Enviar búsqueda
Cargar
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
•
0 recomendaciones
•
53 vistas
IRJET Journal
Seguir
https://www.irjet.net/archives/V5/i3/IRJET-V5I3280.pdf
Leer menos
Leer más
Ingeniería
Denunciar
Compartir
Denunciar
Compartir
1 de 6
Descargar ahora
Descargar para leer sin conexión
Recomendados
IRJET - Accident Prevention Control System and Detection of Lost Key
IRJET - Accident Prevention Control System and Detection of Lost Key
IRJET Journal
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET Journal
Car Safety System Enhancements using Internet of Things (IoT)
Car Safety System Enhancements using Internet of Things (IoT)
IRJET Journal
IRJET- Vehicle Security System using IoT Application
IRJET- Vehicle Security System using IoT Application
IRJET Journal
IRJET - Automatic Gun Control using Motion Detection System
IRJET - Automatic Gun Control using Motion Detection System
IRJET Journal
IRJET- Automative Impregnable Driving System
IRJET- Automative Impregnable Driving System
IRJET Journal
Vehicle anti theft system based on an embedded platform
Vehicle anti theft system based on an embedded platform
eSAT Journals
IRJET- Advance Driver Assistance System using Artificial Intelligence
IRJET- Advance Driver Assistance System using Artificial Intelligence
IRJET Journal
Recomendados
IRJET - Accident Prevention Control System and Detection of Lost Key
IRJET - Accident Prevention Control System and Detection of Lost Key
IRJET Journal
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET Journal
Car Safety System Enhancements using Internet of Things (IoT)
Car Safety System Enhancements using Internet of Things (IoT)
IRJET Journal
IRJET- Vehicle Security System using IoT Application
IRJET- Vehicle Security System using IoT Application
IRJET Journal
IRJET - Automatic Gun Control using Motion Detection System
IRJET - Automatic Gun Control using Motion Detection System
IRJET Journal
IRJET- Automative Impregnable Driving System
IRJET- Automative Impregnable Driving System
IRJET Journal
Vehicle anti theft system based on an embedded platform
Vehicle anti theft system based on an embedded platform
eSAT Journals
IRJET- Advance Driver Assistance System using Artificial Intelligence
IRJET- Advance Driver Assistance System using Artificial Intelligence
IRJET Journal
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET Journal
IRJET- Smart Rescue System using Android Smart Phone
IRJET- Smart Rescue System using Android Smart Phone
IRJET Journal
Vehicle anti theft system based on an embedded
Vehicle anti theft system based on an embedded
eSAT Publishing House
Smart Security System for Automobiles using IoT
Smart Security System for Automobiles using IoT
ijtsrd
Event Detection Using Background Subtraction For Surveillance Systems
Event Detection Using Background Subtraction For Surveillance Systems
IRJET Journal
iSentry Brochure
iSentry Brochure
Zalmi Katz
IRJET- A Methodology: Iot Based Drowsy Driving Warning and Traffic Collis...
IRJET- A Methodology: Iot Based Drowsy Driving Warning and Traffic Collis...
IRJET Journal
GoodVision Video Insights Presentation 2018
GoodVision Video Insights Presentation 2018
Daniel ?tofan
A Real Time Intelligent Driver Fatigue Alarm System Based On Video Sequences
A Real Time Intelligent Driver Fatigue Alarm System Based On Video Sequences
IJERA Editor
Vehicle security system final report
Vehicle security system final report
Vedang Radio Tech. Pvt. Ltd
FINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
FINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
Ann Mathew
Ieeepro techno solutions ieee 2013 embedded project gravity lock next gen...
Ieeepro techno solutions ieee 2013 embedded project gravity lock next gen...
srinivasanece7
An Automatic Car Engine Startup and Brake Oil Monitoring Using Sensors
An Automatic Car Engine Startup and Brake Oil Monitoring Using Sensors
IJRES Journal
Fingerprint based physical access control vehicle immobilizer
Fingerprint based physical access control vehicle immobilizer
VIKAS SINGH BHADOURIA
IRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS Sensor
IRJET Journal
IRJET- Car Accident Detection and Notification: An Analytical Survey
IRJET- Car Accident Detection and Notification: An Analytical Survey
IRJET Journal
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
IJAEMSJORNAL
IRJET- Advance ATM Security Solution
IRJET- Advance ATM Security Solution
IRJET Journal
Smart Vehicle Authentication and Due Date Monitoring System using IoT
Smart Vehicle Authentication and Due Date Monitoring System using IoT
Associate Professor in VSB Coimbatore
1 phase (1)
1 phase (1)
darshangowda679
Video Crime Monitoring
Video Crime Monitoring
ijtsrd
IRJET- A Survey on Human Action Recognition
IRJET- A Survey on Human Action Recognition
IRJET Journal
Más contenido relacionado
La actualidad más candente
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET Journal
IRJET- Smart Rescue System using Android Smart Phone
IRJET- Smart Rescue System using Android Smart Phone
IRJET Journal
Vehicle anti theft system based on an embedded
Vehicle anti theft system based on an embedded
eSAT Publishing House
Smart Security System for Automobiles using IoT
Smart Security System for Automobiles using IoT
ijtsrd
Event Detection Using Background Subtraction For Surveillance Systems
Event Detection Using Background Subtraction For Surveillance Systems
IRJET Journal
iSentry Brochure
iSentry Brochure
Zalmi Katz
IRJET- A Methodology: Iot Based Drowsy Driving Warning and Traffic Collis...
IRJET- A Methodology: Iot Based Drowsy Driving Warning and Traffic Collis...
IRJET Journal
GoodVision Video Insights Presentation 2018
GoodVision Video Insights Presentation 2018
Daniel ?tofan
A Real Time Intelligent Driver Fatigue Alarm System Based On Video Sequences
A Real Time Intelligent Driver Fatigue Alarm System Based On Video Sequences
IJERA Editor
Vehicle security system final report
Vehicle security system final report
Vedang Radio Tech. Pvt. Ltd
FINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
FINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
Ann Mathew
Ieeepro techno solutions ieee 2013 embedded project gravity lock next gen...
Ieeepro techno solutions ieee 2013 embedded project gravity lock next gen...
srinivasanece7
An Automatic Car Engine Startup and Brake Oil Monitoring Using Sensors
An Automatic Car Engine Startup and Brake Oil Monitoring Using Sensors
IJRES Journal
Fingerprint based physical access control vehicle immobilizer
Fingerprint based physical access control vehicle immobilizer
VIKAS SINGH BHADOURIA
IRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS Sensor
IRJET Journal
IRJET- Car Accident Detection and Notification: An Analytical Survey
IRJET- Car Accident Detection and Notification: An Analytical Survey
IRJET Journal
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
IJAEMSJORNAL
IRJET- Advance ATM Security Solution
IRJET- Advance ATM Security Solution
IRJET Journal
Smart Vehicle Authentication and Due Date Monitoring System using IoT
Smart Vehicle Authentication and Due Date Monitoring System using IoT
Associate Professor in VSB Coimbatore
1 phase (1)
1 phase (1)
darshangowda679
La actualidad más candente
(20)
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- Smart Rescue System using Android Smart Phone
IRJET- Smart Rescue System using Android Smart Phone
Vehicle anti theft system based on an embedded
Vehicle anti theft system based on an embedded
Smart Security System for Automobiles using IoT
Smart Security System for Automobiles using IoT
Event Detection Using Background Subtraction For Surveillance Systems
Event Detection Using Background Subtraction For Surveillance Systems
iSentry Brochure
iSentry Brochure
IRJET- A Methodology: Iot Based Drowsy Driving Warning and Traffic Collis...
IRJET- A Methodology: Iot Based Drowsy Driving Warning and Traffic Collis...
GoodVision Video Insights Presentation 2018
GoodVision Video Insights Presentation 2018
A Real Time Intelligent Driver Fatigue Alarm System Based On Video Sequences
A Real Time Intelligent Driver Fatigue Alarm System Based On Video Sequences
Vehicle security system final report
Vehicle security system final report
FINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
FINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
Ieeepro techno solutions ieee 2013 embedded project gravity lock next gen...
Ieeepro techno solutions ieee 2013 embedded project gravity lock next gen...
An Automatic Car Engine Startup and Brake Oil Monitoring Using Sensors
An Automatic Car Engine Startup and Brake Oil Monitoring Using Sensors
Fingerprint based physical access control vehicle immobilizer
Fingerprint based physical access control vehicle immobilizer
IRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS Sensor
IRJET- Car Accident Detection and Notification: An Analytical Survey
IRJET- Car Accident Detection and Notification: An Analytical Survey
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
IRJET- Advance ATM Security Solution
IRJET- Advance ATM Security Solution
Smart Vehicle Authentication and Due Date Monitoring System using IoT
Smart Vehicle Authentication and Due Date Monitoring System using IoT
1 phase (1)
1 phase (1)
Similar a IRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
Video Crime Monitoring
Video Crime Monitoring
ijtsrd
IRJET- A Survey on Human Action Recognition
IRJET- A Survey on Human Action Recognition
IRJET Journal
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
IRJET Journal
ATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural Networks
IRJET Journal
Real-time Anomaly Detection and Alert System for Video Surveillance
Real-time Anomaly Detection and Alert System for Video Surveillance
IRJET Journal
Smart surveillance
Smart surveillance
Puneet soni
CREATING CCTV CAMERA SYSTEM USING ARTIFICIAL INTELLIGENCE, IMAGE PROCESSING, ...
CREATING CCTV CAMERA SYSTEM USING ARTIFICIAL INTELLIGENCE, IMAGE PROCESSING, ...
IRJET Journal
Face Recognition System using OpenCV
Face Recognition System using OpenCV
IRJET Journal
Imagus_Whitepaper_250515
Imagus_Whitepaper_250515
Melissa Olsen
Imagus_Whitepaper_250515
Imagus_Whitepaper_250515
Melissa Olsen
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
IRJET Journal
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert Management
IRJET Journal
Vehicle detection by using rear parts and tracking system
Vehicle detection by using rear parts and tracking system
eSAT Journals
Smart Surveillance System through Computer Vision
Smart Surveillance System through Computer Vision
IRJET Journal
Accenture video-analytics-operational-marketing-and-security-insights-from-cctv
Accenture video-analytics-operational-marketing-and-security-insights-from-cctv
Sunanda Balla
IRJET- Border Security using Computer Vision
IRJET- Border Security using Computer Vision
IRJET Journal
Advance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCV
IRJET Journal
IRJET- Applications of Object Detection System
IRJET- Applications of Object Detection System
IRJET Journal
R E G U L A R P A P E RUser-centric privacy awareness in v.docx
R E G U L A R P A P E RUser-centric privacy awareness in v.docx
makdul
Layered City Surveillance
Layered City Surveillance
Sunny Tan
Similar a IRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
(20)
Video Crime Monitoring
Video Crime Monitoring
IRJET- A Survey on Human Action Recognition
IRJET- A Survey on Human Action Recognition
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
ATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural Networks
Real-time Anomaly Detection and Alert System for Video Surveillance
Real-time Anomaly Detection and Alert System for Video Surveillance
Smart surveillance
Smart surveillance
CREATING CCTV CAMERA SYSTEM USING ARTIFICIAL INTELLIGENCE, IMAGE PROCESSING, ...
CREATING CCTV CAMERA SYSTEM USING ARTIFICIAL INTELLIGENCE, IMAGE PROCESSING, ...
Face Recognition System using OpenCV
Face Recognition System using OpenCV
Imagus_Whitepaper_250515
Imagus_Whitepaper_250515
Imagus_Whitepaper_250515
Imagus_Whitepaper_250515
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert Management
Vehicle detection by using rear parts and tracking system
Vehicle detection by using rear parts and tracking system
Smart Surveillance System through Computer Vision
Smart Surveillance System through Computer Vision
Accenture video-analytics-operational-marketing-and-security-insights-from-cctv
Accenture video-analytics-operational-marketing-and-security-insights-from-cctv
IRJET- Border Security using Computer Vision
IRJET- Border Security using Computer Vision
Advance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCV
IRJET- Applications of Object Detection System
IRJET- Applications of Object Detection System
R E G U L A R P A P E RUser-centric privacy awareness in v.docx
R E G U L A R P A P E RUser-centric privacy awareness in v.docx
Layered City Surveillance
Layered City Surveillance
Más de IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Más de IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Último
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Call Girls in Nagpur High Profile
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
simmis5
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ranjana rawat
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
roncy bisnoi
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SIVASHANKAR N
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Call Girls in Nagpur High Profile
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Asutosh Ranjan
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
result management system report for college project
result management system report for college project
Tonystark477637
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
ranjana rawat
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
Call Girls in Nagpur High Profile Call Girls
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Call Girls in Nagpur High Profile
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
Último
(20)
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
result management system report for college project
result management system report for college project
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1231 i-SURVEILLANCE CRIME MONITORING AND PREVENTION USING NEURAL NETWORKS Malavika Nair1, Mathew Gillroy2, Neethu Jose3, Jasmy Davies4 1,2,3 B. Tech student, Department of Computer Science and Engineering, SCET, Kerala, India 4Assistant Professor, Department of Computer Science and Engineering, SCET, Kerala, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Closed Circuit Television Systems (CCTV) are becoming more and more popular and are being deployed in many housing estates, offices, and also in most public spaces. CCTV monitoring systems have been implemented in many American and European cities. As the number of cameraviews a single CCTV operator can handle is limited byhumanfactors, such monitoring systems makes for an enormous load for the CCTV operators. Here, in this project named i–Surveillance or Intelligent Surveillance System, we propose algorithms that are able to alert the human operator when: (1) Presence of a dangerous act, after setting zones of interestanddangerzones within those zones of interest,, the danger is detected when an object trespasses the danger zone, which can reduce the number of accidents in factories and suicides in certainplaces, (2) An abnormal behavior of a person such as handling some weapons or act of abuse or molestation is detected, which might be a potential threat. In this project, in order to allow for a real life application of the system, we focus on limiting the number of false alarms. Key Words: Behavioral Analysis, Security, Machine Learning, Image Processing, Neural Networks. 1. INTRODUCTION In recent years, we’ve seen that there has been amarkedand sustained growth in the use of Closed Circuit Television (CCTV) surveillance cameras in order to prevent crimes in public places in the USA and other Western nations. Amidst the associated public expenditure and the expansion,aswell as concerns about their social costs and efficacy, there is an increasing need for an evidence-based approach to inform CCTV practices and policies. Cases of harassment in work places are also becoming very serious. With the ever growing installation of advancedCCTVinfrastructure,almost entire cities can now be monitored, through the major purpose served by the same is purely evidential. It would only be natural to expect an alert or warning system for ongoing (or about to happen) mishaps and crimes, where timely action can be the difference between life and death. Such scenarios are expected to be monitored and identified by personnel viewing live footage. But as the number of CCTVsper unit are keeping rising, this approachisbecoming increasingly impractical. Thus what we require is a surveillance unit capable of thriving in these situations with negligible human input. We shall define a "situation of interest" or a “critical situation” as any sensitive situation that could possibly lead to the afore-mentioned predicaments. Consider the idea ofa smart surveillance which would be triggered ‘active’ only when the statistical chances of the situation being of "interest" are high. In office environments each room being independently monitored can respond to such a trigger by enabling the recording. At all other times the CCTV is not recording which helps in maintaining privacy and, if required, confidentiality of work. Cutting edge research and development leads to cut-throat competition and one can easily realize why traditional surveillance techniques might prove risky. The video feed would be recorded only under a "situation of interest" in case it needsto be documentedfora legal investigation. In the response to the above trigger could be an alert to be issued to the appropriate authorities along with certain alarms which could help inpreventingthe situation from escalating further. So, this validates the requirement for a system which could provide smart surveillance, while ensuring privacy and confidentiality. The surveillance camera activated for recording only when there is a situation of interest. The camera is inactive or it is not recording the video when there is no human presence. The human presence is checked using motion detection algorithm. When a crime is about to be committed, then the human is notified and an alarm system connected to the main system will be activated. 2. EXISTING SYSTEM The existing system of CCTV monitoring is done by humans and also the automated smart CCTV monitoringsystemsare not fully capable of making decisions and triggering actions. Surveillance in dynamic scenesattempts to recognize,detect and track certain objects from image sequences, and more generally to understand object behaviors. The objectiveisto develop an intelligent visual surveillance system for replacing the traditional passive video surveillance system, since the traditional passive video surveillance system proves ineffective as the number of cameras exceeds the capability of human operators to observe them. In addition to placing cameras in the place of human eyes, the goal of visual surveillance is to accomplish, as automatically as possible, the surveillance task. Visual surveillance in dynamic scenes has a wide range of potential applications, such as a security guard for communitiesand important buildings, traffic surveillancein cities expressways, detection of military target objects, etc. We focus in this paper on applications involving the
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1232 surveillance of people, vehicles, as they are typical of surveillance applications and include the full range of surveillance methods. Surveillance applications which involve people or vehicles include the following. a) Access control in special areas : Only those people with a special identity are allowed to enter in some security- sensitive locations such as important governmental offices and military bases. A biometric feature database including legal visiting members is built beforehand using biometric techniques. When someone is about to enter to thissecurity- sensitive location, the system automatically obtains the visitor’sfeatures, such astheir facial appearance, heightand walking gait from those images taken in real time situation. Based on this, the system is able to decide whether the visitor can be cleared for entry. b) Person-specific identification in certain scenes : The police can catch suspects with the help of personal identification at a distance by a smart surveillance system. The cops may build a database containing the biometric feature of suspects, and they may place visual surveillance systems at those places where the suspects are usually seen, such as subway stations, casinos, etc. The systemsareableto automatically recognize whether or not the people in view are suspects. If yes, then the alarms will be given immediately. Even though such systems with face recognition have already been used at public sites, their reliability is too low for police requirements. c) Crowd flux statistics and congestion analysis : The flux of people at important public areas such as stores, can be automatically computed by the surveillance systems, using techniques for human detection. It can then provide congestion analysis to assist in the management of the people. Similarly, expressways and junctionsoftheroadscan be monitored through visual surveillance systems, and further analyze the status of road congestion and traffic. d) Anomaly detection and alarming : At certain times, it is necessary to analyze the behaviors or characteristics of vehicles and people and to determine whether these characteristics are normal or abnormal. For example, abnormal behaviors indicative of theft,canbeanalyzedusing the visual surveillance systems, which can be placed in supermarkets and parking lots. Normally, there are many ways of giving an alarm. One of the ways is to make a recorded announcement automatically, whenever any abnormal behavior is detected. Another methodistocontact the police automatically. Fig-1 : Proposed System The image of a person being captured, tying him to a particular place, or the vehicle number plate being registered on footage are probably the most obvious and perhapswidespread cause of lossof privacy. Asthenumbers of CCTV cameras are increasing, the likelihood of the above happening is sure to increase. Drawbacks The system is used only on the army borders, but not into public places such as metro stations, big malls, etc. It is a complex mechanism. Individual safety level is not considered. Video is captured continuously, which can lead to privacy issues. The system used also doesn’t have an efficient alarm system that triggers automatically on an event of abuse, harassment or bullying. Lack of privacy as the image of victim is not blurred. 3. SYSTEM DESIGN In this paper, we use classification method for analyzing the video and to detect anomalies. A Graphical User Interface (GUI) is implemented for the automatic video surveillance. Here, when the login screen appears, the user can login to the application with the registered username and password. If the user credentialsare found to be correct,theapplication will show the options BROWSE and VIEW. Here, theusercan either provide a live webcam feed or choose a video by browsing the folders, and providing the correct path.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1233 The fed video is then converted into frames, and it is analyzed for checking abnormalities. We firstcheckwhether there are some human actions present in the frames. This checking is done with the help of the trained models. These trained models are compared with the actions presentinthe frame, in order to detect human presence in that frame. For this purpose of training, we require a dataset containing a set of images, and the dataset used here is HMDB51 (Human Motion Database 51). Next, we annotate theseframesusinga toollabelImg. Since there are quite a large number of videos, all these videos can be annotated only if it is converted into frames. This is done using a program, and the code iswritten in OpenCV using Python. Then, after saving all the frames as xml files, the train and test directories are separated. The usual procedure for separating train and testdirectoriesisas follows : 90% of the total xmls comprises the train directory 10% of the total xmls comprises the test directory The training data is used for creating the model, and while the training data is being trained, each model from the test directory is taken and tested with each model of the test directory. From this we can get the percentage loss in accuracy. At a particular point when the loss percentage graph becomes steady, the training may be stopped. Finally, the abnormality and itsaccuracy will be determined and shown as the output. 4. PROPOSED SYSTEM The proposed system deals with the current trend of security system i.e. inclusion of privacy concern, cost effectiveness, efficient alarm system. Conditional video recording is the major inclusion. At all timesthecameraison but not recording. It would keep on processing the frames it receives and would not capture it unless ‘triggered’. Activation of subroutines is done only when multiple personnel are detected. These subroutines involve image processing in conjunction to detect critical instances. Once enough baseline deviation is flagged, the situation ismarked as critical and recording is activated. The ideology is as follows: 1) In case the person is not alone, we activate the camerabut any documentations, notes, scribbling on a board or screens (which are to be considered confidential at all times)shallbe blanked out/blurred to avoid any leaks (any simple irreversible technique could be used). 2) Once it has been established that the person is not alone, we refine our analysis to identifying the number of people, their gender and other characteristics. We make use of human detection, gesture recognition and motion detection, and emotion detection. 3) Voice, just as video, is not to be recorded unless we discover a situation of interest. In public places privacy is no longer a pressing matter. So the subroutinesfor tracking and humandetectionarealways in operation in a conditional focus mode. By conditional focus we mean that we run only a preliminary test for critical situations. Once that is flagged, do we bring in our heavier classifiers involving both Video and Audio processing. This ensures a smoother real time operation. The approach, therefore, is to wait for a trigger to a critical situation and then to take the required action. It is worth mentioning that the classification boundary in this case should be a bit less stringent than the one above, the reason being that this system is not entirely self-sufficient and hence relieson human input. Thus, it would onlymakesense to slack the constraints so that even if false alarms are increased, the probability of a crime going unnoticed is considerably suppressed. The preliminary indicators for instance can be: rapid and jerky movements (in addition to “excited” audio signature) between individualscloserthana particular safeproximity. Once triggered recording initiates plusan alert signal is issued either directly to the authorities or a decision making moderator. There is not a lot of research on quantification of a strong theoretical framework for basing emotiondetectionthrough Image processing algorithms. Associative neural networks like CALM incorporate interpretation of human emotions through gestural cues. It is possible with higher resolution cameras to include facial expression analysis systems to categorize the physical expression of emotions, such as Facial Action Coding System (FACS). 5. METHODOLOGY The objective of our project is to design and implement a system to prevent crime and suicides by tracking human behavior through the analysis of video captured usingCCTV. The proposed system has multiple functionalities including preventing suicides, abnormal behavior and even attempts of abuse. The various modules of our project are as follows : 5.1 Video Capture CCTV Closed Circuit Television (CCTV) is used to monitor the scene. Video is not recorded until it is necessary i.e. video is recorded only when the person is not alone and when there are sudden movementsor actions. Closed Circuit Television, also known as video surveillance refers to the use of a CCTV or a video camera for transmitting a signal to a certain specified place on a limited set of monitors. CCTVschemesin public settings had small and non-statistically significant effects on crime: 7% reduction in city and town centers and 23% reduction in public transport settings. 5.2 Frame Capturing Videos are a continuous flow of frames or still images. Each frame is captured and processed to check for motion in the
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1234 scene. Motion in the scene means there’s some human activity in the scene. Human activity is confirmed by checking for faces or body patterns. A continuous video has thousands of frames. In order to save storage space, onlythe last 20 frames are kept for reference. Old framesget deleted when new ones arrive. 5.3 Motion Detection Motion in the scene is detected by analyzing the frames captured. This can be achieved by a technique called background subtraction wherein still objects in the scenes are eliminated by analyzing the position of each objectinthe stored frames. If the position of object is changed, the object is flagged to be a moving object. To ensure that it is a human, face patterns or body patterns are matched with saved shapes. 5.4 Frame Analysis For video analysis we base our processing on a standard multiple moving objects tracking algorithm. Theapproachis to use a background subtraction based on Gaussian mixture models to segment out the moving objects. After the foreground is de-noised, blob detection is run and the connected pixels are bounded in a box which istobetracked. The motion tracking is achieved by a Kalman filter. After observing the object for a set number of frames, the Kalman Filter then estimates the position of the object insubsequent frames (all the while observing the actual motion that happens and recording the errors for use in future pre dictions). Then behavior of moving character is analyzed using behavioral analysis algorithm to check for any act of abuse, bullying or harassment. 5.5 TensorFlow TensorFlow is basically an open source software librarythat is used for numerical computation using data flow graphs. Each node in the data flow graph represents certain mathematical operations, and the edges of the graph represent the multidimensional data arrays, commonly known as tensors, communicated between them. TensorFlow Object Detection API : One ofthecorechallenges in computer vision is to create accurate machine learning models, which are capable of identifying and localizing multiple objects in a single image. It is an open source framework built on top of TensorFlow that makes it easy to deploy, train and construct object detection models. 5.5 HMDB51 HMDB refers to Human Motion Database. There areatotalof 6847 video clips in this dataset, and these clips are divided into certain action categories, 51 in number.Eachofthese51 action categories contain a minimum of 101 video clips, which is extracted from a range of sources. Theseactionscan be categorized as follows : 1. General facial actions : laugh, talk, smile, chew. 2. Facial actions with object manipulation : drink, smoke, eat. 3. General body movements : clapping hands, pull up, climb stairs, fall on the floor, jump, push up, run, sit down, dive, sit up, somersault, stand up, backhand flip, turn, walk, wave. 4. Body movements with object interaction : brush hair, catch, hit something, kick ball, pick, push something, ride bike, golf, ride horse, shoot ball, shoot gun, draw sword, sword exercise, throw. 5. Body movements for human interaction : hug, kiss, fencing, punch, kick someone, shake hands, sword fight. There is no pre-processing done on the video clips. A three - level grading of video quality is applied to evaluate the huge set of clips. Only those video samples are rated “good” which have the quality that you canidentifythesingle fingersduring the motion. Those sampleswhich donotmeet this requirement are rated either “bad” or “medium” if some of the limbs or body parts vanish while the action is being executed. 6. RESULT AND DISCUSSION In this paper, the result is the final design of the project on topic “i - Surveillance : Crime Monitoring and Prevention Using Neural Networks”. Since there is a GUI implemented, the user is able to login and then choose from livewebcam feed or browse the video from some locations. Here, algorithms have been designed that can alert the human operator when the presence of a dangerous act, or an abnormal behavior of a person is detected. This can assure safety in public places aswell asin other locations. The major advantage of the project includes efficiency, fast to accessand uniqueness. The behavioral analysisalgorithm also makes it easier for the CCTV operators to monitor the CCTV systems and prevent crimes. Fig-2 : Login Screen
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1235 Fig-3 : Option for Live webcam or Browse from folder Fig-4 : Detection of smoking Fig-5 : Detection of hitting with something 7. CONCLUSION Surveillance by using CCTV systems has reached to its best level. Also, sending information or data through data networks to servers is common these days, but coupling these two surveillance and data transmission processes is a very challenging work. CCTV surveillancesystemsaremostly implemented and managed by governments. So, using CCTV systems information has many security problems and it is very difficult to handle. In this project named i-SURVEILLANCE, we proposed algorithms that are able to alert the human operator when an abandoned luggage, presence of a dangerous act, or an abnormal behaviour of a person is detected. We focused on limiting the number of false alarms in order to allow for a real life application of the system. This proposed system can be used at low scale in first phase where security issues are less or easy to handle. In the future, we will enhance the proposed system tracking algorithm by using the Enhanced Filter model that will consider the multiple sensing data of mobile user with network connected CCTV environment. ACKNOWLEDGEMENT We would like to express our immense gratitude and profound thanks to all those who helped us to make this project a great success. At the very outset we express our thanks to the Almighty God for all the blessings endowed on us. We can hardly find words to express our deep appreciation for the help and warm encouragement that we have received from our project guide Mrs. Jasmy Davies, Assistant Professor, Sahrdaya College of Engineering & Technology and also our project coordinators Mr. Willson Joseph C. and Mrs. Anusree K, Assistant Professors,Sahrdaya College of Engineering & Technology. We would also extend our deep sense of gratitude to all other faculties for their help and advice throughout the advancement of this project. We are extremely thankful to our parents and friends for being with us as a constant source of inspiration. REFERENCES [1] Choi Woo Chul and Na Joon Yeop, “Relative Importance for Crime Prevention Technologies as Part of Smart City based on Spatial Information”, IEEE Journal, Smart Cities Symposium Prague, 13 July 2017 [2] Robin Singh Sidhu and Mrigank Sharad, “Smart Surveillance System for Detecting Interpersonal Crime”, presented in International Conference on Communication and Signal Processing, April 6-8, 2016, published in IEEE Journal, 24 November 2016 [3] Aniket Bhondave, Bhagyawant Biradar, Vishal Suryavanshi and Harshal Nakil, “SuspiciousObjectDetection Using Back-Tracing Technique”, International Journal of
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1236 Advanced Research in Computer and Communication Engineering Volume 5, Issue 1, January 2016 [4]Yuchae Jung and Yongik Yoon, “Behavior TrackingModel in Dynamic Situation using the risk ratio EM”, IEEE Journal, 12 March 2015 [5] Swapnali Rayte, Rohini Bhamare, Kaustubh Barhate and Mahendra Sonawane, “Crime Monitoring and Controlling System by Mobile Device”, International Journal on Recent and Innovation Trends in Computing and Communication, Volume 3, Issue 1, January 2015 [6] Huang J, Rathod V, Sun C, Zhu M, Korattikara A, Fathi A, Fischer I, Wojna Z, Song Y, Guadarrama S, Murphy K, "Speed/accuracy trade-offsfor modern convolutionalobject detectors", CVPR 2017 [7] H. Kuehne, H. Jhuang, E. Garrote, T. Poggio, and T. Serre, “HMDB: A Large Video Database for Human Motion Recognition”, ICCV, 2011. BIOGRAPHIES Malavika Nair is currently pursuing Bachelor of Technology in Computer Science & Engineering in Sahrdaya College of Engineering & Technology, Kodakara affiliated to Calicut University. Mathew Gillroy is currently pursuing Bachelor of Technology in Computer Science & Engineering in Sahrdaya College of Engineering & Technology, Kodakara affiliated to Calicut University. Neethu Jose is currently pursuing Bachelor of Technology in Computer Science & Engineering in Sahrdaya College of Engineering & Technology, Kodakara affiliated to Calicut University. Jasmy Davies is currently working as the Assistant Professor in Computer Science & Engineering departmentin Sahrdaya College of Engineering & Technology, Kodakara affiliated to Calicut University.
Descargar ahora