Submit Search
Upload
Deep Learning Video Surveillance
•
1 like
•
293 views
AI-enhanced title
IRJET Journal
Follow
https://www.irjet.net/archives/V9/i5/IRJET-V9I5427.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
Raghu Vamsy Sirasala
Smart mirror
Smart mirror
Technical Hub
3d password ppt
3d password ppt
manisha0902
Touchless Touchscreen
Touchless Touchscreen
Saptarshi Dey
Zigbee with home automation
Zigbee with home automation
Thangaraj Murugananthan
RFID BASED ATTENDANCE SYSTEM.pptx
RFID BASED ATTENDANCE SYSTEM.pptx
Sudipto Krishna Dutta
seminar report on Li-Fi Technology
seminar report on Li-Fi Technology
Måñíshà Rêððý
final project ppt
final project ppt
saieshwar chellapuram
Recommended
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
Raghu Vamsy Sirasala
Smart mirror
Smart mirror
Technical Hub
3d password ppt
3d password ppt
manisha0902
Touchless Touchscreen
Touchless Touchscreen
Saptarshi Dey
Zigbee with home automation
Zigbee with home automation
Thangaraj Murugananthan
RFID BASED ATTENDANCE SYSTEM.pptx
RFID BASED ATTENDANCE SYSTEM.pptx
Sudipto Krishna Dutta
seminar report on Li-Fi Technology
seminar report on Li-Fi Technology
Måñíshà Rêððý
final project ppt
final project ppt
saieshwar chellapuram
imageprocessing-abstract
imageprocessing-abstract
Jagadeesh Kumar
Jini technology ppt
Jini technology ppt
OECLIB Odisha Electronics Control Library
Smart mirror
Smart mirror
Sundar B N
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
Karishma Khan
Concealed weapon detection using image processing
Concealed weapon detection using image processing
MOHAMMED MAHDI ADAM
Touchless Technology
Touchless Technology
Nani Vasireddy
Eye gaze2
Eye gaze2
Raja Kandagatla
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM
Ayush Dixit
Image segmentation
Image segmentation
Tubur Borgoary
IOT: Home Automation using Android Application
IOT: Home Automation using Android Application
Nikhil Jadav
Eye ball cursor movement using opencv
Eye ball cursor movement using opencv
Venkat Projects
Smart Mirror using Raspberry PI
Smart Mirror using Raspberry PI
Prathmesh Gavankar
Eye mouse
Eye mouse
SUHAS BADAM
image compression using matlab project report
image compression using matlab project report
kgaurav113
Seminar report Of Touchless Touchscreen
Seminar report Of Touchless Touchscreen
Lovely Professional University
Li Fi technology abstract document
Li Fi technology abstract document
Rohith Palakurthi
smart note taker
smart note taker
veena jl
Intelligent surveillance system
Intelligent surveillance system
Abin Titus John
Password based door locking system
Password based door locking system
Arjun Singh
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
Universitat Politècnica de Catalunya
Human Activity Recognition
Human Activity Recognition
IRJET Journal
Analysis of Human Behavior Based On Centroid and Treading Track
Analysis of Human Behavior Based On Centroid and Treading Track
IJMER
More Related Content
What's hot
imageprocessing-abstract
imageprocessing-abstract
Jagadeesh Kumar
Jini technology ppt
Jini technology ppt
OECLIB Odisha Electronics Control Library
Smart mirror
Smart mirror
Sundar B N
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
Karishma Khan
Concealed weapon detection using image processing
Concealed weapon detection using image processing
MOHAMMED MAHDI ADAM
Touchless Technology
Touchless Technology
Nani Vasireddy
Eye gaze2
Eye gaze2
Raja Kandagatla
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM
Ayush Dixit
Image segmentation
Image segmentation
Tubur Borgoary
IOT: Home Automation using Android Application
IOT: Home Automation using Android Application
Nikhil Jadav
Eye ball cursor movement using opencv
Eye ball cursor movement using opencv
Venkat Projects
Smart Mirror using Raspberry PI
Smart Mirror using Raspberry PI
Prathmesh Gavankar
Eye mouse
Eye mouse
SUHAS BADAM
image compression using matlab project report
image compression using matlab project report
kgaurav113
Seminar report Of Touchless Touchscreen
Seminar report Of Touchless Touchscreen
Lovely Professional University
Li Fi technology abstract document
Li Fi technology abstract document
Rohith Palakurthi
smart note taker
smart note taker
veena jl
Intelligent surveillance system
Intelligent surveillance system
Abin Titus John
Password based door locking system
Password based door locking system
Arjun Singh
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
Universitat Politècnica de Catalunya
What's hot
(20)
imageprocessing-abstract
imageprocessing-abstract
Jini technology ppt
Jini technology ppt
Smart mirror
Smart mirror
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
Concealed weapon detection using image processing
Concealed weapon detection using image processing
Touchless Technology
Touchless Technology
Eye gaze2
Eye gaze2
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM
Image segmentation
Image segmentation
IOT: Home Automation using Android Application
IOT: Home Automation using Android Application
Eye ball cursor movement using opencv
Eye ball cursor movement using opencv
Smart Mirror using Raspberry PI
Smart Mirror using Raspberry PI
Eye mouse
Eye mouse
image compression using matlab project report
image compression using matlab project report
Seminar report Of Touchless Touchscreen
Seminar report Of Touchless Touchscreen
Li Fi technology abstract document
Li Fi technology abstract document
smart note taker
smart note taker
Intelligent surveillance system
Intelligent surveillance system
Password based door locking system
Password based door locking system
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
Similar to Deep Learning Video Surveillance
Human Activity Recognition
Human Activity Recognition
IRJET Journal
Analysis of Human Behavior Based On Centroid and Treading Track
Analysis of Human Behavior Based On Centroid and Treading Track
IJMER
IRJET- Tracking and Recognition of Multiple Human and Non-Human Activites
IRJET- Tracking and Recognition of Multiple Human and Non-Human Activites
IRJET Journal
Development of Human Tracking in Video Surveillance System for Activity Anal...
Development of Human Tracking in Video Surveillance System for Activity Anal...
IOSR Journals
IRJET- A Review Analysis to Detect an Object in Video Surveillance System
IRJET- A Review Analysis to Detect an Object in Video Surveillance System
IRJET Journal
IRJET- Review on Human Action Detection in Stored Videos using Support Vector...
IRJET- Review on Human Action Detection in Stored Videos using Support Vector...
IRJET Journal
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET Journal
IRJET- Full Body Motion Detection and Surveillance System Application
IRJET- Full Body Motion Detection and Surveillance System Application
IRJET Journal
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
IRJET Journal
Human Action Recognition using Contour History Images and Neural Networks Cla...
Human Action Recognition using Contour History Images and Neural Networks Cla...
IRJET Journal
IRJET- Behavior Analysis from Videos using Motion based Feature Extraction
IRJET- Behavior Analysis from Videos using Motion based Feature Extraction
IRJET Journal
Human activity detection based on edge point movements and spatio temporal fe...
Human activity detection based on edge point movements and spatio temporal fe...
IAEME Publication
IRJET- Prediction of Anomalous Activities in a Video
IRJET- Prediction of Anomalous Activities in a Video
IRJET Journal
Background Subtraction Algorithm Based Human Behavior Detection
Background Subtraction Algorithm Based Human Behavior Detection
IJERA Editor
IRJET - Direct Me-Nevigation for Blind People
IRJET - Direct Me-Nevigation for Blind People
IRJET Journal
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
IRJET Journal
Sanjaya: A Blind Assistance System
Sanjaya: A Blind Assistance System
IRJET Journal
A Framework for Human Action Detection via Extraction of Multimodal Features
A Framework for Human Action Detection via Extraction of Multimodal Features
CSCJournals
IRJET - Creating a Security Alert for the Care Takers Implementing a Vast Dee...
IRJET - Creating a Security Alert for the Care Takers Implementing a Vast Dee...
IRJET Journal
IRJET- Smart Mirror using Eye Gaze Tracking
IRJET- Smart Mirror using Eye Gaze Tracking
IRJET Journal
Similar to Deep Learning Video Surveillance
(20)
Human Activity Recognition
Human Activity Recognition
Analysis of Human Behavior Based On Centroid and Treading Track
Analysis of Human Behavior Based On Centroid and Treading Track
IRJET- Tracking and Recognition of Multiple Human and Non-Human Activites
IRJET- Tracking and Recognition of Multiple Human and Non-Human Activites
Development of Human Tracking in Video Surveillance System for Activity Anal...
Development of Human Tracking in Video Surveillance System for Activity Anal...
IRJET- A Review Analysis to Detect an Object in Video Surveillance System
IRJET- A Review Analysis to Detect an Object in Video Surveillance System
IRJET- Review on Human Action Detection in Stored Videos using Support Vector...
IRJET- Review on Human Action Detection in Stored Videos using Support Vector...
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET- Full Body Motion Detection and Surveillance System Application
IRJET- Full Body Motion Detection and Surveillance System Application
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
Human Action Recognition using Contour History Images and Neural Networks Cla...
Human Action Recognition using Contour History Images and Neural Networks Cla...
IRJET- Behavior Analysis from Videos using Motion based Feature Extraction
IRJET- Behavior Analysis from Videos using Motion based Feature Extraction
Human activity detection based on edge point movements and spatio temporal fe...
Human activity detection based on edge point movements and spatio temporal fe...
IRJET- Prediction of Anomalous Activities in a Video
IRJET- Prediction of Anomalous Activities in a Video
Background Subtraction Algorithm Based Human Behavior Detection
Background Subtraction Algorithm Based Human Behavior Detection
IRJET - Direct Me-Nevigation for Blind People
IRJET - Direct Me-Nevigation for Blind People
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
Sanjaya: A Blind Assistance System
Sanjaya: A Blind Assistance System
A Framework for Human Action Detection via Extraction of Multimodal Features
A Framework for Human Action Detection via Extraction of Multimodal Features
IRJET - Creating a Security Alert for the Care Takers Implementing a Vast Dee...
IRJET - Creating a Security Alert for the Care Takers Implementing a Vast Dee...
IRJET- Smart Mirror using Eye Gaze Tracking
IRJET- Smart Mirror using Eye Gaze Tracking
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
vipinkmenon1
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
DeelipZope
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
RajaP95
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
PoojaBan
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
eptoze12
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZTE
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
Recently uploaded
(20)
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Deep Learning Video Surveillance
1.
© 2022, IRJET
| Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1616 Intelligent Video Surveillance System using Deep Learning Neha Kardile, Rutuja Deshmukh, Vaibhav Kalhapure, Project Guide: Prof. Devidas Jaybhay Department of Computer Engineering, G.H.Raisoni College of Engineering, Chas, Ahmednagar. -------------------------------------------------------------------***---------------------------------------------------------------------- Abstract- Abnormal activity detection plays a very important role in surveillance applications. To capture the abnormal activity of humans without the intervention of the system i.e. automatically captures the video can be implemented. Human fall detection, suddenly jumping down which has an important application in the field of safety and security. Proposed system use for detecting roadside human activities or behavior by using the Probabilistic Neural Network (PNN) method for classifying activities or behavior between training dataset and testing videos. The partitions between classes of normal activities have also been learned using multi-PNNs. recognizing human activity has become a trend in smart surveillance that contains several challenges, such as performing effective detection of huge video data streams, while maintaining low computational complexity. Current activity recognition techniques are using convolutional neural network (CNN) model with computationally complex classifiers, creating hurdles in obtaining quick responses for abnormal activity, so this paper proposes a framework for activity detection. First, we detect abnormal activity with humans in the surveillance stream using an effective CNN model. The detected individual is tracked throughout the video stream via an ultra –fast object tracker called ‘minimum output sum of squared error’ {MOSSE), Next, for each Tracked individual, pyramidal convolutional features are extracted from two consecutive frames using the efficient LiteFlowNet CNN. Finally, a novel deep skip connection gated recurrent unit is trained to learn different temporal changes in the sequence of frames for activity recognition and detection. We finish by the result indicate the efficiency of the proposed technique. Keywords: Recognition, Video cameras, surveillance systems. I. INTRODUCTION During these recent years, applications of video surveillance have attracted more and more researchers. Consequently, various types of modeling, as well as several techniques of analysis and detection of human activities, are suggested. Particularly, many pieces of research are involved in the recognition and detection of human activities in general and especially abnormal activities. One important application is the supervision of elderly and disabled people at home in care centers, or hospitals. Recognition of human activities is a recent field that is interested to provide techniques and methods allowing the detection and classification of human activities, and extended now to recognize normal or abnormal activities. The motivation behind the latter is to provide an immediate intervention to preserve the lives of individuals or to ensure them some services they are unable to do by themselves. Being recent and interesting, this field has attracted the attention of several researchers who try to find solutions to the problems faced in studying such types of activities. However, the proposals made for this until now are those used for the recognition of normal human activities with minor modifications. These proposals are still very restricted because of the very limited number of works and surveys in this field. Moreover, they are not efficient and suffer from several limitations and technical difficulties. To this end, we propose in this paper an overview and an analysis of the existing works, to offer the researchers a general view of what exists in this field and to provide them with a tool being a help to them propose new approaches. For this, the manuscript is organized as follows. In the second section, we present a definition of the abnormal activities, their various types, as well as some examples of abnormal activities of a group or a single person. We then discuss in the third section the motivations that led to the advent of this research axis and the development of techniques allowing the analysis and recognition of human activities in general and abnormal activities in particular. The fourth section is devoted to the proposed approaches in the literature for the detection of abnormal activities. In this section, we present for each proposal, the purpose for which it is set up, its different stages, and the means used for its validation. Subsequently, we discuss some aspects affecting or influencing the effectiveness and credibility of the classification of human activities. The sixth section presents the three modes of automatic learning (supervised, unsupervised, and semi- supervised). Thereafter, we enumerate the encountered limitations to be taken into consideration to improve the systems of recognition and identification of abnormal activities. Finally, we finish with a conclusion where we summarize our study. II. RELATED WORK This paper is much work on abnormal behavior detection took a supervised learning approach. Diverse contributions have been made in the development of behavior recognizers for smart building surveillance applications. In automatic roaders, human surveillance, the vehicle or human activities and behaviors are detected and International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1617 recognized for monitoring and warning purposes, for detecting human behavior. Types of an anomaly to detect object or behavior some are as follows: 1. Video-based abnormal human behavior recognition Fig. 1 Example of difference from walking or jogging This technique only focuses on updating anomalous human activity detection. The hidden Markov Model (HMM) and Dynamic Bayesian Network Model (DBNM) [1] are using to detect suspicious behavior as shown in Fig. 1 2. Motion detection, tracking, and classification for automated video surveillance Fig. 2. Tracking of moving object III. EXISTING SYSTEM In the existing system, the video surveillance system is designed for human operators to observe protected Space or to record video data for further detection. But watching surveillance video is a labor- intensive need to be controlled. It is also a very tedious and time-consuming job and human observers can easily lose attention. IV. PROPOSED SYSTEM Fig 3. The proposed activity recognition framework for surveillance applications V. ARCHITECTURE DIAGRAM 1. Capturing video OpenCV is an open-source python library that contains various functions for image and video operations. With OpenCV, we can capture a video from the camera. cv2.VideoCapture () method is defined to get a video capture object for camera. Create an infinite loop and use the read () method to read the frames using above created object. Cv2.imshow () method is used to show the frames in the video. Loop will break when the user clicks a specific key. 2. Motion detection In the proposed work, Motion detection is performed by using OpenCV and Pandas library. Captured videos are treated as a stack of pictures called frames. Different frames are compared to the static frame which has no movements. We compared two images by comparing the intensity value of each pixel. Firstly, we convert a color image into a grayscale image, then a gray-scale image is converted to GuassianBlur so that change can be easily found. After that difference between the static background and the current frame is found out. If we found to change between them is greater than 30 it will show white color. Then contour of the moving object.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1618 3. Feature extraction Feature extraction is the process of identifying the important features of the data. It reduces an initial set of raw data to more manageable groups for processing. So here, we will start with reading colored images, using the imread () method. Using the shape function, the shape of the image is found out. Suppose the shape for the image is 375*500. So the number of features will be 187500. If you want to change the shape of the image that is also can be done by using reshape function from NumPy where we specify the dimension of the image. For this scenario, the image has a dimension (375, 500, and 3). This three represent the RGB value as well as the number of channels. Now we will use the previous method to create the features. The total number of features will be for this case 375*500*3 = 562500. This colored image has a 3D matrix of dimension (375*500 * 3) where 375 denotes the height, 500 stands for the width and 3 is the number of channels. To get the average pixel values for the image, we will use a for a loop. Now we will make a new matrix that will have the same height and width but only 1 channel. To convert the matrix into a 1D array we will use the Numpy library. CT is found out. 4. Classifier An important step for surveillance activity recognition is to detect, localize, and track each individual throughout the video stream. This task is not feasible with object detectors that are trained on general categories of data. For this purpose, we fine-tuned a lightweight CNN model for human detection with new data and enabled it to work in a changing surveillance environment. It is superior to state- of-the-art methods, its effectiveness is verified from experiment. This architecture makes our system able to achieve LSTM-level accuracy while being more efficient than the LSTM. VI. SEQUENCE DIAGRAM VII. SUPPORT VECTOR MACHINE (SVM) R-transform is used to extract periodic, scale & translation invariant features. Different algorithms are used as a non-linear technique to overcome the similarities among different classes of activities. SVM (Support Vector Machine) Algorithm is used for training & recognition of activities due to its suitability for time dependent sequential data in this research. VIII.RESULTS Fig: Input for Abnormal Activity Detection From here we’ll take the file as an input for detection.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1619 Fig: Input file for detecting abnormal activity Here we can choose any video stream for detection process. We need to click on open to open the file. Fig: Output of Abnormal Detection Fig: Output shows as a normal activity After opening video, system will start processing on that video to detect abnormal activity, it will show result as an abnormal activity through that video. Whenever abnormal activity happen, system will detect that activity and label it as ‘abnormal’. If there is no abnormal activity detected then it will label as ‘Normal’. IX. APPLICATIONS Traffic Monitoring The system will provide an easy way to monitor the traffic and give the appropriate result. Parking Lots The system will help in parking lots for security purposes also, visible security cameras will help you detect thieves from breaking into cars. Security This system will help in the security field on various platforms like parking lots, home security. Monitoring Operations The system will make it easy to monitor the various abnormal activities and suspicious events. X. TABLE Threat Vulnerabil ity Asset Impact Control Recommendati ons System Failure Overheati ng in server room. Air conditionin g system is old. Serve r. All service will be unavaila ble for at least 2-3 hours. Setup new air conditioner. Malicious Human DDOS Attack. Firewall is not configured properly. Serve r. Resource s will be unavaila ble or not work properly. Monitor & configure the firewall. Accidenta l or purposely attack of human. CCTV doesn’t have secured shield or cover. CCTV . CCTV will get damaged. Setup shield or proper covering the CCTV. Accuracy. Low performanc e of algorithm or training dataset. Serve r. It will show result with low accuracy. Monitor & reset working of functions.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1620 XI. CONCLUSION The proposed system aims to open a new door in the field of video surveillance and provide the result on the basis to detect abnormal activities. It will help the user to monitor any abnormal activities or suspicious events. It's been very difficult to monitor abnormal activities in various fields like security, crime prevention, traffic monitoring. It will help the user by sending an alert message when an abnormal condition is identified. The number of parameters currently included is an attempt to cover all the basic aspects of video surveillance and other overlooked parameters which deserve recognition. This work is interested in the recognition of abnormal human activities by providing a brief analysis of the recent research tasks in this field of video surveillance. We have implemented the CNN to detect abnormal activities. Finally, through this analysis of the recent research tasks in this field of video surveillance and provide the result on the basis to detect abnormal activities. REFERENCES [1] VRIGKAS, Michalis, NIKOU, Christopher’s, ET KAKADIARIS, Iohannis A. A review of human activity recognition methods. Frontiers in Robotics and AI, 2015, vol. 2, p. 28. [2] POPULAR, Oluwatoyin P. ET WANG, Kejun. Video-based abnormal human behavior recognition—A review. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 2012, vol. 42, no 6, p. 865-878 [3] BENABBAS, Yassin, IHADDADENE, Nacim, ET DJERABA, Chaabane. Motion pattern extraction and event detection for automatic visual surveillance. EURASIP Journal on Image and Video Processing, 2010, vol. 2011, no 1, p. 163682. [4] HUNG, Ya-Xuan, CHIANG, Chih-Yen, HSU, and Steen J., et al. Abnormality detection for improving elder's daily life independence. In: International Conference on Smart Homes and Health Telematics. Springer Berlin Heidelberg, 2010. p. 186-194. [5]ADAM, Amit, RIVLIN, Ehud, SHIMSHONI, Ilan, et al. Robust real-time unusual event detection using multiple fixed-location monitors. [6] SHIN, Jae Hyuk, LEE, Boreom, ET PARK, Kwang Suk. Detection of abnormal living patterns for the elderly living alone using support vector data description. IEEE Transactions on Information Technology in Biomedicine, 2011, vol. 15, no 3, p. 438-448. [7] PALANIAPPAN, Adithyan, BHARGAVI, R., ET VAIDEHI, V. Abnormal human activity recognition using SVM based approach. In: Recent Trends in Information Technology (ICRTIT), 2012 International Conference on. IEEE, 2012. p. 97-102. [8] A. Datta, M. Shah and N. Lobo, “Person-on-person violence detection in video data”, Proceedings of the 16th International Conference on Pattern Recognition, vol. 1, pp. 433-438, 2002. [9] Paolo Rota, Nicola Conci, Nicu Sebe, and James M Rehg, "Real-life violent social interaction detection", International Conference on Image Processing, pp. 3456– 3460, 2002. [10] M. Drulea, and S. Nedevschi, “Total Variation Regularization of Local-Global Optical Flow”, IEEE Int. Con. Intelligent Transportation Systems, pp. 318-323, 2011. [11] E. ESEN, M. ARABACI, and M. SOYAL,”Fight Detection in Surveillance Videos”, Int. Workshop on Content-Based Multimedia Indexing, pp. 131-135, Jun 2013. [12] CAVIAR Test Case Scenarios, http://groups.inf.ed.ac.uk/vision/CAVIAR/CAVIARDATA1 Daniel Gutchess, M Trajkovics, Eric Cohen-Solal, Damian Lyons, and Anil K Jain, “A background model initialization algorithm for video surveillance,” in ComputerVision, 2001. ICCV 2001. Proceedings. EighthIEEE International Conference on. IEEE, 2001, vol. 1, pp. 733–740. [13] Varun Chandola, Arindam Banerjee, and Vipin Kumar, "Anomaly detection: A survey," ACM computing surveys (CSUR), vol. 41, no. 3, pp. 15, 2009. [14] Yael Pritch, Alex Rav-Acha, and Shmuel Peleg, "Nonchronological video synopsis and indexing," IEEE transactions on pattern analysis and machine intelligence,vol. 30, no. 11, pp. 1971–1984, 2008. [15] Chris Stauffer and W Eric L Grimson, “Adaptive background mixture models for real-time tracking,” in Computer Vision and Pattern Recognition, 1999. IEEE Computer Society Conference on. IEEE, 1999, vol. 2, pp.246–252. [16]Olivier Barnich and Marc Van Droogenbroeck, "Vibe: A universal background subtraction algorithm for video sequences," IEEE Transactions on Image processing, vol. 20, no. 6, pp. 1709–1724, 2011. [17] Pierre-Luc St-Charles, Guillaume-Alexandre Bilodeau, and Robert Bergevin, “Subsense: A universal change detection method with local adaptive sensitivity,” IEEE Transactions on Image Processing, vol. 24, no. 1, pp. 359– 373, 2015. [18] Yi Wang, Pierre-Marc Jodoin, Fatih Porikli, Janusz Konrad, Yannick Benezeth, and Prakash Ishwar, “Cdnet 2014: an expanded change detection benchmark dataset,”
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1621 in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2014, pp. 387–394. [19] Timo Ojala, Matti Pietikainen, and Topi Maenpaa, “Multiresolution gray-scale and rotation invariant texture classification with local binary patterns,” IEEE Transactions on pattern analysis and machine intelligence, vol. 24, no. 7, pp. 971–987, 2002. [20] Kaiming He, Georgia Gkioxari, Piotr Doll´ar, and Ross Girshick, "Mask r-CNN," in Computer Vision (ICCV), 2017 IEEE International Conference on. IEEE, 2017, pp. 2980– 2988. [21] Marc Braham and Marc Van Droogenbroeck, “Deep background subtraction with scene-specific convolutional neural networks,” in Systems, Signals and Image Processing (IWSSIP), 2016 International Conference on. IEEE, 2016, pp. 1–4. [22] Jonathan Long, Evan Shelhamer, and Trevor Darrell, “Fully convolutional networks for semantic segmentation,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2015, pp. 3431– 3440. [23] Andrews Sobral, "Bgslibrary: An OpenCV c++ background subtraction library,” in IX Workshop de Visao Computacional (WVC2013), 2013, vol. 7. [24] Xavier Glorot and Yoshua Bengio, “Understanding the difficulty of training deep feedforward neural networks,” in Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, 2010, pp. 249–256. [25] Lucas P Cinelli, Lucas A Thomaz, Allan F da Silva, Eduardo AB da Silva, and Sergio L Netto, “Foreground segmentation for anomaly detection in surveillance videos using deep residual networks,". IEEE conference templates contain guidance text for composing and formatting conference papers. Please ensure that all template text is removed from your conference paper prior to submission to the conference. Failure to remove template text from your paper may result in your paper not being published.
Download now