Submit Search
Upload
IRJET- Fire Detector using Deep Neural Network
•
0 likes
•
59 views
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i3/IRJET-V6I3451.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 2
Download now
Download to read offline
Recommended
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
IRJET Journal
Modelling of wireless sensor networks for detection land and forest fire hotspot
Modelling of wireless sensor networks for detection land and forest fire hotspot
TELKOMNIKA JOURNAL
F33022028
F33022028
IJERA Editor
Using wireless sensor networks for reliable forest fires
Using wireless sensor networks for reliable forest fires
Leila_maleke
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...
IRJET Journal
Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811
praveen369
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
IJECEIAES
Analysing secure image secret sharing schemes based on steganography
Analysing secure image secret sharing schemes based on steganography
IAEME Publication
Recommended
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
IRJET Journal
Modelling of wireless sensor networks for detection land and forest fire hotspot
Modelling of wireless sensor networks for detection land and forest fire hotspot
TELKOMNIKA JOURNAL
F33022028
F33022028
IJERA Editor
Using wireless sensor networks for reliable forest fires
Using wireless sensor networks for reliable forest fires
Leila_maleke
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...
IRJET Journal
Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811
praveen369
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
IJECEIAES
Analysing secure image secret sharing schemes based on steganography
Analysing secure image secret sharing schemes based on steganography
IAEME Publication
Visual Cryptography Industrial Training Report
Visual Cryptography Industrial Training Report
Mohit Kumar
A comparatively study on visual cryptography
A comparatively study on visual cryptography
eSAT Journals
E010412433
E010412433
IOSR Journals
Analysis and Implementation Wireless Sensor Network of Information Technology...
Analysis and Implementation Wireless Sensor Network of Information Technology...
IJERDJOURNAL
Secure data aggregation technique for wireless
Secure data aggregation technique for wireless
jpstudcorner
50120140505014
50120140505014
IAEME Publication
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
Eswar Publications
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...
LogicMindtech Nologies
Image secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with Steganography
2510stk
F010524057
F010524057
IOSR Journals
An ideal steganographic scheme in networks using
An ideal steganographic scheme in networks using
eSAT Publishing House
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
ijcseit
Ijarcet vol-2-issue-3-901-903
Ijarcet vol-2-issue-3-901-903
Editor IJARCET
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
IJERA Editor
An ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payload
eSAT Journals
Fx3610771081
Fx3610771081
IJERA Editor
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919
Editor IJARCET
Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...
prj_publication
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
Editor IJCATR
Data aggregation in wireless sensor network
Data aggregation in wireless sensor network
Shiwangi Thakur
Smart surveillance using deep learning
Smart surveillance using deep learning
International Journal of Reconfigurable and Embedded Systems
IRJET - An Robust and Dynamic Fire Detection Method using Convolutional N...
IRJET - An Robust and Dynamic Fire Detection Method using Convolutional N...
IRJET Journal
More Related Content
What's hot
Visual Cryptography Industrial Training Report
Visual Cryptography Industrial Training Report
Mohit Kumar
A comparatively study on visual cryptography
A comparatively study on visual cryptography
eSAT Journals
E010412433
E010412433
IOSR Journals
Analysis and Implementation Wireless Sensor Network of Information Technology...
Analysis and Implementation Wireless Sensor Network of Information Technology...
IJERDJOURNAL
Secure data aggregation technique for wireless
Secure data aggregation technique for wireless
jpstudcorner
50120140505014
50120140505014
IAEME Publication
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
Eswar Publications
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...
LogicMindtech Nologies
Image secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with Steganography
2510stk
F010524057
F010524057
IOSR Journals
An ideal steganographic scheme in networks using
An ideal steganographic scheme in networks using
eSAT Publishing House
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
ijcseit
Ijarcet vol-2-issue-3-901-903
Ijarcet vol-2-issue-3-901-903
Editor IJARCET
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
IJERA Editor
An ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payload
eSAT Journals
Fx3610771081
Fx3610771081
IJERA Editor
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919
Editor IJARCET
Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...
prj_publication
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
Editor IJCATR
Data aggregation in wireless sensor network
Data aggregation in wireless sensor network
Shiwangi Thakur
What's hot
(20)
Visual Cryptography Industrial Training Report
Visual Cryptography Industrial Training Report
A comparatively study on visual cryptography
A comparatively study on visual cryptography
E010412433
E010412433
Analysis and Implementation Wireless Sensor Network of Information Technology...
Analysis and Implementation Wireless Sensor Network of Information Technology...
Secure data aggregation technique for wireless
Secure data aggregation technique for wireless
50120140505014
50120140505014
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...
Image secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with Steganography
F010524057
F010524057
An ideal steganographic scheme in networks using
An ideal steganographic scheme in networks using
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
Ijarcet vol-2-issue-3-901-903
Ijarcet vol-2-issue-3-901-903
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
An ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payload
Fx3610771081
Fx3610771081
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919
Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
Data aggregation in wireless sensor network
Data aggregation in wireless sensor network
Similar to IRJET- Fire Detector using Deep Neural Network
Smart surveillance using deep learning
Smart surveillance using deep learning
International Journal of Reconfigurable and Embedded Systems
IRJET - An Robust and Dynamic Fire Detection Method using Convolutional N...
IRJET - An Robust and Dynamic Fire Detection Method using Convolutional N...
IRJET Journal
Forest Fire Detection Using Deep Learning and Image Recognition
Forest Fire Detection Using Deep Learning and Image Recognition
IRJET Journal
IRJET- Smart Traffic Control System using Yolo
IRJET- Smart Traffic Control System using Yolo
IRJET Journal
Machine learning based augmented reality for improved learning application th...
Machine learning based augmented reality for improved learning application th...
IJECEIAES
Desing on wireless intelligent seneor network on cloud computing system for s...
Desing on wireless intelligent seneor network on cloud computing system for s...
csandit
Object Detetcion using SSD-MobileNet
Object Detetcion using SSD-MobileNet
IRJET Journal
Convolutional Neural Network Based Real Time Object Detection Using YOLO V4
Convolutional Neural Network Based Real Time Object Detection Using YOLO V4
IRJET Journal
Backbone search for object detection for applications in intrusion warning sy...
Backbone search for object detection for applications in intrusion warning sy...
IAESIJAI
Improving AI surveillance using Edge Computing
Improving AI surveillance using Edge Computing
IRJET Journal
Devanagari Digit and Character Recognition Using Convolutional Neural Network
Devanagari Digit and Character Recognition Using Convolutional Neural Network
IRJET Journal
Artificial Intelligence based CCTV accident detection and nearby patrol alert...
Artificial Intelligence based CCTV accident detection and nearby patrol alert...
IRJET Journal
IRJET- Rice QA using Deep Learning
IRJET- Rice QA using Deep Learning
IRJET Journal
Object and Currency Detection for the Visually Impaired
Object and Currency Detection for the Visually Impaired
IRJET Journal
An Approach Towards Lossless Compression Through Artificial Neural Network Te...
An Approach Towards Lossless Compression Through Artificial Neural Network Te...
IJERA Editor
A Survey on Image Processing using CNN in Deep Learning
A Survey on Image Processing using CNN in Deep Learning
IRJET Journal
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET Journal
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET Journal
DEEP LEARNING BASED BRAIN STROKE DETECTION
DEEP LEARNING BASED BRAIN STROKE DETECTION
IRJET Journal
PADDY CROP DISEASE DETECTION USING SVM AND CNN ALGORITHM
PADDY CROP DISEASE DETECTION USING SVM AND CNN ALGORITHM
IRJET Journal
Similar to IRJET- Fire Detector using Deep Neural Network
(20)
Smart surveillance using deep learning
Smart surveillance using deep learning
IRJET - An Robust and Dynamic Fire Detection Method using Convolutional N...
IRJET - An Robust and Dynamic Fire Detection Method using Convolutional N...
Forest Fire Detection Using Deep Learning and Image Recognition
Forest Fire Detection Using Deep Learning and Image Recognition
IRJET- Smart Traffic Control System using Yolo
IRJET- Smart Traffic Control System using Yolo
Machine learning based augmented reality for improved learning application th...
Machine learning based augmented reality for improved learning application th...
Desing on wireless intelligent seneor network on cloud computing system for s...
Desing on wireless intelligent seneor network on cloud computing system for s...
Object Detetcion using SSD-MobileNet
Object Detetcion using SSD-MobileNet
Convolutional Neural Network Based Real Time Object Detection Using YOLO V4
Convolutional Neural Network Based Real Time Object Detection Using YOLO V4
Backbone search for object detection for applications in intrusion warning sy...
Backbone search for object detection for applications in intrusion warning sy...
Improving AI surveillance using Edge Computing
Improving AI surveillance using Edge Computing
Devanagari Digit and Character Recognition Using Convolutional Neural Network
Devanagari Digit and Character Recognition Using Convolutional Neural Network
Artificial Intelligence based CCTV accident detection and nearby patrol alert...
Artificial Intelligence based CCTV accident detection and nearby patrol alert...
IRJET- Rice QA using Deep Learning
IRJET- Rice QA using Deep Learning
Object and Currency Detection for the Visually Impaired
Object and Currency Detection for the Visually Impaired
An Approach Towards Lossless Compression Through Artificial Neural Network Te...
An Approach Towards Lossless Compression Through Artificial Neural Network Te...
A Survey on Image Processing using CNN in Deep Learning
A Survey on Image Processing using CNN in Deep Learning
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
DEEP LEARNING BASED BRAIN STROKE DETECTION
DEEP LEARNING BASED BRAIN STROKE DETECTION
PADDY CROP DISEASE DETECTION USING SVM AND CNN ALGORITHM
PADDY CROP DISEASE DETECTION USING SVM AND CNN ALGORITHM
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
jennyeacort
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZTE
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VICTOR MAESTRE RAMIREZ
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
RajaP95
power system scada applications and uses
power system scada applications and uses
DevarapalliHaritha
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
soniya singh
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
Recently uploaded
(20)
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
power system scada applications and uses
power system scada applications and uses
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Internship report on mechanical engineering
Internship report on mechanical engineering
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
IRJET- Fire Detector using Deep Neural Network
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2333 Fire Detector using Deep Neural Network Prof. Ramya RamPrasad1, Karthika.S2, Susmitha. S3, Swathi. K4 1,2,3,4Department of Information Technology, Anand Institute of Higher Technology, Kazhipattur, Chennai. ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In the epoch of Artificial Intelligence, the recent advance in technology has enabled the Image based system to detect fire during surveillance using Deep neural Network. A cost effective DNN architecture for fire detection offers a better solution. The concept was done by a result which was influenced from Squeeze Net Architecture. When compared to Alex Net which is computationally expensive, Squeeze Net is considered based upon the computation and also it could be appropriate for any intended problems. In addition, closed circuit television (CCTV) surveillance systems are currently installed in various public places monitoring indoors and outdoors applications which may gain an early fire detection capability with the use of fire detection. This fire detection is implemented by using software processing on the outputs of CCTV cameras in real time. Then, camera is kept under surveillance that periodically records the motion of activities that happens daily. If any fire accident occurs, it immediately captures and compares with the trained data set. If the compared image is true it sends a fire alert message to the fire station. Index terms: Deep neural network (DNN), fire detection, video analysis of CCTV. Key Words: Fire detection, DNN, Squeeze Net, Fire image. 1. INTRODUCTION A deep neural network (DNN) which is an artificial neural network (ANN) with multiple layers between the input and output layers. The deep neural network finds the correct numerical maneuvering to turn the input into the output, whether it be a linear relationship or a non-linear relationship. The network navigates through the layers calculating the probability of each output. The goal of this paper is that it aims eventually; the network will be trained to decompose an image into features, identify trends that exist across all samples and classify these new images by their similarities of these output images without requiring human input. DNNs can model complex non- linear relationships. DNN architectures produce compositional models for the object is expressed as a layered composition of primitives. Deep architectures include many such similar variants of a few basic approaches. Each architecture has found success in specific domains. The "deep" in "deep learning" refers to the number of layers through which the data is transformed. More precisely, deep learning systems have a substantial credit assignment path(CAP) depth. The CAP is the chain of distinct changes from input to output. CAPs describe potentially causal connections between input and output. DNNs are typically feed forward networks where the data flows from the input layer towards the output layer without looping backward. At first, the DNN creates a map of virtual neurons and assigns random numerical values, or "weights", to connections between them. The weights and inputs are multiplied. It is then made to return an output between 0 and 1. If the network didn’t accurately recognize a particular pattern, an algorithm would adjust the weights. This way the algorithm is used to make certain parameters more influential until it determines the correct mathematical manipulation to fully process the data. 2. SQUEEZE NET Squeeze Net to create smaller neural network with fewer parameter that can more easily fit into computer memory and can more easily be transmitted. The network was made smaller by replacing 3*3 filters as also reduced down sampling of the layers when happening at the higher level providing large activation maps. Squeeze Net can compress upto 5MB of parameter whereas the AlexNet can compress 540MB. Fig 1:Squeeze Net 3. PROPOSED MODEL The project analyses the fire images from a camera which is under surveillance periodically using the Deep Neural Network (DNN).A closed-circuit television (CCTV) surveillance systems are currently installed in various public places monitoring indoors and outdoors applications which may gain an early fire detection capability with the use of fire detection. This fire detection is done by using software processing the outputs of CCTV cameras in real time. Then, camera is kept under
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2334 surveillance that regularly records the motion of activities that happens daily. If any fire accident occurs, it immediately captures and compares with the trained data set. If the compared image is true it sends a fire alert message to the fire station. The advantage of this method is that it could produce the images continuously and also sends an alert message to the fire station. 4. SYSTEM ARCHITECTURE Fig.2: System Architecture In system architecture, the input data is the surveillance video then the images in the video is splitted into frame by frame. Then the DNN’s Squeeze Net algorithm performs the pre-processing technique, then splits the dataset which is trained already and at last build the DNN. Then after detecting the fire it sends an alert message and it alerts the fire station. 5. METHODOLOGY 5.1 DATASET CREATION: To Collect images of fire and non-fire images and train both the fire and non-fire images separately. Now there created a trained dataset with well determined fire images which compares with the video sequence. FRAME BY FRAME DETECTION The captured images are splitted into frame by frame and the frame is again splitted into pixels with the help of the SqueezeNet algorithm from the surveillance WORK OF DNN As the Deep neural network can perform complex calculations , we use DNN’s Squeeze Net to get accurate images of fire from the surveillance video .The Squeeze Net can compress the images upto 5mb from the original size of the image .So this reduces the consumption of less memory and the rate of accuracy is higher when compared to other algorithms. 6. CONCLUSION Thus, this model proposes if any fire accident occurs, it immediately captures and compares with the trained data set. If the compared image is true it sends a fire alert message to the fire station. The alert message is sent immediately to the fire station and the accidents could be reduced. The future of our project is to develop an application which helps common people in an emergency situation. This app first will have a simple page which directs us to the camera and helps in video capturing. Then when the fire is detected it will ask us to choose the options like the fire station, police station and hospital. Once chosen it will automatically call the emergency number which is already fed. REFERENCES [1]. ‘Convolutional Neural Networks Based Fire Detection in Surveillance Videos’ KHAN MUHAMMAD 1, JAMIL AHMAD1, IRFAN MEHMOOD 2, SEUNGMIN RHO 3, AND SUNG WOOK BAIK1 , Received January 30,2018,accepted march 3,2018,date of publication march 6,2018,dare of current version april 23,2018. [2]. ‘Image Processing Based Fire Detection System using Raspberry Pi System’ – by R.Dhanujalakshmi, B.Divya@sandhivya, A.Robertsingh SSRG International journal of computer Science and Engineering – (JCSE)- Volume 4 Issued4 April 2017. [3]. ‘Fire Detection Algorithm Using image Processing Techniques’ – by Poobalan, K. and Liew, S-C. (2015) ‘Fire detection algorithm using image processing techniques’, Paper presented at the Proceeding of the 3rd International Conference on Artificial Intelligence and Computer Science(AICS2015), Penang, Malaysia. [4]. ‘Fire Detection by using Digital Image Processing technique’ – by Mahadev A. Bandi1,Dr. Mrs. V. V. Patil2 (2015) ‘Advance algorithm for fire detection using image processing and recognition’, IOSR Journal of Electronics and Communication Engineering (IOSR-JECE), pp.09– 14. [5]. ‘Fire Detection And Alert System Using Image Processing ‘- by Vijayalaxmi, B.Shravani,G.Srees Ram,..Global Journal of Advanced Engineering Technologies. [6]. ‘Flame Detection using Image Processing Techniques’ – by Punam Patel, S. T. (2012). Flame Detection using Image Processing Techniques. International Journal of Computer Applications (0975 – 8887) Volume 58, 18-24.
Download now