SlideShare a Scribd company logo
NoxEye: An AI based threat detector for
Intelligence Surveillance and Alert System
Objective
• The main objective of this project is to provide crime detection and
proactive alerts using edge-and fog-integrated approaches.
• To provide intelligent applications with AI.
• Provides an alert by sending the crime data instantly to the police or
protective service, and thus, it ensures a quick response.
Abstract
• Nowadays, theft has become a major issue to be dealt with.
• It is not possible for a human to monitor for several hours continuously.
• To overcome the complication in thefts, surveillance cameras are used.
• The main ability of surveillance camera is to just record the act of theft from
which only the knowledge of the intruders will be gained.
• This project presents NoxEye, a lightweight AI-powered threat detector for
intelligent surveillance cameras, which can be deployed on-site at the edge.
Existing System
• Framing and Blob recognition (FBD) for Input video preparing and (HON)
Human tracking.
• HOG is in charge of pulling back shape data of question in picture utilizing
force angles and edge headings.
• General purpose computing on graphics processing units (GPGPU) that is
appropriate for use in human stance estimation, and accomplishes constant
execution. A diminishing calculation iteratively expels limit voxels from a
question create a topologically identical skeleton.
• K-nearest neighbor is a strategy for grouping objects in view of
nearest preparing cases in the component space.
• Scale Invariant Feature Transform (SIFT) has been turned out to be the
most powerful nearby invariant element descriptor.
• SVM kernel functions based classifiers to distinguish the malicious
nodes from benign ones via evaluating the variance in their Driving
Pattern Matrices (DPMs).
Disadvantages
• The project or system was unable to detect motion in case of moving
camera.
• The risk of outliers and ghost points, reduces the performance of the
motion detection system.
• Target harden to find
• Reduce provocation
• IoT-cloud architecture has issues regarding bandwidth, energy, and
latency in real-time video surveillance applications.
• Delayed multimedia IoT tasks.
Proposed System
• This paper presented the design and implementation of Nox-Eye, an
AI-enabled threat detector for realtime video surveillance.
• With the help of AI, each fog node can detect and identify a possible
crime event and crime object by processing the motion-captured
images sent by an edge node.
• FRCNN model running at a fog node detects and labels the images
with the name of the crime objects having the highest probability, and
saves those images.
Advantages
• The proposed system is far more efficient even without the video
compression algorithm.
• Proved the superiority of our proposed system in terms of agility,
scalability, energy, and CPU and memory usage.
• Efficient crime predictive system
• Real-time crime event detection, ensuring resource efficiency and
good distribution of the processing load in an IoT-based video
surveillance system.
System Architecture
Crime Data
Set
Robbery Data Set acquisition
Preprocessing
Action Detection
Feature Extraction
Classified Result
Matching
Police Station
Crime
Database
Server
Classification
Classified Result
Live Crime
Modules Split Up
1. NoxEye Control Panel
2. Threat Detector Learning Phase
2.1. Suspicious Video Annotation
2.2. Frame Extraction
2.3. Preprocessing
2.4. RNN Object Detection
2.5. Feature Extraction
2.6. FRCNN Classification
3. Threat Detector unit
3.1. Live Video Annotation
3.2. Threat Detection
4. Custom Notification
5. Performance Analysis
Algorithms/Techniques
• Faster Region Convolutional Neural Network
Expected Outcome
• High prediction accuracy and response time.
• System would create a better opportunity for security personnel to
detect various types of weapons in real-time.
• Prevent a potential crime.
• A user-friendly interface was developed on top of both models to
allow users to interact with the system conveniently at the camera and
cloud sides.
• Motion detection module that can detect moving objects in
surveillance videos in realtime.
References
1. G. F. Shidik, E. Noersasongko, A. Nugraha, P. N. Andono, J. Jumanto, and E. J. and Kusuma,
``A systematic review of intelligence video surveillance: Trends, techniques, frameworks, and
datasets,'' IEEE Access, vol. 7, pp. 457-473, 2019.
2. J. Lim, M. I. Al Jobayer, V. M. Baskaran, J. M. Lim, K. Wong, and J. See, ``Gun detection in
surveillance videos using deep neural networks,‘’ in Proc. Asia Pacific Signal Inf. Process.
Assoc. Annu. Summit Conf. (APSIPAASC), Nov. 2019, pp. 1998-2002.
3. Y.-X. Liu, Y. Yang, A. Shi, P. Jigang, and L. Haowei, ``Intelligent monitoring of indoor
surveillance video based on deep learning,'' in Proc. 21st Int. Conf. Adv. Commun. Technol.
(ICACT), Feb. 2019, pp. 648-653.
4. S. Ren, K. He, R. Girshick, and J. Sun, ``Faster R-CNN: Towards realtime object detection with
region proposal networks,'' IEEE Trans. Pattern Anal. Mach. Intell., vol. 39, no. 6, pp. 1137-
1149, Jun. 2017.

More Related Content

Similar to NoxEye.pptx

Object Detetcion using SSD-MobileNet
Object Detetcion using SSD-MobileNetObject Detetcion using SSD-MobileNet
Object Detetcion using SSD-MobileNet
IRJET Journal
 
IRJET - Automatic Gun Control using Motion Detection System
IRJET - Automatic Gun Control using Motion Detection SystemIRJET - Automatic Gun Control using Motion Detection System
IRJET - Automatic Gun Control using Motion Detection System
IRJET Journal
 
Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...
Venkat Projects
 
Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...
Venkat Projects
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
IRJET Journal
 
A Review on Motion Detection Techniques
A Review on Motion Detection TechniquesA Review on Motion Detection Techniques
A Review on Motion Detection Techniques
ijtsrd
 
slide-171212080528.pptx
slide-171212080528.pptxslide-171212080528.pptx
slide-171212080528.pptx
SharanrajK22MMT1003
 
Object Detection and Localization for Visually Impaired People using CNN
Object Detection and Localization for Visually Impaired People using CNNObject Detection and Localization for Visually Impaired People using CNN
Object Detection and Localization for Visually Impaired People using CNN
IRJET Journal
 
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET Journal
 
Presentation for min project
Presentation for min projectPresentation for min project
Presentation for min project
araya kiros
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert Management
IRJET Journal
 
ASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOTASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOT
IRJET Journal
 
Motion based security alarm
Motion based security alarmMotion based security alarm
Motion based security alarm
Akshay Surve
 
Real Time Object Dectection using machine learning
Real Time Object Dectection using machine learningReal Time Object Dectection using machine learning
Real Time Object Dectection using machine learning
pratik pratyay
 
A Deep Learning algorithm for automatic detection of unexpected accidents und...
A Deep Learning algorithm for automatic detection of unexpected accidents und...A Deep Learning algorithm for automatic detection of unexpected accidents und...
A Deep Learning algorithm for automatic detection of unexpected accidents und...
19520SaiSree
 
Forest PPT New.pptxsaftery of projecttog
Forest PPT New.pptxsaftery of projecttogForest PPT New.pptxsaftery of projecttog
Forest PPT New.pptxsaftery of projecttog
DhanuDhanu42
 
Surveillance using Video Analytics
Surveillance using Video AnalyticsSurveillance using Video Analytics
Surveillance using Video Analytics
idescitation
 
GUARDIAN:AI Supervision Patrol Drone For Defence And FederalSector
GUARDIAN:AI Supervision Patrol Drone For Defence And FederalSectorGUARDIAN:AI Supervision Patrol Drone For Defence And FederalSector
GUARDIAN:AI Supervision Patrol Drone For Defence And FederalSector
IRJET Journal
 

Similar to NoxEye.pptx (20)

Object Detetcion using SSD-MobileNet
Object Detetcion using SSD-MobileNetObject Detetcion using SSD-MobileNet
Object Detetcion using SSD-MobileNet
 
IRJET - Automatic Gun Control using Motion Detection System
IRJET - Automatic Gun Control using Motion Detection SystemIRJET - Automatic Gun Control using Motion Detection System
IRJET - Automatic Gun Control using Motion Detection System
 
Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...
 
Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
 
A Review on Motion Detection Techniques
A Review on Motion Detection TechniquesA Review on Motion Detection Techniques
A Review on Motion Detection Techniques
 
slide-171212080528.pptx
slide-171212080528.pptxslide-171212080528.pptx
slide-171212080528.pptx
 
Object Detection and Localization for Visually Impaired People using CNN
Object Detection and Localization for Visually Impaired People using CNNObject Detection and Localization for Visually Impaired People using CNN
Object Detection and Localization for Visually Impaired People using CNN
 
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
 
Presentation for min project
Presentation for min projectPresentation for min project
Presentation for min project
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert Management
 
ASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOTASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOT
 
Motion based security alarm
Motion based security alarmMotion based security alarm
Motion based security alarm
 
Real Time Object Dectection using machine learning
Real Time Object Dectection using machine learningReal Time Object Dectection using machine learning
Real Time Object Dectection using machine learning
 
A Deep Learning algorithm for automatic detection of unexpected accidents und...
A Deep Learning algorithm for automatic detection of unexpected accidents und...A Deep Learning algorithm for automatic detection of unexpected accidents und...
A Deep Learning algorithm for automatic detection of unexpected accidents und...
 
Forest PPT New.pptxsaftery of projecttog
Forest PPT New.pptxsaftery of projecttogForest PPT New.pptxsaftery of projecttog
Forest PPT New.pptxsaftery of projecttog
 
Surveillance using Video Analytics
Surveillance using Video AnalyticsSurveillance using Video Analytics
Surveillance using Video Analytics
 
GUARDIAN:AI Supervision Patrol Drone For Defence And FederalSector
GUARDIAN:AI Supervision Patrol Drone For Defence And FederalSectorGUARDIAN:AI Supervision Patrol Drone For Defence And FederalSector
GUARDIAN:AI Supervision Patrol Drone For Defence And FederalSector
 
smarthome
smarthomesmarthome
smarthome
 

Recently uploaded

Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...
Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...
Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...
CIOWomenMagazine
 
Senior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdfSenior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdf
Jim Smith
 
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
juniourjohnstone
 
Founder-Game Director Workshop (Session 1)
Founder-Game Director  Workshop (Session 1)Founder-Game Director  Workshop (Session 1)
Founder-Game Director Workshop (Session 1)
Amir H. Fassihi
 
Training- integrated management system (iso)
Training- integrated management system (iso)Training- integrated management system (iso)
Training- integrated management system (iso)
akaash13
 
TCS AI for Business Study – Key Findings
TCS AI for Business Study – Key FindingsTCS AI for Business Study – Key Findings
TCS AI for Business Study – Key Findings
Tata Consultancy Services
 
W.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest ExperienceW.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest Experience
William (Bill) H. Bender, FCSI
 
Case Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of ManagementCase Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of Management
A. F. M. Rubayat-Ul Jannat
 
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
gcljeuzdu
 
Leadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact PlanLeadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact Plan
Muhammad Adil Jamil
 

Recently uploaded (10)

Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...
Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...
Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...
 
Senior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdfSenior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdf
 
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
 
Founder-Game Director Workshop (Session 1)
Founder-Game Director  Workshop (Session 1)Founder-Game Director  Workshop (Session 1)
Founder-Game Director Workshop (Session 1)
 
Training- integrated management system (iso)
Training- integrated management system (iso)Training- integrated management system (iso)
Training- integrated management system (iso)
 
TCS AI for Business Study – Key Findings
TCS AI for Business Study – Key FindingsTCS AI for Business Study – Key Findings
TCS AI for Business Study – Key Findings
 
W.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest ExperienceW.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest Experience
 
Case Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of ManagementCase Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of Management
 
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
 
Leadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact PlanLeadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact Plan
 

NoxEye.pptx

  • 1.
  • 2. NoxEye: An AI based threat detector for Intelligence Surveillance and Alert System
  • 3. Objective • The main objective of this project is to provide crime detection and proactive alerts using edge-and fog-integrated approaches. • To provide intelligent applications with AI. • Provides an alert by sending the crime data instantly to the police or protective service, and thus, it ensures a quick response.
  • 4. Abstract • Nowadays, theft has become a major issue to be dealt with. • It is not possible for a human to monitor for several hours continuously. • To overcome the complication in thefts, surveillance cameras are used. • The main ability of surveillance camera is to just record the act of theft from which only the knowledge of the intruders will be gained. • This project presents NoxEye, a lightweight AI-powered threat detector for intelligent surveillance cameras, which can be deployed on-site at the edge.
  • 5. Existing System • Framing and Blob recognition (FBD) for Input video preparing and (HON) Human tracking. • HOG is in charge of pulling back shape data of question in picture utilizing force angles and edge headings. • General purpose computing on graphics processing units (GPGPU) that is appropriate for use in human stance estimation, and accomplishes constant execution. A diminishing calculation iteratively expels limit voxels from a question create a topologically identical skeleton.
  • 6. • K-nearest neighbor is a strategy for grouping objects in view of nearest preparing cases in the component space. • Scale Invariant Feature Transform (SIFT) has been turned out to be the most powerful nearby invariant element descriptor. • SVM kernel functions based classifiers to distinguish the malicious nodes from benign ones via evaluating the variance in their Driving Pattern Matrices (DPMs).
  • 7. Disadvantages • The project or system was unable to detect motion in case of moving camera. • The risk of outliers and ghost points, reduces the performance of the motion detection system. • Target harden to find • Reduce provocation • IoT-cloud architecture has issues regarding bandwidth, energy, and latency in real-time video surveillance applications. • Delayed multimedia IoT tasks.
  • 8. Proposed System • This paper presented the design and implementation of Nox-Eye, an AI-enabled threat detector for realtime video surveillance. • With the help of AI, each fog node can detect and identify a possible crime event and crime object by processing the motion-captured images sent by an edge node. • FRCNN model running at a fog node detects and labels the images with the name of the crime objects having the highest probability, and saves those images.
  • 9. Advantages • The proposed system is far more efficient even without the video compression algorithm. • Proved the superiority of our proposed system in terms of agility, scalability, energy, and CPU and memory usage. • Efficient crime predictive system • Real-time crime event detection, ensuring resource efficiency and good distribution of the processing load in an IoT-based video surveillance system.
  • 10. System Architecture Crime Data Set Robbery Data Set acquisition Preprocessing Action Detection Feature Extraction Classified Result Matching Police Station Crime Database Server Classification Classified Result Live Crime
  • 11. Modules Split Up 1. NoxEye Control Panel 2. Threat Detector Learning Phase 2.1. Suspicious Video Annotation 2.2. Frame Extraction 2.3. Preprocessing 2.4. RNN Object Detection 2.5. Feature Extraction 2.6. FRCNN Classification 3. Threat Detector unit 3.1. Live Video Annotation 3.2. Threat Detection 4. Custom Notification 5. Performance Analysis
  • 12. Algorithms/Techniques • Faster Region Convolutional Neural Network
  • 13. Expected Outcome • High prediction accuracy and response time. • System would create a better opportunity for security personnel to detect various types of weapons in real-time. • Prevent a potential crime. • A user-friendly interface was developed on top of both models to allow users to interact with the system conveniently at the camera and cloud sides. • Motion detection module that can detect moving objects in surveillance videos in realtime.
  • 14. References 1. G. F. Shidik, E. Noersasongko, A. Nugraha, P. N. Andono, J. Jumanto, and E. J. and Kusuma, ``A systematic review of intelligence video surveillance: Trends, techniques, frameworks, and datasets,'' IEEE Access, vol. 7, pp. 457-473, 2019. 2. J. Lim, M. I. Al Jobayer, V. M. Baskaran, J. M. Lim, K. Wong, and J. See, ``Gun detection in surveillance videos using deep neural networks,‘’ in Proc. Asia Pacific Signal Inf. Process. Assoc. Annu. Summit Conf. (APSIPAASC), Nov. 2019, pp. 1998-2002. 3. Y.-X. Liu, Y. Yang, A. Shi, P. Jigang, and L. Haowei, ``Intelligent monitoring of indoor surveillance video based on deep learning,'' in Proc. 21st Int. Conf. Adv. Commun. Technol. (ICACT), Feb. 2019, pp. 648-653. 4. S. Ren, K. He, R. Girshick, and J. Sun, ``Faster R-CNN: Towards realtime object detection with region proposal networks,'' IEEE Trans. Pattern Anal. Mach. Intell., vol. 39, no. 6, pp. 1137- 1149, Jun. 2017.