SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1231
i-SURVEILLANCE
CRIME MONITORING AND PREVENTION USING NEURAL NETWORKS
Malavika Nair1, Mathew Gillroy2, Neethu Jose3, Jasmy Davies4
1,2,3 B. Tech student, Department of Computer Science and Engineering, SCET, Kerala, India
4Assistant Professor, Department of Computer Science and Engineering, SCET, Kerala, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Closed Circuit Television Systems (CCTV) are
becoming more and more popular and are being deployed in
many housing estates, offices, and also in most public spaces.
CCTV monitoring systems have been implemented in many
American and European cities. As the number of cameraviews
a single CCTV operator can handle is limited byhumanfactors,
such monitoring systems makes for an enormous load for the
CCTV operators. Here, in this project named i–Surveillance or
Intelligent Surveillance System, we propose algorithms that
are able to alert the human operator when: (1) Presence of a
dangerous act, after setting zones of interestanddangerzones
within those zones of interest,, the danger is detected when an
object trespasses the danger zone, which can reduce the
number of accidents in factories and suicides in certainplaces,
(2) An abnormal behavior of a person such as handling some
weapons or act of abuse or molestation is detected, which
might be a potential threat. In this project, in order to allow
for a real life application of the system, we focus on limiting
the number of false alarms.
Key Words: Behavioral Analysis, Security, Machine
Learning, Image Processing, Neural Networks.
1. INTRODUCTION
In recent years, we’ve seen that there has been amarkedand
sustained growth in the use of Closed Circuit Television
(CCTV) surveillance cameras in order to prevent crimes in
public places in the USA and other Western nations. Amidst
the associated public expenditure and the expansion,aswell
as concerns about their social costs and efficacy, there is an
increasing need for an evidence-based approach to inform
CCTV practices and policies. Cases of harassment in work
places are also becoming very serious. With the ever
growing installation of advancedCCTVinfrastructure,almost
entire cities can now be monitored, through the major
purpose served by the same is purely evidential. It would
only be natural to expect an alert or warning system for
ongoing (or about to happen) mishaps and crimes, where
timely action can be the difference between life and death.
Such scenarios are expected to be monitored and identified
by personnel viewing live footage. But as the number of
CCTVsper unit are keeping rising, this approachisbecoming
increasingly impractical. Thus what we require is a
surveillance unit capable of thriving in these situations with
negligible human input.
We shall define a "situation of interest" or a “critical
situation” as any sensitive situation that could possibly lead
to the afore-mentioned predicaments. Consider the idea ofa
smart surveillance which would be triggered ‘active’ only
when the statistical chances of the situation being of
"interest" are high. In office environments each room being
independently monitored can respond to such a trigger by
enabling the recording. At all other times the CCTV is not
recording which helps in maintaining privacy and, if
required, confidentiality of work. Cutting edge research and
development leads to cut-throat competition and one can
easily realize why traditional surveillance techniques might
prove risky. The video feed would be recorded only under a
"situation of interest" in case it needsto be documentedfora
legal investigation. In the response to the above trigger
could be an alert to be issued to the appropriate authorities
along with certain alarms which could help inpreventingthe
situation from escalating further. So, this validates the
requirement for a system which could provide smart
surveillance, while ensuring privacy and confidentiality.
The surveillance camera activated for recording only when
there is a situation of interest. The camera is inactive or it is
not recording the video when there is no human presence.
The human presence is checked using motion detection
algorithm. When a crime is about to be committed, then the
human is notified and an alarm system connected to the
main system will be activated.
2. EXISTING SYSTEM
The existing system of CCTV monitoring is done by humans
and also the automated smart CCTV monitoringsystemsare
not fully capable of making decisions and triggering actions.
Surveillance in dynamic scenesattempts to recognize,detect
and track certain objects from image sequences, and more
generally to understand object behaviors. The objectiveisto
develop an intelligent visual surveillance system for
replacing the traditional passive video surveillance system,
since the traditional passive video surveillance system
proves ineffective as the number of cameras exceeds the
capability of human operators to observe them. In addition
to placing cameras in the place of human eyes, the goal of
visual surveillance is to accomplish, as automatically as
possible, the surveillance task.
Visual surveillance in dynamic scenes has a wide range of
potential applications, such as a security guard for
communitiesand important buildings, traffic surveillancein
cities expressways, detection of military target objects, etc.
We focus in this paper on applications involving the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1232
surveillance of people, vehicles, as they are typical of
surveillance applications and include the full range of
surveillance methods. Surveillance applications which
involve people or vehicles include the following.
a) Access control in special areas : Only those people with a
special identity are allowed to enter in some security-
sensitive locations such as important governmental offices
and military bases. A biometric feature database including
legal visiting members is built beforehand using biometric
techniques. When someone is about to enter to thissecurity-
sensitive location, the system automatically obtains the
visitor’sfeatures, such astheir facial appearance, heightand
walking gait from those images taken in real time situation.
Based on this, the system is able to decide whether the
visitor can be cleared for entry.
b) Person-specific identification in certain scenes : The
police can catch suspects with the help of personal
identification at a distance by a smart surveillance system.
The cops may build a database containing the biometric
feature of suspects, and they may place visual surveillance
systems at those places where the suspects are usually seen,
such as subway stations, casinos, etc. The systemsareableto
automatically recognize whether or not the people in view
are suspects. If yes, then the alarms will be given
immediately. Even though such systems with face
recognition have already been used at public sites, their
reliability is too low for police requirements.
c) Crowd flux statistics and congestion analysis : The flux of
people at important public areas such as stores, can be
automatically computed by the surveillance systems, using
techniques for human detection. It can then provide
congestion analysis to assist in the management of the
people. Similarly, expressways and junctionsoftheroadscan
be monitored through visual surveillance systems, and
further analyze the status of road congestion and traffic.
d) Anomaly detection and alarming : At certain times, it is
necessary to analyze the behaviors or characteristics of
vehicles and people and to determine whether these
characteristics are normal or abnormal. For example,
abnormal behaviors indicative of theft,canbeanalyzedusing
the visual surveillance systems, which can be placed in
supermarkets and parking lots. Normally, there are many
ways of giving an alarm. One of the ways is to make a
recorded announcement automatically, whenever any
abnormal behavior is detected. Another methodistocontact
the police automatically.
Fig-1 : Proposed System
The image of a person being captured, tying him to a
particular place, or the vehicle number plate being
registered on footage are probably the most obvious and
perhapswidespread cause of lossof privacy. Asthenumbers
of CCTV cameras are increasing, the likelihood of the above
happening is sure to increase.
Drawbacks
 The system is used only on the army borders, but
not into public places such as metro stations, big
malls, etc.
 It is a complex mechanism. Individual safety level is
not considered.
 Video is captured continuously, which can lead to
privacy issues.
 The system used also doesn’t have an efficient
alarm system that triggers automatically on an
event of abuse, harassment or bullying.
Lack of privacy as the image of victim is not blurred.
3. SYSTEM DESIGN
In this paper, we use classification method for analyzing the
video and to detect anomalies. A Graphical User Interface
(GUI) is implemented for the automatic video surveillance.
Here, when the login screen appears, the user can login to
the application with the registered username and password.
If the user credentialsare found to be correct,theapplication
will show the options BROWSE and VIEW. Here, theusercan
either provide a live webcam feed or choose a video by
browsing the folders, and providing the correct path.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1233
The fed video is then converted into frames, and it is
analyzed for checking abnormalities. We firstcheckwhether
there are some human actions present in the frames. This
checking is done with the help of the trained models. These
trained models are compared with the actions presentinthe
frame, in order to detect human presence in that frame. For
this purpose of training, we require a dataset containing a
set of images, and the dataset used here is HMDB51 (Human
Motion Database 51). Next, we annotate theseframesusinga
toollabelImg. Since there are quite a large number of videos,
all these videos can be annotated only if it is converted into
frames. This is done using a program, and the code iswritten
in OpenCV using Python. Then, after saving all the frames as
xml files, the train and test directories are separated. The
usual procedure for separating train and testdirectoriesisas
follows :
 90% of the total xmls comprises the train directory
 10% of the total xmls comprises the test directory
The training data is used for creating the model, and while
the training data is being trained, each model from the test
directory is taken and tested with each model of the test
directory. From this we can get the percentage loss in
accuracy. At a particular point when the loss percentage
graph becomes steady, the training may be stopped.
Finally, the abnormality and itsaccuracy will be determined
and shown as the output.
4. PROPOSED SYSTEM
The proposed system deals with the current trend of
security system i.e. inclusion of privacy concern, cost
effectiveness, efficient alarm system. Conditional video
recording is the major inclusion. At all timesthecameraison
but not recording. It would keep on processing the frames it
receives and would not capture it unless ‘triggered’.
Activation of subroutines is done only when multiple
personnel are detected. These subroutines involve image
processing in conjunction to detect critical instances. Once
enough baseline deviation is flagged, the situation ismarked
as critical and recording is activated. The ideology is as
follows:
1) In case the person is not alone, we activate the camerabut
any documentations, notes, scribbling on a board or screens
(which are to be considered confidential at all times)shallbe
blanked out/blurred to avoid any leaks (any simple
irreversible technique could be used).
2) Once it has been established that the person is not alone,
we refine our analysis to identifying the number of people,
their gender and other characteristics. We make use of
human detection, gesture recognition and motion detection,
and emotion detection.
3) Voice, just as video, is not to be recorded unless we
discover a situation of interest.
In public places privacy is no longer a pressing matter. So
the subroutinesfor tracking and humandetectionarealways
in operation in a conditional focus mode. By conditional
focus we mean that we run only a preliminary test for
critical situations. Once that is flagged, do we bring in our
heavier classifiers involving both Video and Audio
processing. This ensures a smoother real time operation.
The approach, therefore, is to wait for a trigger to a critical
situation and then to take the required action. It is worth
mentioning that the classification boundary in this case
should be a bit less stringent than the one above, the reason
being that this system is not entirely self-sufficient and
hence relieson human input. Thus, it would onlymakesense
to slack the constraints so that even if false alarms are
increased, the probability of a crime going unnoticed is
considerably suppressed. The preliminary indicators for
instance can be: rapid and jerky movements (in addition to
“excited” audio signature) between individualscloserthana
particular safeproximity. Once triggered recording initiates
plusan alert signal is issued either directly to the authorities
or a decision making moderator.
There is not a lot of research on quantification of a strong
theoretical framework for basing emotiondetectionthrough
Image processing algorithms. Associative neural networks
like CALM incorporate interpretation of human emotions
through gestural cues. It is possible with higher resolution
cameras to include facial expression analysis systems to
categorize the physical expression of emotions, such as
Facial Action Coding System (FACS).
5. METHODOLOGY
The objective of our project is to design and implement a
system to prevent crime and suicides by tracking human
behavior through the analysis of video captured usingCCTV.
The proposed system has multiple functionalities including
preventing suicides, abnormal behavior and even attempts
of abuse.
The various modules of our project are as follows :
5.1 Video Capture CCTV
Closed Circuit Television (CCTV) is used to monitor the
scene. Video is not recorded until it is necessary i.e. video is
recorded only when the person is not alone and when there
are sudden movementsor actions. Closed Circuit Television,
also known as video surveillance refers to the use of a CCTV
or a video camera for transmitting a signal to a certain
specified place on a limited set of monitors. CCTVschemesin
public settings had small and non-statistically
significant effects on crime: 7% reduction in city and town
centers and 23% reduction in public transport settings.
5.2 Frame Capturing
Videos are a continuous flow of frames or still images. Each
frame is captured and processed to check for motion in the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1234
scene. Motion in the scene means there’s some human
activity in the scene. Human activity is confirmed by
checking for faces or body patterns. A continuous video has
thousands of frames. In order to save storage space, onlythe
last 20 frames are kept for reference. Old framesget deleted
when new ones arrive.
5.3 Motion Detection
Motion in the scene is detected by analyzing the frames
captured. This can be achieved by a technique called
background subtraction wherein still objects in the scenes
are eliminated by analyzing the position of each objectinthe
stored frames. If the position of object is changed, the object
is flagged to be a moving object. To ensure that it is a human,
face patterns or body patterns are matched with saved
shapes.
5.4 Frame Analysis
For video analysis we base our processing on a standard
multiple moving objects tracking algorithm. Theapproachis
to use a background subtraction based on Gaussian mixture
models to segment out the moving objects. After the
foreground is de-noised, blob detection is run and the
connected pixels are bounded in a box which istobetracked.
The motion tracking is achieved by a Kalman filter. After
observing the object for a set number of frames, the Kalman
Filter then estimates the position of the object insubsequent
frames (all the while observing the actual motion that
happens and recording the errors for use in future pre
dictions). Then behavior of moving character is analyzed
using behavioral analysis algorithm to check for any act of
abuse, bullying or harassment.
5.5 TensorFlow
TensorFlow is basically an open source software librarythat
is used for numerical computation using data flow graphs.
Each node in the data flow graph represents certain
mathematical operations, and the edges of the graph
represent the multidimensional data arrays, commonly
known as tensors, communicated between them.
TensorFlow Object Detection API : One ofthecorechallenges
in computer vision is to create accurate machine learning
models, which are capable of identifying and localizing
multiple objects in a single image. It is an open source
framework built on top of TensorFlow that makes it easy to
deploy, train and construct object detection models.
5.5 HMDB51
HMDB refers to Human Motion Database. There areatotalof
6847 video clips in this dataset, and these clips are divided
into certain action categories, 51 in number.Eachofthese51
action categories contain a minimum of 101 video clips,
which is extracted from a range of sources. Theseactionscan
be categorized as follows :
1. General facial actions : laugh, talk, smile, chew.
2. Facial actions with object manipulation : drink,
smoke, eat.
3. General body movements : clapping hands, pull up,
climb stairs, fall on the floor, jump, push up, run, sit
down, dive, sit up, somersault, stand up, backhand
flip, turn, walk, wave.
4. Body movements with object interaction : brush
hair, catch, hit something, kick ball, pick, push
something, ride bike, golf, ride horse, shoot ball,
shoot gun, draw sword, sword exercise, throw.
5. Body movements for human interaction : hug, kiss,
fencing, punch, kick someone, shake hands, sword
fight.
There is no pre-processing done on the video clips.
A three - level grading of video quality is applied to evaluate
the huge set of clips. Only those video samples are rated
“good” which have the quality that you canidentifythesingle
fingersduring the motion. Those sampleswhich donotmeet
this requirement are rated either “bad” or “medium” if some
of the limbs or body parts vanish while the action is being
executed.
6. RESULT AND DISCUSSION
In this paper, the result is the final design of the project on
topic “i - Surveillance : Crime Monitoring and Prevention
Using Neural Networks”.
Since there is a GUI implemented, the user is able to login
and then choose from livewebcam feed or browse the video
from some locations. Here, algorithms have been designed
that can alert the human operator when the presence of a
dangerous act, or an abnormal behavior of a person is
detected. This can assure safety in public places aswell asin
other locations.
The major advantage of the project includes efficiency, fast
to accessand uniqueness. The behavioral analysisalgorithm
also makes it easier for the CCTV operators to monitor the
CCTV systems and prevent crimes.
Fig-2 : Login Screen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1235
Fig-3 : Option for Live webcam or Browse from folder
Fig-4 : Detection of smoking
Fig-5 : Detection of hitting with something
7. CONCLUSION
Surveillance by using CCTV systems has reached to its best
level. Also, sending information or data through data
networks to servers is common these days, but coupling
these two surveillance and data transmission processes is a
very challenging work. CCTV surveillancesystemsaremostly
implemented and managed by governments. So, using CCTV
systems information has many security problems and it is
very difficult to handle.
In this project named i-SURVEILLANCE, we proposed
algorithms that are able to alert the human operator when
an abandoned luggage, presence of a dangerous act, or an
abnormal behaviour of a person is detected. We focused on
limiting the number of false alarms in order to allow for a
real life application of the system.
This proposed system can be used at low scale in first phase
where security issues are less or easy to handle. In the
future, we will enhance the proposed system tracking
algorithm by using the Enhanced Filter model that will
consider the multiple sensing data of mobile user with
network connected CCTV environment.
ACKNOWLEDGEMENT
We would like to express our immense gratitude and
profound thanks to all those who helped us to make this
project a great success. At the very outset we express our
thanks to the Almighty God for all the blessings endowed on
us. We can hardly find words to express our deep
appreciation for the help and warm encouragement that we
have received from our project guide Mrs. Jasmy Davies,
Assistant Professor, Sahrdaya College of Engineering &
Technology and also our project coordinators Mr. Willson
Joseph C. and Mrs. Anusree K, Assistant Professors,Sahrdaya
College of Engineering & Technology. We would also extend
our deep sense of gratitude to all other faculties for their
help and advice throughout the advancement of this project.
We are extremely thankful to our parents and friends for
being with us as a constant source of inspiration.
REFERENCES
[1] Choi Woo Chul and Na Joon Yeop, “Relative Importance
for Crime Prevention Technologies as Part of Smart City
based on Spatial Information”, IEEE Journal, Smart Cities
Symposium Prague, 13 July 2017
[2] Robin Singh Sidhu and Mrigank Sharad, “Smart
Surveillance System for Detecting Interpersonal Crime”,
presented in International Conference on Communication
and Signal Processing, April 6-8, 2016, published in IEEE
Journal, 24 November 2016
[3] Aniket Bhondave, Bhagyawant Biradar, Vishal
Suryavanshi and Harshal Nakil, “SuspiciousObjectDetection
Using Back-Tracing Technique”, International Journal of
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1236
Advanced Research in Computer and Communication
Engineering Volume 5, Issue 1, January 2016
[4]Yuchae Jung and Yongik Yoon, “Behavior TrackingModel
in Dynamic Situation using the risk ratio EM”, IEEE Journal,
12 March 2015
[5] Swapnali Rayte, Rohini Bhamare, Kaustubh Barhate and
Mahendra Sonawane, “Crime Monitoring and Controlling
System by Mobile Device”, International Journal on Recent
and Innovation Trends in Computing and Communication,
Volume 3, Issue 1, January 2015
[6] Huang J, Rathod V, Sun C, Zhu M, Korattikara A, Fathi A,
Fischer I, Wojna Z, Song Y, Guadarrama S, Murphy K,
"Speed/accuracy trade-offsfor modern convolutionalobject
detectors", CVPR 2017
[7] H. Kuehne, H. Jhuang, E. Garrote, T. Poggio, and T. Serre,
“HMDB: A Large Video Database for Human Motion
Recognition”, ICCV, 2011.
BIOGRAPHIES
Malavika Nair is currently pursuing
Bachelor of Technology in Computer
Science & Engineering in Sahrdaya
College of Engineering & Technology,
Kodakara affiliated to Calicut
University.
Mathew Gillroy is currently pursuing
Bachelor of Technology in Computer
Science & Engineering in Sahrdaya
College of Engineering & Technology,
Kodakara affiliated to Calicut
University.
Neethu Jose is currently pursuing
Bachelor of Technology in Computer
Science & Engineering in Sahrdaya
College of Engineering & Technology,
Kodakara affiliated to Calicut
University.
Jasmy Davies is currently working as
the Assistant Professor in Computer
Science & Engineering departmentin
Sahrdaya College of Engineering &
Technology, Kodakara affiliated to
Calicut University.

Más contenido relacionado

La actualidad más candente

IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET Journal
 
IRJET- Smart Rescue System using Android Smart Phone
IRJET-  	  	  Smart Rescue System using Android Smart PhoneIRJET-  	  	  Smart Rescue System using Android Smart Phone
IRJET- Smart Rescue System using Android Smart PhoneIRJET Journal
 
Vehicle anti theft system based on an embedded
Vehicle anti theft system based on an embeddedVehicle anti theft system based on an embedded
Vehicle anti theft system based on an embeddedeSAT Publishing House
 
Smart Security System for Automobiles using IoT
Smart Security System for Automobiles using IoTSmart Security System for Automobiles using IoT
Smart Security System for Automobiles using IoTijtsrd
 
Event Detection Using Background Subtraction For Surveillance Systems
Event Detection Using Background Subtraction For Surveillance SystemsEvent Detection Using Background Subtraction For Surveillance Systems
Event Detection Using Background Subtraction For Surveillance SystemsIRJET Journal
 
iSentry Brochure
iSentry BrochureiSentry Brochure
iSentry BrochureZalmi Katz
 
IRJET- A Methodology: Iot Based Drowsy Driving Warning and Traffic Collis...
IRJET-  	  A Methodology: Iot Based Drowsy Driving Warning and Traffic Collis...IRJET-  	  A Methodology: Iot Based Drowsy Driving Warning and Traffic Collis...
IRJET- A Methodology: Iot Based Drowsy Driving Warning and Traffic Collis...IRJET Journal
 
GoodVision Video Insights Presentation 2018
GoodVision Video Insights Presentation 2018GoodVision Video Insights Presentation 2018
GoodVision Video Insights Presentation 2018Daniel ?tofan
 
A Real Time Intelligent Driver Fatigue Alarm System Based On Video Sequences
A Real Time Intelligent Driver Fatigue Alarm System Based On Video SequencesA Real Time Intelligent Driver Fatigue Alarm System Based On Video Sequences
A Real Time Intelligent Driver Fatigue Alarm System Based On Video SequencesIJERA Editor
 
FINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
FINGERPRINT BASED LICENSING SYSTEM FOR DRIVINGFINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
FINGERPRINT BASED LICENSING SYSTEM FOR DRIVINGAnn Mathew
 
Ieeepro techno solutions ieee 2013 embedded project gravity lock next gen...
Ieeepro techno solutions    ieee 2013 embedded project  gravity lock next gen...Ieeepro techno solutions    ieee 2013 embedded project  gravity lock next gen...
Ieeepro techno solutions ieee 2013 embedded project gravity lock next gen...srinivasanece7
 
An Automatic Car Engine Startup and Brake Oil Monitoring Using Sensors
An Automatic Car Engine Startup and Brake Oil Monitoring Using SensorsAn Automatic Car Engine Startup and Brake Oil Monitoring Using Sensors
An Automatic Car Engine Startup and Brake Oil Monitoring Using SensorsIJRES Journal
 
Fingerprint based physical access control vehicle immobilizer
Fingerprint based physical access control vehicle immobilizer Fingerprint based physical access control vehicle immobilizer
Fingerprint based physical access control vehicle immobilizer VIKAS SINGH BHADOURIA
 
IRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS SensorIRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS SensorIRJET Journal
 
IRJET- Car Accident Detection and Notification: An Analytical Survey
IRJET-  	  Car Accident Detection and Notification: An Analytical SurveyIRJET-  	  Car Accident Detection and Notification: An Analytical Survey
IRJET- Car Accident Detection and Notification: An Analytical SurveyIRJET Journal
 
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...IJAEMSJORNAL
 
IRJET- Advance ATM Security Solution
IRJET-  	  Advance ATM Security SolutionIRJET-  	  Advance ATM Security Solution
IRJET- Advance ATM Security SolutionIRJET Journal
 
Smart Vehicle Authentication and Due Date Monitoring System using IoT
Smart Vehicle Authentication and Due Date Monitoring System using IoTSmart Vehicle Authentication and Due Date Monitoring System using IoT
Smart Vehicle Authentication and Due Date Monitoring System using IoTAssociate Professor in VSB Coimbatore
 

La actualidad más candente (20)

IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’S
 
IRJET- Smart Rescue System using Android Smart Phone
IRJET-  	  	  Smart Rescue System using Android Smart PhoneIRJET-  	  	  Smart Rescue System using Android Smart Phone
IRJET- Smart Rescue System using Android Smart Phone
 
Vehicle anti theft system based on an embedded
Vehicle anti theft system based on an embeddedVehicle anti theft system based on an embedded
Vehicle anti theft system based on an embedded
 
Smart Security System for Automobiles using IoT
Smart Security System for Automobiles using IoTSmart Security System for Automobiles using IoT
Smart Security System for Automobiles using IoT
 
Event Detection Using Background Subtraction For Surveillance Systems
Event Detection Using Background Subtraction For Surveillance SystemsEvent Detection Using Background Subtraction For Surveillance Systems
Event Detection Using Background Subtraction For Surveillance Systems
 
iSentry Brochure
iSentry BrochureiSentry Brochure
iSentry Brochure
 
IRJET- A Methodology: Iot Based Drowsy Driving Warning and Traffic Collis...
IRJET-  	  A Methodology: Iot Based Drowsy Driving Warning and Traffic Collis...IRJET-  	  A Methodology: Iot Based Drowsy Driving Warning and Traffic Collis...
IRJET- A Methodology: Iot Based Drowsy Driving Warning and Traffic Collis...
 
GoodVision Video Insights Presentation 2018
GoodVision Video Insights Presentation 2018GoodVision Video Insights Presentation 2018
GoodVision Video Insights Presentation 2018
 
A Real Time Intelligent Driver Fatigue Alarm System Based On Video Sequences
A Real Time Intelligent Driver Fatigue Alarm System Based On Video SequencesA Real Time Intelligent Driver Fatigue Alarm System Based On Video Sequences
A Real Time Intelligent Driver Fatigue Alarm System Based On Video Sequences
 
Vehicle security system final report
Vehicle security system final reportVehicle security system final report
Vehicle security system final report
 
FINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
FINGERPRINT BASED LICENSING SYSTEM FOR DRIVINGFINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
FINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
 
Ieeepro techno solutions ieee 2013 embedded project gravity lock next gen...
Ieeepro techno solutions    ieee 2013 embedded project  gravity lock next gen...Ieeepro techno solutions    ieee 2013 embedded project  gravity lock next gen...
Ieeepro techno solutions ieee 2013 embedded project gravity lock next gen...
 
An Automatic Car Engine Startup and Brake Oil Monitoring Using Sensors
An Automatic Car Engine Startup and Brake Oil Monitoring Using SensorsAn Automatic Car Engine Startup and Brake Oil Monitoring Using Sensors
An Automatic Car Engine Startup and Brake Oil Monitoring Using Sensors
 
Fingerprint based physical access control vehicle immobilizer
Fingerprint based physical access control vehicle immobilizer Fingerprint based physical access control vehicle immobilizer
Fingerprint based physical access control vehicle immobilizer
 
IRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS SensorIRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS Sensor
 
IRJET- Car Accident Detection and Notification: An Analytical Survey
IRJET-  	  Car Accident Detection and Notification: An Analytical SurveyIRJET-  	  Car Accident Detection and Notification: An Analytical Survey
IRJET- Car Accident Detection and Notification: An Analytical Survey
 
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
 
IRJET- Advance ATM Security Solution
IRJET-  	  Advance ATM Security SolutionIRJET-  	  Advance ATM Security Solution
IRJET- Advance ATM Security Solution
 
Smart Vehicle Authentication and Due Date Monitoring System using IoT
Smart Vehicle Authentication and Due Date Monitoring System using IoTSmart Vehicle Authentication and Due Date Monitoring System using IoT
Smart Vehicle Authentication and Due Date Monitoring System using IoT
 
1 phase (1)
1 phase (1)1 phase (1)
1 phase (1)
 

Similar a IRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks

Video Crime Monitoring
Video Crime MonitoringVideo Crime Monitoring
Video Crime Monitoringijtsrd
 
IRJET- A Survey on Human Action Recognition
IRJET- A Survey on Human Action RecognitionIRJET- A Survey on Human Action Recognition
IRJET- A Survey on Human Action RecognitionIRJET Journal
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMIRJET Journal
 
ATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural NetworksATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural NetworksIRJET Journal
 
Real-time Anomaly Detection and Alert System for Video Surveillance
Real-time Anomaly Detection and Alert System for Video SurveillanceReal-time Anomaly Detection and Alert System for Video Surveillance
Real-time Anomaly Detection and Alert System for Video SurveillanceIRJET Journal
 
Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillancePuneet soni
 
CREATING CCTV CAMERA SYSTEM USING ARTIFICIAL INTELLIGENCE, IMAGE PROCESSING, ...
CREATING CCTV CAMERA SYSTEM USING ARTIFICIAL INTELLIGENCE, IMAGE PROCESSING, ...CREATING CCTV CAMERA SYSTEM USING ARTIFICIAL INTELLIGENCE, IMAGE PROCESSING, ...
CREATING CCTV CAMERA SYSTEM USING ARTIFICIAL INTELLIGENCE, IMAGE PROCESSING, ...IRJET Journal
 
Face Recognition System using OpenCV
Face Recognition System using OpenCVFace Recognition System using OpenCV
Face Recognition System using OpenCVIRJET Journal
 
Imagus_Whitepaper_250515
Imagus_Whitepaper_250515Imagus_Whitepaper_250515
Imagus_Whitepaper_250515Melissa Olsen
 
Imagus_Whitepaper_250515
Imagus_Whitepaper_250515Imagus_Whitepaper_250515
Imagus_Whitepaper_250515Melissa Olsen
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEOIRJET Journal
 
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET Journal
 
Vehicle detection by using rear parts and tracking system
Vehicle detection by using rear parts and tracking systemVehicle detection by using rear parts and tracking system
Vehicle detection by using rear parts and tracking systemeSAT Journals
 
Smart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionSmart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionIRJET Journal
 
Accenture video-analytics-operational-marketing-and-security-insights-from-cctv
Accenture video-analytics-operational-marketing-and-security-insights-from-cctvAccenture video-analytics-operational-marketing-and-security-insights-from-cctv
Accenture video-analytics-operational-marketing-and-security-insights-from-cctvSunanda Balla
 
IRJET- Border Security using Computer Vision
IRJET- Border Security using Computer VisionIRJET- Border Security using Computer Vision
IRJET- Border Security using Computer VisionIRJET Journal
 
Advance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCVAdvance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCVIRJET Journal
 
IRJET- Applications of Object Detection System
IRJET-  	  Applications of Object Detection SystemIRJET-  	  Applications of Object Detection System
IRJET- Applications of Object Detection SystemIRJET Journal
 
R E G U L A R P A P E RUser-centric privacy awareness in v.docx
R E G U L A R P A P E RUser-centric privacy awareness in v.docxR E G U L A R P A P E RUser-centric privacy awareness in v.docx
R E G U L A R P A P E RUser-centric privacy awareness in v.docxmakdul
 
Layered City Surveillance
Layered City SurveillanceLayered City Surveillance
Layered City SurveillanceSunny Tan
 

Similar a IRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks (20)

Video Crime Monitoring
Video Crime MonitoringVideo Crime Monitoring
Video Crime Monitoring
 
IRJET- A Survey on Human Action Recognition
IRJET- A Survey on Human Action RecognitionIRJET- A Survey on Human Action Recognition
IRJET- A Survey on Human Action Recognition
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
 
ATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural NetworksATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural Networks
 
Real-time Anomaly Detection and Alert System for Video Surveillance
Real-time Anomaly Detection and Alert System for Video SurveillanceReal-time Anomaly Detection and Alert System for Video Surveillance
Real-time Anomaly Detection and Alert System for Video Surveillance
 
Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillance
 
CREATING CCTV CAMERA SYSTEM USING ARTIFICIAL INTELLIGENCE, IMAGE PROCESSING, ...
CREATING CCTV CAMERA SYSTEM USING ARTIFICIAL INTELLIGENCE, IMAGE PROCESSING, ...CREATING CCTV CAMERA SYSTEM USING ARTIFICIAL INTELLIGENCE, IMAGE PROCESSING, ...
CREATING CCTV CAMERA SYSTEM USING ARTIFICIAL INTELLIGENCE, IMAGE PROCESSING, ...
 
Face Recognition System using OpenCV
Face Recognition System using OpenCVFace Recognition System using OpenCV
Face Recognition System using OpenCV
 
Imagus_Whitepaper_250515
Imagus_Whitepaper_250515Imagus_Whitepaper_250515
Imagus_Whitepaper_250515
 
Imagus_Whitepaper_250515
Imagus_Whitepaper_250515Imagus_Whitepaper_250515
Imagus_Whitepaper_250515
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
 
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert Management
 
Vehicle detection by using rear parts and tracking system
Vehicle detection by using rear parts and tracking systemVehicle detection by using rear parts and tracking system
Vehicle detection by using rear parts and tracking system
 
Smart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionSmart Surveillance System through Computer Vision
Smart Surveillance System through Computer Vision
 
Accenture video-analytics-operational-marketing-and-security-insights-from-cctv
Accenture video-analytics-operational-marketing-and-security-insights-from-cctvAccenture video-analytics-operational-marketing-and-security-insights-from-cctv
Accenture video-analytics-operational-marketing-and-security-insights-from-cctv
 
IRJET- Border Security using Computer Vision
IRJET- Border Security using Computer VisionIRJET- Border Security using Computer Vision
IRJET- Border Security using Computer Vision
 
Advance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCVAdvance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCV
 
IRJET- Applications of Object Detection System
IRJET-  	  Applications of Object Detection SystemIRJET-  	  Applications of Object Detection System
IRJET- Applications of Object Detection System
 
R E G U L A R P A P E RUser-centric privacy awareness in v.docx
R E G U L A R P A P E RUser-centric privacy awareness in v.docxR E G U L A R P A P E RUser-centric privacy awareness in v.docx
R E G U L A R P A P E RUser-centric privacy awareness in v.docx
 
Layered City Surveillance
Layered City SurveillanceLayered City Surveillance
Layered City Surveillance
 

Más de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Más de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Último

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 

Último (20)

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 

IRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1231 i-SURVEILLANCE CRIME MONITORING AND PREVENTION USING NEURAL NETWORKS Malavika Nair1, Mathew Gillroy2, Neethu Jose3, Jasmy Davies4 1,2,3 B. Tech student, Department of Computer Science and Engineering, SCET, Kerala, India 4Assistant Professor, Department of Computer Science and Engineering, SCET, Kerala, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Closed Circuit Television Systems (CCTV) are becoming more and more popular and are being deployed in many housing estates, offices, and also in most public spaces. CCTV monitoring systems have been implemented in many American and European cities. As the number of cameraviews a single CCTV operator can handle is limited byhumanfactors, such monitoring systems makes for an enormous load for the CCTV operators. Here, in this project named i–Surveillance or Intelligent Surveillance System, we propose algorithms that are able to alert the human operator when: (1) Presence of a dangerous act, after setting zones of interestanddangerzones within those zones of interest,, the danger is detected when an object trespasses the danger zone, which can reduce the number of accidents in factories and suicides in certainplaces, (2) An abnormal behavior of a person such as handling some weapons or act of abuse or molestation is detected, which might be a potential threat. In this project, in order to allow for a real life application of the system, we focus on limiting the number of false alarms. Key Words: Behavioral Analysis, Security, Machine Learning, Image Processing, Neural Networks. 1. INTRODUCTION In recent years, we’ve seen that there has been amarkedand sustained growth in the use of Closed Circuit Television (CCTV) surveillance cameras in order to prevent crimes in public places in the USA and other Western nations. Amidst the associated public expenditure and the expansion,aswell as concerns about their social costs and efficacy, there is an increasing need for an evidence-based approach to inform CCTV practices and policies. Cases of harassment in work places are also becoming very serious. With the ever growing installation of advancedCCTVinfrastructure,almost entire cities can now be monitored, through the major purpose served by the same is purely evidential. It would only be natural to expect an alert or warning system for ongoing (or about to happen) mishaps and crimes, where timely action can be the difference between life and death. Such scenarios are expected to be monitored and identified by personnel viewing live footage. But as the number of CCTVsper unit are keeping rising, this approachisbecoming increasingly impractical. Thus what we require is a surveillance unit capable of thriving in these situations with negligible human input. We shall define a "situation of interest" or a “critical situation” as any sensitive situation that could possibly lead to the afore-mentioned predicaments. Consider the idea ofa smart surveillance which would be triggered ‘active’ only when the statistical chances of the situation being of "interest" are high. In office environments each room being independently monitored can respond to such a trigger by enabling the recording. At all other times the CCTV is not recording which helps in maintaining privacy and, if required, confidentiality of work. Cutting edge research and development leads to cut-throat competition and one can easily realize why traditional surveillance techniques might prove risky. The video feed would be recorded only under a "situation of interest" in case it needsto be documentedfora legal investigation. In the response to the above trigger could be an alert to be issued to the appropriate authorities along with certain alarms which could help inpreventingthe situation from escalating further. So, this validates the requirement for a system which could provide smart surveillance, while ensuring privacy and confidentiality. The surveillance camera activated for recording only when there is a situation of interest. The camera is inactive or it is not recording the video when there is no human presence. The human presence is checked using motion detection algorithm. When a crime is about to be committed, then the human is notified and an alarm system connected to the main system will be activated. 2. EXISTING SYSTEM The existing system of CCTV monitoring is done by humans and also the automated smart CCTV monitoringsystemsare not fully capable of making decisions and triggering actions. Surveillance in dynamic scenesattempts to recognize,detect and track certain objects from image sequences, and more generally to understand object behaviors. The objectiveisto develop an intelligent visual surveillance system for replacing the traditional passive video surveillance system, since the traditional passive video surveillance system proves ineffective as the number of cameras exceeds the capability of human operators to observe them. In addition to placing cameras in the place of human eyes, the goal of visual surveillance is to accomplish, as automatically as possible, the surveillance task. Visual surveillance in dynamic scenes has a wide range of potential applications, such as a security guard for communitiesand important buildings, traffic surveillancein cities expressways, detection of military target objects, etc. We focus in this paper on applications involving the
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1232 surveillance of people, vehicles, as they are typical of surveillance applications and include the full range of surveillance methods. Surveillance applications which involve people or vehicles include the following. a) Access control in special areas : Only those people with a special identity are allowed to enter in some security- sensitive locations such as important governmental offices and military bases. A biometric feature database including legal visiting members is built beforehand using biometric techniques. When someone is about to enter to thissecurity- sensitive location, the system automatically obtains the visitor’sfeatures, such astheir facial appearance, heightand walking gait from those images taken in real time situation. Based on this, the system is able to decide whether the visitor can be cleared for entry. b) Person-specific identification in certain scenes : The police can catch suspects with the help of personal identification at a distance by a smart surveillance system. The cops may build a database containing the biometric feature of suspects, and they may place visual surveillance systems at those places where the suspects are usually seen, such as subway stations, casinos, etc. The systemsareableto automatically recognize whether or not the people in view are suspects. If yes, then the alarms will be given immediately. Even though such systems with face recognition have already been used at public sites, their reliability is too low for police requirements. c) Crowd flux statistics and congestion analysis : The flux of people at important public areas such as stores, can be automatically computed by the surveillance systems, using techniques for human detection. It can then provide congestion analysis to assist in the management of the people. Similarly, expressways and junctionsoftheroadscan be monitored through visual surveillance systems, and further analyze the status of road congestion and traffic. d) Anomaly detection and alarming : At certain times, it is necessary to analyze the behaviors or characteristics of vehicles and people and to determine whether these characteristics are normal or abnormal. For example, abnormal behaviors indicative of theft,canbeanalyzedusing the visual surveillance systems, which can be placed in supermarkets and parking lots. Normally, there are many ways of giving an alarm. One of the ways is to make a recorded announcement automatically, whenever any abnormal behavior is detected. Another methodistocontact the police automatically. Fig-1 : Proposed System The image of a person being captured, tying him to a particular place, or the vehicle number plate being registered on footage are probably the most obvious and perhapswidespread cause of lossof privacy. Asthenumbers of CCTV cameras are increasing, the likelihood of the above happening is sure to increase. Drawbacks  The system is used only on the army borders, but not into public places such as metro stations, big malls, etc.  It is a complex mechanism. Individual safety level is not considered.  Video is captured continuously, which can lead to privacy issues.  The system used also doesn’t have an efficient alarm system that triggers automatically on an event of abuse, harassment or bullying. Lack of privacy as the image of victim is not blurred. 3. SYSTEM DESIGN In this paper, we use classification method for analyzing the video and to detect anomalies. A Graphical User Interface (GUI) is implemented for the automatic video surveillance. Here, when the login screen appears, the user can login to the application with the registered username and password. If the user credentialsare found to be correct,theapplication will show the options BROWSE and VIEW. Here, theusercan either provide a live webcam feed or choose a video by browsing the folders, and providing the correct path.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1233 The fed video is then converted into frames, and it is analyzed for checking abnormalities. We firstcheckwhether there are some human actions present in the frames. This checking is done with the help of the trained models. These trained models are compared with the actions presentinthe frame, in order to detect human presence in that frame. For this purpose of training, we require a dataset containing a set of images, and the dataset used here is HMDB51 (Human Motion Database 51). Next, we annotate theseframesusinga toollabelImg. Since there are quite a large number of videos, all these videos can be annotated only if it is converted into frames. This is done using a program, and the code iswritten in OpenCV using Python. Then, after saving all the frames as xml files, the train and test directories are separated. The usual procedure for separating train and testdirectoriesisas follows :  90% of the total xmls comprises the train directory  10% of the total xmls comprises the test directory The training data is used for creating the model, and while the training data is being trained, each model from the test directory is taken and tested with each model of the test directory. From this we can get the percentage loss in accuracy. At a particular point when the loss percentage graph becomes steady, the training may be stopped. Finally, the abnormality and itsaccuracy will be determined and shown as the output. 4. PROPOSED SYSTEM The proposed system deals with the current trend of security system i.e. inclusion of privacy concern, cost effectiveness, efficient alarm system. Conditional video recording is the major inclusion. At all timesthecameraison but not recording. It would keep on processing the frames it receives and would not capture it unless ‘triggered’. Activation of subroutines is done only when multiple personnel are detected. These subroutines involve image processing in conjunction to detect critical instances. Once enough baseline deviation is flagged, the situation ismarked as critical and recording is activated. The ideology is as follows: 1) In case the person is not alone, we activate the camerabut any documentations, notes, scribbling on a board or screens (which are to be considered confidential at all times)shallbe blanked out/blurred to avoid any leaks (any simple irreversible technique could be used). 2) Once it has been established that the person is not alone, we refine our analysis to identifying the number of people, their gender and other characteristics. We make use of human detection, gesture recognition and motion detection, and emotion detection. 3) Voice, just as video, is not to be recorded unless we discover a situation of interest. In public places privacy is no longer a pressing matter. So the subroutinesfor tracking and humandetectionarealways in operation in a conditional focus mode. By conditional focus we mean that we run only a preliminary test for critical situations. Once that is flagged, do we bring in our heavier classifiers involving both Video and Audio processing. This ensures a smoother real time operation. The approach, therefore, is to wait for a trigger to a critical situation and then to take the required action. It is worth mentioning that the classification boundary in this case should be a bit less stringent than the one above, the reason being that this system is not entirely self-sufficient and hence relieson human input. Thus, it would onlymakesense to slack the constraints so that even if false alarms are increased, the probability of a crime going unnoticed is considerably suppressed. The preliminary indicators for instance can be: rapid and jerky movements (in addition to “excited” audio signature) between individualscloserthana particular safeproximity. Once triggered recording initiates plusan alert signal is issued either directly to the authorities or a decision making moderator. There is not a lot of research on quantification of a strong theoretical framework for basing emotiondetectionthrough Image processing algorithms. Associative neural networks like CALM incorporate interpretation of human emotions through gestural cues. It is possible with higher resolution cameras to include facial expression analysis systems to categorize the physical expression of emotions, such as Facial Action Coding System (FACS). 5. METHODOLOGY The objective of our project is to design and implement a system to prevent crime and suicides by tracking human behavior through the analysis of video captured usingCCTV. The proposed system has multiple functionalities including preventing suicides, abnormal behavior and even attempts of abuse. The various modules of our project are as follows : 5.1 Video Capture CCTV Closed Circuit Television (CCTV) is used to monitor the scene. Video is not recorded until it is necessary i.e. video is recorded only when the person is not alone and when there are sudden movementsor actions. Closed Circuit Television, also known as video surveillance refers to the use of a CCTV or a video camera for transmitting a signal to a certain specified place on a limited set of monitors. CCTVschemesin public settings had small and non-statistically significant effects on crime: 7% reduction in city and town centers and 23% reduction in public transport settings. 5.2 Frame Capturing Videos are a continuous flow of frames or still images. Each frame is captured and processed to check for motion in the
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1234 scene. Motion in the scene means there’s some human activity in the scene. Human activity is confirmed by checking for faces or body patterns. A continuous video has thousands of frames. In order to save storage space, onlythe last 20 frames are kept for reference. Old framesget deleted when new ones arrive. 5.3 Motion Detection Motion in the scene is detected by analyzing the frames captured. This can be achieved by a technique called background subtraction wherein still objects in the scenes are eliminated by analyzing the position of each objectinthe stored frames. If the position of object is changed, the object is flagged to be a moving object. To ensure that it is a human, face patterns or body patterns are matched with saved shapes. 5.4 Frame Analysis For video analysis we base our processing on a standard multiple moving objects tracking algorithm. Theapproachis to use a background subtraction based on Gaussian mixture models to segment out the moving objects. After the foreground is de-noised, blob detection is run and the connected pixels are bounded in a box which istobetracked. The motion tracking is achieved by a Kalman filter. After observing the object for a set number of frames, the Kalman Filter then estimates the position of the object insubsequent frames (all the while observing the actual motion that happens and recording the errors for use in future pre dictions). Then behavior of moving character is analyzed using behavioral analysis algorithm to check for any act of abuse, bullying or harassment. 5.5 TensorFlow TensorFlow is basically an open source software librarythat is used for numerical computation using data flow graphs. Each node in the data flow graph represents certain mathematical operations, and the edges of the graph represent the multidimensional data arrays, commonly known as tensors, communicated between them. TensorFlow Object Detection API : One ofthecorechallenges in computer vision is to create accurate machine learning models, which are capable of identifying and localizing multiple objects in a single image. It is an open source framework built on top of TensorFlow that makes it easy to deploy, train and construct object detection models. 5.5 HMDB51 HMDB refers to Human Motion Database. There areatotalof 6847 video clips in this dataset, and these clips are divided into certain action categories, 51 in number.Eachofthese51 action categories contain a minimum of 101 video clips, which is extracted from a range of sources. Theseactionscan be categorized as follows : 1. General facial actions : laugh, talk, smile, chew. 2. Facial actions with object manipulation : drink, smoke, eat. 3. General body movements : clapping hands, pull up, climb stairs, fall on the floor, jump, push up, run, sit down, dive, sit up, somersault, stand up, backhand flip, turn, walk, wave. 4. Body movements with object interaction : brush hair, catch, hit something, kick ball, pick, push something, ride bike, golf, ride horse, shoot ball, shoot gun, draw sword, sword exercise, throw. 5. Body movements for human interaction : hug, kiss, fencing, punch, kick someone, shake hands, sword fight. There is no pre-processing done on the video clips. A three - level grading of video quality is applied to evaluate the huge set of clips. Only those video samples are rated “good” which have the quality that you canidentifythesingle fingersduring the motion. Those sampleswhich donotmeet this requirement are rated either “bad” or “medium” if some of the limbs or body parts vanish while the action is being executed. 6. RESULT AND DISCUSSION In this paper, the result is the final design of the project on topic “i - Surveillance : Crime Monitoring and Prevention Using Neural Networks”. Since there is a GUI implemented, the user is able to login and then choose from livewebcam feed or browse the video from some locations. Here, algorithms have been designed that can alert the human operator when the presence of a dangerous act, or an abnormal behavior of a person is detected. This can assure safety in public places aswell asin other locations. The major advantage of the project includes efficiency, fast to accessand uniqueness. The behavioral analysisalgorithm also makes it easier for the CCTV operators to monitor the CCTV systems and prevent crimes. Fig-2 : Login Screen
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1235 Fig-3 : Option for Live webcam or Browse from folder Fig-4 : Detection of smoking Fig-5 : Detection of hitting with something 7. CONCLUSION Surveillance by using CCTV systems has reached to its best level. Also, sending information or data through data networks to servers is common these days, but coupling these two surveillance and data transmission processes is a very challenging work. CCTV surveillancesystemsaremostly implemented and managed by governments. So, using CCTV systems information has many security problems and it is very difficult to handle. In this project named i-SURVEILLANCE, we proposed algorithms that are able to alert the human operator when an abandoned luggage, presence of a dangerous act, or an abnormal behaviour of a person is detected. We focused on limiting the number of false alarms in order to allow for a real life application of the system. This proposed system can be used at low scale in first phase where security issues are less or easy to handle. In the future, we will enhance the proposed system tracking algorithm by using the Enhanced Filter model that will consider the multiple sensing data of mobile user with network connected CCTV environment. ACKNOWLEDGEMENT We would like to express our immense gratitude and profound thanks to all those who helped us to make this project a great success. At the very outset we express our thanks to the Almighty God for all the blessings endowed on us. We can hardly find words to express our deep appreciation for the help and warm encouragement that we have received from our project guide Mrs. Jasmy Davies, Assistant Professor, Sahrdaya College of Engineering & Technology and also our project coordinators Mr. Willson Joseph C. and Mrs. Anusree K, Assistant Professors,Sahrdaya College of Engineering & Technology. We would also extend our deep sense of gratitude to all other faculties for their help and advice throughout the advancement of this project. We are extremely thankful to our parents and friends for being with us as a constant source of inspiration. REFERENCES [1] Choi Woo Chul and Na Joon Yeop, “Relative Importance for Crime Prevention Technologies as Part of Smart City based on Spatial Information”, IEEE Journal, Smart Cities Symposium Prague, 13 July 2017 [2] Robin Singh Sidhu and Mrigank Sharad, “Smart Surveillance System for Detecting Interpersonal Crime”, presented in International Conference on Communication and Signal Processing, April 6-8, 2016, published in IEEE Journal, 24 November 2016 [3] Aniket Bhondave, Bhagyawant Biradar, Vishal Suryavanshi and Harshal Nakil, “SuspiciousObjectDetection Using Back-Tracing Technique”, International Journal of
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1236 Advanced Research in Computer and Communication Engineering Volume 5, Issue 1, January 2016 [4]Yuchae Jung and Yongik Yoon, “Behavior TrackingModel in Dynamic Situation using the risk ratio EM”, IEEE Journal, 12 March 2015 [5] Swapnali Rayte, Rohini Bhamare, Kaustubh Barhate and Mahendra Sonawane, “Crime Monitoring and Controlling System by Mobile Device”, International Journal on Recent and Innovation Trends in Computing and Communication, Volume 3, Issue 1, January 2015 [6] Huang J, Rathod V, Sun C, Zhu M, Korattikara A, Fathi A, Fischer I, Wojna Z, Song Y, Guadarrama S, Murphy K, "Speed/accuracy trade-offsfor modern convolutionalobject detectors", CVPR 2017 [7] H. Kuehne, H. Jhuang, E. Garrote, T. Poggio, and T. Serre, “HMDB: A Large Video Database for Human Motion Recognition”, ICCV, 2011. BIOGRAPHIES Malavika Nair is currently pursuing Bachelor of Technology in Computer Science & Engineering in Sahrdaya College of Engineering & Technology, Kodakara affiliated to Calicut University. Mathew Gillroy is currently pursuing Bachelor of Technology in Computer Science & Engineering in Sahrdaya College of Engineering & Technology, Kodakara affiliated to Calicut University. Neethu Jose is currently pursuing Bachelor of Technology in Computer Science & Engineering in Sahrdaya College of Engineering & Technology, Kodakara affiliated to Calicut University. Jasmy Davies is currently working as the Assistant Professor in Computer Science & Engineering departmentin Sahrdaya College of Engineering & Technology, Kodakara affiliated to Calicut University.