep learning models.
To complete the computational requirements of deep
learning algorithms and models, a possible approach is to
leverage cloud computing. To use cloud resources, data
must be transferred from the data source location on the
network edge to a central repository of servers which
further increases the problems of latency, scalability and
privacy hence edge computing is used as a viable solution.
Edge computing aims to solve the problems of latency,
scalability and privacy by providing close computing
proximity to end-to-end devices thus enabling real-time
services and avoiding the dependency on centralized
servers. Hence to avoid the computational heavy
challenges of deep learning on the cloud or personal
system, deep learning with edge computing is preferred
over them.
2. EXISTING SYSTEM
2.1 Existing system
The existing approaches so far used are :
• Intelligent video surveillance
• Abnormal event detection
• Smart Classroom - An Intelligent Environment for Tele-
education.
During our analysis of research papers, we found out that
edge computing was not used for surveillance purposes.
The existing system that we see requires a manual task
force to actually monitor the input feed that is provided
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 930
through cameras. This feed is stored on cloud servers or
physical servers causing storage issues every some
interval of time.
The response to any alerting situation is considerably slow
considering full automation which is a risk to the safety at
the campus or the industry area where the system is
installed. No system has yet used multiple and
simultaneous deep learning models for surveillance
purposes.
2.2 Project Scope
Using our proposed system, campuses can ensure they
save more on resources and implement stricter methods of
surveillance additionally allowing teachers to understand
their students better and get an overview of how attentive
students are during their learning.
The real-Time monitoring system will help the users,
particularly security personnel in understanding the on-
ground situation of the campus. The system also warns on
screen with a red border about the situation turning
violent.
3. PROPOSED SYSTEM
This chapter includes a brief description of the proposed
system and explores the different modules involved along
with the various models through which this system is
understood and represented.
3.1 Analysis/Framework/Algorithm
● Face Detection Model[6] takes name as "input"
with input image shape as [1x3x384x672] - An
input image in the format [BxCxHxW], where: B -
batch size, C - number of channels, H - image
height, W - image width, Expected color order is
BGR. The net outputs a blob with the shape: [1, 1,
N, 7], where N is the number of detected bounding
boxes will be the output of the image.
● Landmarks Regression Model[6] takes input with
name as "data" and input image shape as
[1x3x48x48] - An input image in the format
[BxCxHxW], where :B - batch size, C - number of
channels, H - image height, W - image width, The
expected color order is BGR. The net outputs a
blob with the shape: [1, 10], containing a row-
vector of 10 floating-point values for five
landmarks coordinates in the form (x0, y0, x1, y1,
..., x5, y5). All the coordinates are normalized to be
in the range [0,1].
● Person Detection Model[6] takes input name: data
with input shape as [1x3x544x992] - An input
image in following format [1xCxHxW]. The
expected channel order is BGR. 2) name: im_info,
shape: [1x6] - An image information [544, 992,
992/frame_width, 544/frame_height,
992/frame_width, 544/frame_height]. The net
outputs a "detection_ouput" blob with the shape:
[1x1xNx7], where N is the number of detected
pedestrians.
● Face Re-Identification Model[6] takes input name
as "data '' , input shape as [1x3x128x128] - An
input image in the format [BxCxHxW]. The net
outputs a blob with the shape [1, 256, 1, 1],
containing a row vector of 256 floating-point
values. Outputs on different images are
comparable in cosine distance.
● Mask RCNN - Using the instance segmentation
dataset from Open Images Dataset V6 for weapon
category objects, mask RCNN is trained for
predicting and improving AI surveillance.
Fig -1: The architecture of Mask RCNN
The CNN structure used here is Feature Pyramid Network.
The Feature Pyramid Network (FPN) is a feature extractor
designed for such a pyramid concept with accuracy and
speed in mind. The FPN network is capable of detecting
very small objects. For proposed experimentation ResNet
101 with an FPN backbone is used. The backbone strides
are taken as 4,8,16,32 and 64.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 931
Fig -2: The Feature Pyramid Network with Resnet (ref-
JonathanHui)
The FPN works as a feature detector and we extract
multiple feature map layers and feed them to a Region
Proposal Network or RPN for detecting objects. RPN
applies 3 × 3 convolutions over the feature maps followed
by separate 1 × 1 convolution for class predictions and
boundary box regression. These 3 × 3 and 1 × 1
convolutional layers are called the RPN head. The same
head is applied to all feature maps.
Fig -3: Anchor and sliding window in a vector form(ref-
JonathanHui)
RPN having a classifier and a regressor. Here it is
introduced the concept of anchors. Anchor is the central
point of the sliding window. The length of the square
anchor in pixels is taken as 32,64,128,256,512. The anchor
ratios are taken as 0.5, 1 and 2 respectively. The ratio is
defined by the width/height at each cell. For reduction in
memory load, mini masks are used for high-resolution
images. Mini masks reduce the masks to a smaller size to
reduce the memory load.The height and width of the mini
mask is taken as (56,56). Input images are resized to
square form with a minimum image dimension of 800 and
a maximum image dimension of 1024.
The Mask RCNN paper[2] uses 512 ROIs per image but
often the RPN does not generate positive proposals to fill
this and we keep a positive-negative ratio of 1:3. For ROI
pooling the pool size is set as 7 and the maximum pool size
as 14. The IOU thresholds are set at probabilities of 0.3 for
minimum at 0.7 for maximum. For optimization of the loss
function, we set the learning rate at 0.001 and the learning
momentum of 0.9 with a weight decay regularization of
0.0001. For solving the exploding gradient problem we
have defined a gradient clipping with the norm of 5.0.
Every model is later passed onto a Model optimizer which
generates a .xml file and a .bin file which are the model
graph and weights file respectively. This is also known as
Intermediate representation or IR. Furthermore, it is
passed on to Inference Engine which is a set of C++
libraries with C and Python bindings providing a common
API to deliver inference solutions on the platform of
choice.
Fig -4: Intel OpenVino Toolkit internal working -
source(docs.openvino.ai)
3.2 System Architecture
Fig -5: Proposed System Architecture
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 932
For the AI Surveillance system, an input feed from video
cameras is processed through the established model
pipeline as required for edge computing. The input feed is
processed frame by frame and passes through the models
for individual detection and action recognition for the
frame. The models are passed through a model optimizer
for generating the .xml and .bin files which are the model
graph and weight files. Furthermore, the files are
processed through the edge computing inference engine of
Intel OpenVino for input inferences and forwarded to the
user application module where the processed feed is
displayed using OpenCV and for weapons being detected
the border of the screen alerts in red.
Module Details
Model Processing - Once the input feed is processed
through the model processing pipeline, the frames are
resized according to the model requirements and are
detected based on the model developed. Starting with the
Face Detection model detects for the faces in the frames
and is forwarded to the Landmarks regression model for
landmark detection on faces. A student in the frame is then
identified based on the available gallery of student faces
using the Face ReIdentification model and then forwarded
for entire frame analysis for weapon detection using mask
RCNN. The model graphs and weights are processed using
model optimizer and .xml and .bin files are generated
which are forwarded to the edge computing inference
engine.
User Application - The data processed through the Model
Processing block is forwarded to display through the
Python GUI using intermediary OpenCV processing steps.
Depending on the identification of objects based on the
MaskRCNN model the GUI will act accordingly. For
Weapons detected, the display will show a red border
indicating a warning and alert. For the Smart classroom,
functionality outputs will be generated in a separate file.
4. EXPERIMENTAL RESULTS
Following the proposed algorithm pipeline and the system
architecture, the assimilated results follow a significant
improvisation depending on the system dependencies
involved.
4.1 Smart Classroom Monitoring
Results obtained from the Intel OpenVino Edge computing
toolkit while using it on an Intel i7 9th generation 9700K
showcase the capabilities of handling 25 maximum frames
per second with face identification, landmark detection,
face reidentification, and action recognition models
working simultaneously which over a cloud computing
with 720P cameras has a processing speed of 10FPS[3]
which is significantly low by 50%.
Fig -6: Smart classroom action recognition and face
detection implementation
The data propagation round-trip time to edge servers and
AWS a cloud computing service is 8 times higher than edge
computing.[3]
Fig -7: Wang, J., Pan, J., & Esposito, F. (2017). Elastic urban
video surveillance system using edge computing. Data
propagation round-trip time to edge servers and AWS.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 933
4.2 Weapon detection using MaskRCNN
Fig -8: Weapon detection system initial implementation
Initial implementation of Mask RCNN is selected with the
RPN anchor stride as 1. The concept of Non-Max
Suppression is used to filter the RPN proposals. The RPN
non-max suppression threshold is set at 0.7. For each
image, we are training 256 anchors. After Non-max
suppression, top 2000 ROIs for training and 1000 ROIs for
generating inferences. Mask RCNN trained on pretrained
COCO dataset using transfer learning algorithms brings a
validation loss of 0.2294 which is selected for this
proposed system.
4.3 Future Scope and Implementation
a) Detecting categories of weapons and identifying
fake from real ones.
b) Detecting handheld guns using Pose and Human
Key point Estimation algorithms.
c) Ensemble techniques for detection combining
Instance segmentation with Human Keypoint estimation.
d) Creating a model API and pushing it to real-time
deployment to a CCTV using a Raspberry PI.
5. CONCLUSION
In this proposed work we propounded and implemented a
novel handheld gun classification and detection approach
for surveillance additionally implementing a smart
classroom monitoring system specifically for college
surveillance purposes using edge computing. The system
includes application of multiple models along with Mask
RCNN giving us the optimal results. The system can
identify the existence of numerous guns in real time and is
robust across the variation in various factors of scale and
rotation. Although, we assume that by implementing this
method, the performance of the system will be refined and
its real time processing essentials like complexity of space
and time for processing can be diminished.
ACKNOWLEDGEMENT
We take this opportunity to express our deep sense of
gratitude to Mrs. Neha Saxena for her continuous guidance
and encouragement throughout the duration. It is because
of her experience and wonderful knowledge, we can fulfill
the requirement of completing within the stipulated time.
We would also like to thank Dr. Jitendra Saturwar, Head of
the computer engineering department and Mrs. Vishakha
Shelke.
REFERENCES
[1] Zhang, Jolfaei, & Alazab, "A Face Emotion Recognition
Method Using Convolutional Neural Network and
Image Edge Computing", In-Edge Computing,(2019),
IEEE
[2] Kaiming He, Georgia Gkioxari, Piotr Dollar, Ross
Girshick ,"MASK R-CNN",In-Edge Computing,(2018),
ICCV
[3] Jianyu Wang, Flavio Esposito, Jianli Pan,"Elastic urban
video surveillance system using edge computing",In-
Edge Computing,(2017), ACM
[4] Shivprasad Tavagad, Shivani Bhosale, Ajit Prakash
Singh, Deepak Kumar , "Paper on Smart Surveillance
System",In-Edge Computing,(2016), International
Research Journal of Engineering and Technology
[5] Weikai Xie, Yuanchun Shi, Guanyou Xu, Dong
Xie,"Smart Classroom - An Intelligent Environment for
Tele-education",In-Edge Computing,(2001), Springer
[6] Intel’s Pre-Trained Models or Public Pre-Trained
Models OpenVINO™ Toolkit - Open Model Zoo
repository, [Online]
https://github.com/openvinotoolkit/open_model_zoo

More Related Content

Similar to Improving AI surveillance using Edge Computing

IRJET - An Robust and Dynamic Fire Detection Method using Convolutional N...
IRJET -  	  An Robust and Dynamic Fire Detection Method using Convolutional N...IRJET -  	  An Robust and Dynamic Fire Detection Method using Convolutional N...
IRJET - An Robust and Dynamic Fire Detection Method using Convolutional N...IRJET Journal
 
IRJET- Fire Detector using Deep Neural Network
IRJET-  	  Fire Detector using Deep Neural NetworkIRJET-  	  Fire Detector using Deep Neural Network
IRJET- Fire Detector using Deep Neural NetworkIRJET Journal
 
IRJET - Hand Gesture Recognition to Perform System Operations
IRJET -  	  Hand Gesture Recognition to Perform System OperationsIRJET -  	  Hand Gesture Recognition to Perform System Operations
IRJET - Hand Gesture Recognition to Perform System OperationsIRJET Journal
 
Safety Helmet Detection in Engineering and Management
Safety Helmet Detection in Engineering and ManagementSafety Helmet Detection in Engineering and Management
Safety Helmet Detection in Engineering and ManagementIRJET Journal
 
Convolutional Neural Network Based Real Time Object Detection Using YOLO V4
Convolutional Neural Network Based Real Time Object Detection Using YOLO V4Convolutional Neural Network Based Real Time Object Detection Using YOLO V4
Convolutional Neural Network Based Real Time Object Detection Using YOLO V4IRJET Journal
 
Automated Image Captioning – Model Based on CNN – GRU Architecture
Automated Image Captioning – Model Based on CNN – GRU ArchitectureAutomated Image Captioning – Model Based on CNN – GRU Architecture
Automated Image Captioning – Model Based on CNN – GRU ArchitectureIRJET Journal
 
IRJET- 3D Object Recognition of Car Image Detection
IRJET-  	  3D Object Recognition of Car Image DetectionIRJET-  	  3D Object Recognition of Car Image Detection
IRJET- 3D Object Recognition of Car Image DetectionIRJET Journal
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
 
Object and Currency Detection for the Visually Impaired
Object and Currency Detection for the Visually ImpairedObject and Currency Detection for the Visually Impaired
Object and Currency Detection for the Visually ImpairedIRJET Journal
 
IRJET- Smart Traffic Control System using Yolo
IRJET- Smart Traffic Control System using YoloIRJET- Smart Traffic Control System using Yolo
IRJET- Smart Traffic Control System using YoloIRJET Journal
 
IRJET- A Vision based Hand Gesture Recognition System using Convolutional...
IRJET-  	  A Vision based Hand Gesture Recognition System using Convolutional...IRJET-  	  A Vision based Hand Gesture Recognition System using Convolutional...
IRJET- A Vision based Hand Gesture Recognition System using Convolutional...IRJET Journal
 
IRJET- Alternate Vision Assistance: For the Blind
IRJET- Alternate Vision Assistance: For the BlindIRJET- Alternate Vision Assistance: For the Blind
IRJET- Alternate Vision Assistance: For the BlindIRJET Journal
 
From Pixels to Understanding: Deep Learning's Impact on Image Classification ...
From Pixels to Understanding: Deep Learning's Impact on Image Classification ...From Pixels to Understanding: Deep Learning's Impact on Image Classification ...
From Pixels to Understanding: Deep Learning's Impact on Image Classification ...IRJET Journal
 
ROAD POTHOLE DETECTION USING YOLOV4 DARKNET
ROAD POTHOLE DETECTION USING YOLOV4 DARKNETROAD POTHOLE DETECTION USING YOLOV4 DARKNET
ROAD POTHOLE DETECTION USING YOLOV4 DARKNETIRJET Journal
 
IRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
IRJET- Implementation of Gender Detection with Notice Board using Raspberry PiIRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
IRJET- Implementation of Gender Detection with Notice Board using Raspberry PiIRJET Journal
 
ANALYSIS OF LUNG NODULE DETECTION AND STAGE CLASSIFICATION USING FASTER RCNN ...
ANALYSIS OF LUNG NODULE DETECTION AND STAGE CLASSIFICATION USING FASTER RCNN ...ANALYSIS OF LUNG NODULE DETECTION AND STAGE CLASSIFICATION USING FASTER RCNN ...
ANALYSIS OF LUNG NODULE DETECTION AND STAGE CLASSIFICATION USING FASTER RCNN ...IRJET Journal
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET Journal
 
A Survey on Image Processing using CNN in Deep Learning
A Survey on Image Processing using CNN in Deep LearningA Survey on Image Processing using CNN in Deep Learning
A Survey on Image Processing using CNN in Deep LearningIRJET Journal
 
Compact optimized deep learning model for edge: a review
Compact optimized deep learning model for edge: a reviewCompact optimized deep learning model for edge: a review
Compact optimized deep learning model for edge: a reviewIJECEIAES
 

Similar to Improving AI surveillance using Edge Computing (20)

IRJET - An Robust and Dynamic Fire Detection Method using Convolutional N...
IRJET -  	  An Robust and Dynamic Fire Detection Method using Convolutional N...IRJET -  	  An Robust and Dynamic Fire Detection Method using Convolutional N...
IRJET - An Robust and Dynamic Fire Detection Method using Convolutional N...
 
IRJET- Fire Detector using Deep Neural Network
IRJET-  	  Fire Detector using Deep Neural NetworkIRJET-  	  Fire Detector using Deep Neural Network
IRJET- Fire Detector using Deep Neural Network
 
IRJET - Hand Gesture Recognition to Perform System Operations
IRJET -  	  Hand Gesture Recognition to Perform System OperationsIRJET -  	  Hand Gesture Recognition to Perform System Operations
IRJET - Hand Gesture Recognition to Perform System Operations
 
Safety Helmet Detection in Engineering and Management
Safety Helmet Detection in Engineering and ManagementSafety Helmet Detection in Engineering and Management
Safety Helmet Detection in Engineering and Management
 
Convolutional Neural Network Based Real Time Object Detection Using YOLO V4
Convolutional Neural Network Based Real Time Object Detection Using YOLO V4Convolutional Neural Network Based Real Time Object Detection Using YOLO V4
Convolutional Neural Network Based Real Time Object Detection Using YOLO V4
 
Automated Image Captioning – Model Based on CNN – GRU Architecture
Automated Image Captioning – Model Based on CNN – GRU ArchitectureAutomated Image Captioning – Model Based on CNN – GRU Architecture
Automated Image Captioning – Model Based on CNN – GRU Architecture
 
IRJET- 3D Object Recognition of Car Image Detection
IRJET-  	  3D Object Recognition of Car Image DetectionIRJET-  	  3D Object Recognition of Car Image Detection
IRJET- 3D Object Recognition of Car Image Detection
 
Smart surveillance using deep learning
Smart surveillance using deep learningSmart surveillance using deep learning
Smart surveillance using deep learning
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
 
Object and Currency Detection for the Visually Impaired
Object and Currency Detection for the Visually ImpairedObject and Currency Detection for the Visually Impaired
Object and Currency Detection for the Visually Impaired
 
IRJET- Smart Traffic Control System using Yolo
IRJET- Smart Traffic Control System using YoloIRJET- Smart Traffic Control System using Yolo
IRJET- Smart Traffic Control System using Yolo
 
IRJET- A Vision based Hand Gesture Recognition System using Convolutional...
IRJET-  	  A Vision based Hand Gesture Recognition System using Convolutional...IRJET-  	  A Vision based Hand Gesture Recognition System using Convolutional...
IRJET- A Vision based Hand Gesture Recognition System using Convolutional...
 
IRJET- Alternate Vision Assistance: For the Blind
IRJET- Alternate Vision Assistance: For the BlindIRJET- Alternate Vision Assistance: For the Blind
IRJET- Alternate Vision Assistance: For the Blind
 
From Pixels to Understanding: Deep Learning's Impact on Image Classification ...
From Pixels to Understanding: Deep Learning's Impact on Image Classification ...From Pixels to Understanding: Deep Learning's Impact on Image Classification ...
From Pixels to Understanding: Deep Learning's Impact on Image Classification ...
 
ROAD POTHOLE DETECTION USING YOLOV4 DARKNET
ROAD POTHOLE DETECTION USING YOLOV4 DARKNETROAD POTHOLE DETECTION USING YOLOV4 DARKNET
ROAD POTHOLE DETECTION USING YOLOV4 DARKNET
 
IRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
IRJET- Implementation of Gender Detection with Notice Board using Raspberry PiIRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
IRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
 
ANALYSIS OF LUNG NODULE DETECTION AND STAGE CLASSIFICATION USING FASTER RCNN ...
ANALYSIS OF LUNG NODULE DETECTION AND STAGE CLASSIFICATION USING FASTER RCNN ...ANALYSIS OF LUNG NODULE DETECTION AND STAGE CLASSIFICATION USING FASTER RCNN ...
ANALYSIS OF LUNG NODULE DETECTION AND STAGE CLASSIFICATION USING FASTER RCNN ...
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
 
A Survey on Image Processing using CNN in Deep Learning
A Survey on Image Processing using CNN in Deep LearningA Survey on Image Processing using CNN in Deep Learning
A Survey on Image Processing using CNN in Deep Learning
 
Compact optimized deep learning model for edge: a review
Compact optimized deep learning model for edge: a reviewCompact optimized deep learning model for edge: a review
Compact optimized deep learning model for edge: a review
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 

Recently uploaded (20)

(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 

Improving AI surveillance using Edge Computing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 929 Improving AI surveillance using Edge Computing Neha Saxena1, Mr. Harsh Chauhan2, Mr. Dhruv Khara3, Mr. Rutvik Joshi4 1 A.P., Dept. of Computer Engineering Universal College of Engineering, Mumbai university 2,3,4 Dept. of Computer Engineering Universal College of Engineering, Mumbai university ----------------------------------------------------------------------------***-------------------------------------------------------------------------- Abstract - Surveillance is a key part of security, assisting in the needs of the things to be protected. Oftentimes it happens that the human eye ignores essential key components while monitoring security throughout the campus which can result in an uncalled incident. Teachers often in classrooms are focused on teaching and assuring that students understand the concepts but eventually miss out on the overall gestures students indicate during the class. Using four powerful deep learning models namely person action detection, face recognition, landmarks- recognition and face re-identification recognition for smart classroom features combined with Mask-RCNN model for instance segmentation on object detection, particularly weapons, leverages the power of Artificial Intelligence to be deployed on the edge reducing the greater amount of resources required in case of cloud inferences. The real-Time monitoring system will help the users, particularly security personnel in understanding the on-ground situation of the campus. The system also warns on screen with a red border about the situation turning violent. Keywords: Edge Computing, Mask-RCNN, Surveillance, Smart Classroom, Intel OpenVino toolkit. 1. INTRODUCTION Surveillance is an integral part of security and patrol. For the most part, the job entails extended periods of looking out for something undesirable to happen. Most of the criminal activities today take place using handheld arms, particularly guns, pistols and revolvers. The crime and social offense can be reduced by monitoring and identifying such activities of antisocial behavior which will allow law enforcement agencies to take appropriate action in the early stage. It is crucial that we do this, but also it is a very mundane task. Would not life be much simpler if there was something that could do the “watching and waiting” for us? With the advancements in technology over the past few years, Artificial Intelligence can help us automate the task of surveillance to a maximum level requiring only minimal effort of attention from the manual task force on the ground. Deep learning is highly successful in machine learning across a variety of applications, including computer vision, natural language processing, and big data analysis. However, deep learning’s high accuracy comes at the expense of high computational and memory requirements for both training and inference purposes. Training a deep learning model is space and computationally expensive due to the vast number of parameters that need to be iteratively refined over multiple time periods. High accuracy and high resource consumption are characteristics of deep learning models. To complete the computational requirements of deep learning algorithms and models, a possible approach is to leverage cloud computing. To use cloud resources, data must be transferred from the data source location on the network edge to a central repository of servers which further increases the problems of latency, scalability and privacy hence edge computing is used as a viable solution. Edge computing aims to solve the problems of latency, scalability and privacy by providing close computing proximity to end-to-end devices thus enabling real-time services and avoiding the dependency on centralized servers. Hence to avoid the computational heavy challenges of deep learning on the cloud or personal system, deep learning with edge computing is preferred over them. 2. EXISTING SYSTEM 2.1 Existing system The existing approaches so far used are : • Intelligent video surveillance • Abnormal event detection • Smart Classroom - An Intelligent Environment for Tele- education. During our analysis of research papers, we found out that edge computing was not used for surveillance purposes. The existing system that we see requires a manual task force to actually monitor the input feed that is provided
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 930 through cameras. This feed is stored on cloud servers or physical servers causing storage issues every some interval of time. The response to any alerting situation is considerably slow considering full automation which is a risk to the safety at the campus or the industry area where the system is installed. No system has yet used multiple and simultaneous deep learning models for surveillance purposes. 2.2 Project Scope Using our proposed system, campuses can ensure they save more on resources and implement stricter methods of surveillance additionally allowing teachers to understand their students better and get an overview of how attentive students are during their learning. The real-Time monitoring system will help the users, particularly security personnel in understanding the on- ground situation of the campus. The system also warns on screen with a red border about the situation turning violent. 3. PROPOSED SYSTEM This chapter includes a brief description of the proposed system and explores the different modules involved along with the various models through which this system is understood and represented. 3.1 Analysis/Framework/Algorithm ● Face Detection Model[6] takes name as "input" with input image shape as [1x3x384x672] - An input image in the format [BxCxHxW], where: B - batch size, C - number of channels, H - image height, W - image width, Expected color order is BGR. The net outputs a blob with the shape: [1, 1, N, 7], where N is the number of detected bounding boxes will be the output of the image. ● Landmarks Regression Model[6] takes input with name as "data" and input image shape as [1x3x48x48] - An input image in the format [BxCxHxW], where :B - batch size, C - number of channels, H - image height, W - image width, The expected color order is BGR. The net outputs a blob with the shape: [1, 10], containing a row- vector of 10 floating-point values for five landmarks coordinates in the form (x0, y0, x1, y1, ..., x5, y5). All the coordinates are normalized to be in the range [0,1]. ● Person Detection Model[6] takes input name: data with input shape as [1x3x544x992] - An input image in following format [1xCxHxW]. The expected channel order is BGR. 2) name: im_info, shape: [1x6] - An image information [544, 992, 992/frame_width, 544/frame_height, 992/frame_width, 544/frame_height]. The net outputs a "detection_ouput" blob with the shape: [1x1xNx7], where N is the number of detected pedestrians. ● Face Re-Identification Model[6] takes input name as "data '' , input shape as [1x3x128x128] - An input image in the format [BxCxHxW]. The net outputs a blob with the shape [1, 256, 1, 1], containing a row vector of 256 floating-point values. Outputs on different images are comparable in cosine distance. ● Mask RCNN - Using the instance segmentation dataset from Open Images Dataset V6 for weapon category objects, mask RCNN is trained for predicting and improving AI surveillance. Fig -1: The architecture of Mask RCNN The CNN structure used here is Feature Pyramid Network. The Feature Pyramid Network (FPN) is a feature extractor designed for such a pyramid concept with accuracy and speed in mind. The FPN network is capable of detecting very small objects. For proposed experimentation ResNet 101 with an FPN backbone is used. The backbone strides are taken as 4,8,16,32 and 64.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 931 Fig -2: The Feature Pyramid Network with Resnet (ref- JonathanHui) The FPN works as a feature detector and we extract multiple feature map layers and feed them to a Region Proposal Network or RPN for detecting objects. RPN applies 3 × 3 convolutions over the feature maps followed by separate 1 × 1 convolution for class predictions and boundary box regression. These 3 × 3 and 1 × 1 convolutional layers are called the RPN head. The same head is applied to all feature maps. Fig -3: Anchor and sliding window in a vector form(ref- JonathanHui) RPN having a classifier and a regressor. Here it is introduced the concept of anchors. Anchor is the central point of the sliding window. The length of the square anchor in pixels is taken as 32,64,128,256,512. The anchor ratios are taken as 0.5, 1 and 2 respectively. The ratio is defined by the width/height at each cell. For reduction in memory load, mini masks are used for high-resolution images. Mini masks reduce the masks to a smaller size to reduce the memory load.The height and width of the mini mask is taken as (56,56). Input images are resized to square form with a minimum image dimension of 800 and a maximum image dimension of 1024. The Mask RCNN paper[2] uses 512 ROIs per image but often the RPN does not generate positive proposals to fill this and we keep a positive-negative ratio of 1:3. For ROI pooling the pool size is set as 7 and the maximum pool size as 14. The IOU thresholds are set at probabilities of 0.3 for minimum at 0.7 for maximum. For optimization of the loss function, we set the learning rate at 0.001 and the learning momentum of 0.9 with a weight decay regularization of 0.0001. For solving the exploding gradient problem we have defined a gradient clipping with the norm of 5.0. Every model is later passed onto a Model optimizer which generates a .xml file and a .bin file which are the model graph and weights file respectively. This is also known as Intermediate representation or IR. Furthermore, it is passed on to Inference Engine which is a set of C++ libraries with C and Python bindings providing a common API to deliver inference solutions on the platform of choice. Fig -4: Intel OpenVino Toolkit internal working - source(docs.openvino.ai) 3.2 System Architecture Fig -5: Proposed System Architecture
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 932 For the AI Surveillance system, an input feed from video cameras is processed through the established model pipeline as required for edge computing. The input feed is processed frame by frame and passes through the models for individual detection and action recognition for the frame. The models are passed through a model optimizer for generating the .xml and .bin files which are the model graph and weight files. Furthermore, the files are processed through the edge computing inference engine of Intel OpenVino for input inferences and forwarded to the user application module where the processed feed is displayed using OpenCV and for weapons being detected the border of the screen alerts in red. Module Details Model Processing - Once the input feed is processed through the model processing pipeline, the frames are resized according to the model requirements and are detected based on the model developed. Starting with the Face Detection model detects for the faces in the frames and is forwarded to the Landmarks regression model for landmark detection on faces. A student in the frame is then identified based on the available gallery of student faces using the Face ReIdentification model and then forwarded for entire frame analysis for weapon detection using mask RCNN. The model graphs and weights are processed using model optimizer and .xml and .bin files are generated which are forwarded to the edge computing inference engine. User Application - The data processed through the Model Processing block is forwarded to display through the Python GUI using intermediary OpenCV processing steps. Depending on the identification of objects based on the MaskRCNN model the GUI will act accordingly. For Weapons detected, the display will show a red border indicating a warning and alert. For the Smart classroom, functionality outputs will be generated in a separate file. 4. EXPERIMENTAL RESULTS Following the proposed algorithm pipeline and the system architecture, the assimilated results follow a significant improvisation depending on the system dependencies involved. 4.1 Smart Classroom Monitoring Results obtained from the Intel OpenVino Edge computing toolkit while using it on an Intel i7 9th generation 9700K showcase the capabilities of handling 25 maximum frames per second with face identification, landmark detection, face reidentification, and action recognition models working simultaneously which over a cloud computing with 720P cameras has a processing speed of 10FPS[3] which is significantly low by 50%. Fig -6: Smart classroom action recognition and face detection implementation The data propagation round-trip time to edge servers and AWS a cloud computing service is 8 times higher than edge computing.[3] Fig -7: Wang, J., Pan, J., & Esposito, F. (2017). Elastic urban video surveillance system using edge computing. Data propagation round-trip time to edge servers and AWS.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 933 4.2 Weapon detection using MaskRCNN Fig -8: Weapon detection system initial implementation Initial implementation of Mask RCNN is selected with the RPN anchor stride as 1. The concept of Non-Max Suppression is used to filter the RPN proposals. The RPN non-max suppression threshold is set at 0.7. For each image, we are training 256 anchors. After Non-max suppression, top 2000 ROIs for training and 1000 ROIs for generating inferences. Mask RCNN trained on pretrained COCO dataset using transfer learning algorithms brings a validation loss of 0.2294 which is selected for this proposed system. 4.3 Future Scope and Implementation a) Detecting categories of weapons and identifying fake from real ones. b) Detecting handheld guns using Pose and Human Key point Estimation algorithms. c) Ensemble techniques for detection combining Instance segmentation with Human Keypoint estimation. d) Creating a model API and pushing it to real-time deployment to a CCTV using a Raspberry PI. 5. CONCLUSION In this proposed work we propounded and implemented a novel handheld gun classification and detection approach for surveillance additionally implementing a smart classroom monitoring system specifically for college surveillance purposes using edge computing. The system includes application of multiple models along with Mask RCNN giving us the optimal results. The system can identify the existence of numerous guns in real time and is robust across the variation in various factors of scale and rotation. Although, we assume that by implementing this method, the performance of the system will be refined and its real time processing essentials like complexity of space and time for processing can be diminished. ACKNOWLEDGEMENT We take this opportunity to express our deep sense of gratitude to Mrs. Neha Saxena for her continuous guidance and encouragement throughout the duration. It is because of her experience and wonderful knowledge, we can fulfill the requirement of completing within the stipulated time. We would also like to thank Dr. Jitendra Saturwar, Head of the computer engineering department and Mrs. Vishakha Shelke. REFERENCES [1] Zhang, Jolfaei, & Alazab, "A Face Emotion Recognition Method Using Convolutional Neural Network and Image Edge Computing", In-Edge Computing,(2019), IEEE [2] Kaiming He, Georgia Gkioxari, Piotr Dollar, Ross Girshick ,"MASK R-CNN",In-Edge Computing,(2018), ICCV [3] Jianyu Wang, Flavio Esposito, Jianli Pan,"Elastic urban video surveillance system using edge computing",In- Edge Computing,(2017), ACM [4] Shivprasad Tavagad, Shivani Bhosale, Ajit Prakash Singh, Deepak Kumar , "Paper on Smart Surveillance System",In-Edge Computing,(2016), International Research Journal of Engineering and Technology [5] Weikai Xie, Yuanchun Shi, Guanyou Xu, Dong Xie,"Smart Classroom - An Intelligent Environment for Tele-education",In-Edge Computing,(2001), Springer [6] Intel’s Pre-Trained Models or Public Pre-Trained Models OpenVINO™ Toolkit - Open Model Zoo repository, [Online] https://github.com/openvinotoolkit/open_model_zoo