SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 477
Threat Detection in Hostile Environment with Deep Learning based on
Drone’s Vision
Sufiyan Shaikh1, Rushikesh Raskar2, Lajri Pande3, Zeenat Khan4, Prof Shweta P.Guja5
1,2,3,4B.E student, Dept. of computer, NBN Sinhgad School of Engineering, Ambegaon, Pune-411041,
Maharashtra, India
5Prof. ,Dept of Engineering, NBN Sinhgad School of Engineering, Ambegaon, Pune-411041,
Maharashtra, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - We consider a video surveillanceapplication, using
fa camera mounted on a drone flying over the area to be
monitored and sending the video to a control center. The
resulting network is composed of a static component, and a
moving component (Drone). The video signal will be
transferred via radio signal to the control center. The control
center will be equipped with AI/Ml enabled application which
will be able to detect what is in the frame. This system is very
useful in hostile environment where we need to examine the
whole area before proceeding and where the involvement of
human being is dangerous to his life. This drone will the video
feed with minimum to very low latency. The drone will be
stealth and will make low noice which will make it difficult to
be easily noticed
1. INTRODUCTION
Nowadays, the interest and demand in a droneareincreased
very much. Due to this increase in demands, drone
merchandise of newer types is being designed and
manufactured, so that civilians can afford to buy them for
various purposes (i.e., research, leisure,etc.).Asforthisshift,
the commercial drone industry keeps on growing.
There has been a massive production in commercial drones
to satisfy the civilian's needs, but this has a drawback. As it
became easier to spot drones outdoors, more safety issues
have been brought up as concerns. These are not merely
about accidents regarding drones harming individuals, but
include drones invading government restricted areas.
Additionally, consideringthata coordinatedfleetofdronesis
capable of more various tasks, drones can be a bigger threat
than people could imagine. As there are more drones out in
public, it became harder to regulate them legally and safely.
When it comes to the field of detection, the first thing that
comes to mind is a radar. Radar can be bigger or smaller in
size depending upon the application.
In this paper, we propose a comprehensive drone detection
system based on machine learning as an alternativesolution
for the aforementioned matter. This system applies object
detection to capture the possible threats in the image. Our
system can be applied in an environment with surveillance
drones with the following scenario. During its mission, the
surveillance drone will take off from the start position and
fly to a specified point and then record its surroundings on
camera. If there is any vulnerability or threats, it will be
found on the video frame by applying object detection and
the system will mark it on the frame. The marked frame is
then used further. The system which has learned various
threats through machine learning identifies the threat by
using the model. Such-system can be applied to another
surveillance system such as complement it is applied to the
other ability to find unknown threats.
For image processing, the system uses GPU with CUDA
programming on the video frames. In each frame, the object
detection algorithm is applied to spot the threat in the video
frames. Specifically, the YOLOalgorithmisadaptedforobject
detection. With the help of machine learning based on
various threat images, which are given and processed
beforehand, the system learns how to detect the threats
accurately from frames. Then, frames with threats detected
are processed once more to identify the threat model type
2. RELATED WORK
In this section, we introduce various researches relevant to
our research. The content of this paper can be summarized
as a drone detection and identification system based on
image processing and machine learning. YOLO is applied for
object detection. This technique has three key
characteristics. One is that by using Integral Image, features
used by the detector can be computed very quickly, making
its computation complexity O (1).Two is the method
constructing the classifier by selecting a small number
important feature using a learning algorithm,yieldinga very
efficient classifier. Three is the method for combining
increasingly more complex classifiers in cascade fashion,
making it dramatically fast.
Recently, deep learninghasbeenapplied,inmanystudies
in image processing field. Among the deep neural network
structures, Convolutional Neural Network (CNN) has been
gaining great interest because it automatically detects the
important features during its learning phase. It has already
shown performance breakthroughs in image classification
and object detection. The reason why CNN shows great
performance in extracting feature is its capability in
extracting abstract features. This allows it process with
greater accuracy and speed. In this paper, threat
identification is based on supervised learning. Supervised
learning is a systematicallymoreadjustedCNN,andhasbeen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 478
applied. It has been gaining recognition by showing better
performance than unsupervised learning.
Fig. 1: Process of Drone Detection and Identification System.
Based on the aforementioned researches, we have chosen
CNN to increase speed and efficiency. The two modules
implemented in this system requires learning based on
images. As it heavily relies on machine learning, with careful
calibration and sufficient learning, the system can show
better performance.
3. SYSTEM DESIGN AND IMPLEMENTATION
In this section, we describe our proposed system and
implementation details. We first explain the overall system.
Then, we describe each modules in detail.
3.1 Overall System
The proposed system is designed to be on top of a computing
board established on each surveillance drones. After going
through the process described in Fig.1, the drones are to
report to the Ground Control Station (GCS).
3.2 Threat Detector Module
The threat detector is module that detects threats on video
frames taken by the camera on the drones. Accurate 2D
detection on the frame iskeytotheoverallsystem.Therefore,
to ensure accuracy while maintaining speed, our system
adapts YOLOalgorithmandOpenCVlibraries.Fortrainingthe
classifier, weused 2088positiveexamplesand3019negative
examples. We collected the positive examples from Google,
and manual cropped the drone from every images. Negative
examples were collected fromhttp://face.urtho.net/.By
applying image distortion on the positive examples, we
expanded our positive example pool to 7000. Based on these
positive images, we trained our Classifier. The trained
classifier finds the 2D area on the frame, where the threat is
located. Then, the area is cropped, andpassedontothedrone
identifier module.
3.3 Threat Identifier Module
The threat identifier is a module that classifies the unknown
threat into vendor models based on the cropped image. To
identify the type of the thread, a CNN is constructed. Threat
detection and threat identificationcanbedonebyothertypes
of deep learning such as ResNet or Raster R-CNN. However,
due to its depth, it would take a very long time for training,
and the complexity is too great to construct. To overcome
this, wehave separated the system intoaclassifierandaCNN
forprocessing. Additionally, thisallowsustotrainfasterwith
fewer image. The CNN consists of two Conv layers and two
fully connected layers. Each fully connected layer are
implemented with a 30 percent dropout. For the activation
function, Rectified Linear Unit (ReLu) is used, and Adaptive
Motion Estimation (Adam) is used for the gradient descent
algorithm.
4. PERFOMANCE EVALUAITON
In this section, we show our experiment results and
performance analysis. First, we show how the threat
detection module works. Then, we analyze the performance
of the threat identifier module. In the system, we use the
YOLO algorithm for object detection. The YOLO is a very fast
real-time multi-object detection algorithm. YOLO stands for
“You Only Look Once”. This algorithm applies a neural
network to an entire image. The image is divided by the
network into an S x S grid and gives the result with bounding
boxes, which are boxes drawn around images and predicted
probabilities for each of these regions. The method used to
come up with these probabilities is logistic regression. The
bounding boxes are weightedby theassociatedprobabilities.
For class prediction, independentlogisticclassifiersareused.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 479
4.1 Threat Detector Experiment
Before running the threat detector module, it is required to
go through a learning phase. For the learning, the images
collected from Google has been used for the drone detectors
supervised learning. After using the 2088 positive example
images, we have prepared 829 test images for testing the
performance of the system. These test images were not used
for the learning process, and have only been used for
performance
evaluation. This is to validate that our system can still detect
threats from unfamiliar images that has not been exposed.
The detection results of the threat detector. As shown in the
image, if the system estimates that there is a threat in the
image, then the area, where the threat is expected to be, is
marked in a rectangular box.
4.2 Threat Identifier Experiment
The threat identifier is to identify the threat model.The2088
positive example images were all manually labeled. 1777
image among the positive example images were used for
training, and 429 were used as evaluation test images.
Minibatch with 256 batch size was used for training. The
threat identifier shows maximum of 91.6 percent accuracy.
False classification are only made in cases that are quite
challanging even for the human eyes. Shows that the system
reaches its maximum accuracy within a few iteration, and
saturates around 89 percent.
This experiment proves that Deep CNN is very efficient for
classifying threat by model using a drone equipped with a
camera. Additionally, it shows that it doesnt requires much
training data.
5. CONCLUSIONS
In this paper, weproposeathreatdetectionandidentification
system making decision based on video free obtained from a
camera which is placed on a drone. This system has shown
that even with simple artificial intelligence, the performance
is very promising. All systems were actually implemented,
and training data were collected from the web. With small
amount of easily collectable training data, the system still
showed great accuracy, which makes it more appealing. For
future work, we would like to develop a distance estimation
module to complement the existing system. Based images,
estimating the distance between the surveillance drone and
the unknown threatscan be valuable information,andcanbe
used for tracking. Although commercial drones have been
massively produced to satisfy the civilian's needs, therehave
been some downsides to this.
As it became easier to spot drones outdoors, more safety
issues have been brought up as concerns. These are not
merely about accidents regarding drones harming
individuals, but include drones invading government
restricted areas.
The major need for this type of technology will be in the area
of detection. The drone can be used for detecting harmful
threads, it can be used for detecting any vulnerability in the
crowded areas. The system which will internally, can be
trained to detect anything with maximum possible accuracy.
The camera mounted on the drone will feed the video signal
to the algorithm which will identify the elements of interest
and createa bounding box and also predict the probability of
accuracy of the identification.
REFERENCES
[1] S. Yoo, J. Jung, A. Y. Chung, K. Kim, J. Lee, S. Park, S. K. Lee,
H. K. Lee, and H. Kim, “Empowering drones teamwork
with airborne network,” in Advanced Information
Networking and Applications (AINA), 2017 IEEE 31st
International Conference on. IEEE, 2017, pp. 678–685.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 480
[2] J. Jung, S. Yoo, W. La, D. Lee, M. Bae, and H. Kim, “Avss:
Airborne video surveillance system,” Sensors, vol. 18,
no. 6, p. 1939, 2018.
[3] S. Cook, CUDA programming: a developer’s guide to
parallel computing with GPUs. Newnes, 2012.
[4] P. Viola and M. Jones, “Rapid object detection using a
boosted cascade of simple features,” in ComputerVision
and Pattern Recognition, 2001. CVPR 2001.Proceedings
of the 2001 IEEE Computer Society Conference on, vol.
1. IEEE, 2001, pp. I–I.
[5] K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual
learning for image recognition,” in Proceedings of the
IEEE conference on computer vision and pattern
recognition, 2016, pp. 770–778.
[6] S. Ren, K. He, R. Girshick, and J. Sun, “Faster r-cnn:
Towards real-timeobjectdetection withregionproposal
networks,” in Advances in neural information
processing systems, 2015, pp. 91–99.
[7] W. Shi, J. Caballero, F. Husz´ar, J. Totz, A. P. Aitken, R.
Bishop, D. Rueckert, and Z. Wang, “Real-time single
image and video superresolution using an efficient sub-
pixel convolutional neural network,” in Proceedings of
the IEEE Conference on Computer Vision and Pattern
Recognition, 2016, pp. 1874–1883.
[8] C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D.
Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich,
“Going deeper with convolutions,” in Proceedings of the
IEEE conference on computer vision and pattern
recognition, 2015, pp. 1–9.
[9] Y. LeCun, Y. Bengio, and G. Hinton, “Deep learning,”
nature, vol. 521, no. 7553, p. 436, 2015.

Más contenido relacionado

La actualidad más candente

Airport security 2013 cyber security panel discussion
Airport security 2013   cyber security panel discussionAirport security 2013   cyber security panel discussion
Airport security 2013 cyber security panel discussion
Russell Publishing
 
Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!
Tammy Clark
 

La actualidad más candente (19)

Weekly UAV Threat Intelligence - DroneSec Notify #42
Weekly UAV Threat Intelligence - DroneSec Notify #42Weekly UAV Threat Intelligence - DroneSec Notify #42
Weekly UAV Threat Intelligence - DroneSec Notify #42
 
Cyber security in_next_gen_air_transportation_system_wo_video
Cyber security in_next_gen_air_transportation_system_wo_videoCyber security in_next_gen_air_transportation_system_wo_video
Cyber security in_next_gen_air_transportation_system_wo_video
 
403 13
403 13403 13
403 13
 
Verifying Multimedia Content on the Internet
Verifying Multimedia Content on the InternetVerifying Multimedia Content on the Internet
Verifying Multimedia Content on the Internet
 
Airport security 2013 cyber security panel discussion
Airport security 2013   cyber security panel discussionAirport security 2013   cyber security panel discussion
Airport security 2013 cyber security panel discussion
 
Using Drones in Utilities - Current use cases, some 'features' & the future o...
Using Drones in Utilities - Current use cases, some 'features' & the future o...Using Drones in Utilities - Current use cases, some 'features' & the future o...
Using Drones in Utilities - Current use cases, some 'features' & the future o...
 
Wind Turbine Inspection
Wind Turbine InspectionWind Turbine Inspection
Wind Turbine Inspection
 
An Update on Drone Regulations - EU U-Space & US UTM ...
An Update on Drone Regulations - EU U-Space & US UTM ...An Update on Drone Regulations - EU U-Space & US UTM ...
An Update on Drone Regulations - EU U-Space & US UTM ...
 
Technology for national security
Technology for national securityTechnology for national security
Technology for national security
 
Mobile Malwares Analysis - Garvit Arya
Mobile Malwares Analysis - Garvit AryaMobile Malwares Analysis - Garvit Arya
Mobile Malwares Analysis - Garvit Arya
 
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World Airports
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World AirportsCybersecurity - Dominic Nessi, Former CIO, Los Angeles World Airports
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World Airports
 
Application of science & technology in security management
Application of science & technology in security managementApplication of science & technology in security management
Application of science & technology in security management
 
Csa dar-air-pitch-deck-102316
Csa dar-air-pitch-deck-102316Csa dar-air-pitch-deck-102316
Csa dar-air-pitch-deck-102316
 
Mapping with Unmanned Airborne Systems (UAS)
Mapping with Unmanned Airborne Systems (UAS)Mapping with Unmanned Airborne Systems (UAS)
Mapping with Unmanned Airborne Systems (UAS)
 
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016
 
Securing Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest VersionSecuring Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest Version
 
Laser Hazard in Aviation
Laser Hazard in AviationLaser Hazard in Aviation
Laser Hazard in Aviation
 
IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...
 
Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!
 

Similar a IRJET- Threat Detection in Hostile Environment with Deep Learning based on Drone’s Vision

Similar a IRJET- Threat Detection in Hostile Environment with Deep Learning based on Drone’s Vision (20)

ROAD POTHOLE DETECTION USING YOLOV4 DARKNET
ROAD POTHOLE DETECTION USING YOLOV4 DARKNETROAD POTHOLE DETECTION USING YOLOV4 DARKNET
ROAD POTHOLE DETECTION USING YOLOV4 DARKNET
 
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert Management
 
IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe Model
 
Real Time Moving Object Detection for Day-Night Surveillance using AI
Real Time Moving Object Detection for Day-Night Surveillance using AIReal Time Moving Object Detection for Day-Night Surveillance using AI
Real Time Moving Object Detection for Day-Night Surveillance using AI
 
YOLOv4: A Face Mask Detection System
YOLOv4: A Face Mask Detection SystemYOLOv4: A Face Mask Detection System
YOLOv4: A Face Mask Detection System
 
Object and Currency Detection for the Visually Impaired
Object and Currency Detection for the Visually ImpairedObject and Currency Detection for the Visually Impaired
Object and Currency Detection for the Visually Impaired
 
PERSONAL PROTECTIVE EQUIPMENT DETECTION AND MACHINE POWER CONTROL USING IMAGE...
PERSONAL PROTECTIVE EQUIPMENT DETECTION AND MACHINE POWER CONTROL USING IMAGE...PERSONAL PROTECTIVE EQUIPMENT DETECTION AND MACHINE POWER CONTROL USING IMAGE...
PERSONAL PROTECTIVE EQUIPMENT DETECTION AND MACHINE POWER CONTROL USING IMAGE...
 
GUARDIAN:AI Supervision Patrol Drone For Defence And FederalSector
GUARDIAN:AI Supervision Patrol Drone For Defence And FederalSectorGUARDIAN:AI Supervision Patrol Drone For Defence And FederalSector
GUARDIAN:AI Supervision Patrol Drone For Defence And FederalSector
 
Smart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionSmart Surveillance System through Computer Vision
Smart Surveillance System through Computer Vision
 
IRJET- DocLock Application for Secure Document Sharing
IRJET- DocLock Application for Secure Document SharingIRJET- DocLock Application for Secure Document Sharing
IRJET- DocLock Application for Secure Document Sharing
 
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
 
IRJET- Applications of Object Detection System
IRJET-  	  Applications of Object Detection SystemIRJET-  	  Applications of Object Detection System
IRJET- Applications of Object Detection System
 
Object Detection and Localization for Visually Impaired People using CNN
Object Detection and Localization for Visually Impaired People using CNNObject Detection and Localization for Visually Impaired People using CNN
Object Detection and Localization for Visually Impaired People using CNN
 
Helmet Detection Based on Convolutional Neural Networks
Helmet Detection Based on Convolutional Neural NetworksHelmet Detection Based on Convolutional Neural Networks
Helmet Detection Based on Convolutional Neural Networks
 
IRJET- Border Security using Computer Vision
IRJET- Border Security using Computer VisionIRJET- Border Security using Computer Vision
IRJET- Border Security using Computer Vision
 
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEMDEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
 
DYNAMIC ENERGY MANAGEMENT USING REAL TIME OBJECT DETECTION
DYNAMIC ENERGY MANAGEMENT USING REAL TIME OBJECT DETECTIONDYNAMIC ENERGY MANAGEMENT USING REAL TIME OBJECT DETECTION
DYNAMIC ENERGY MANAGEMENT USING REAL TIME OBJECT DETECTION
 
ASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOTASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOT
 
Safety Helmet Detection in Engineering and Management
Safety Helmet Detection in Engineering and ManagementSafety Helmet Detection in Engineering and Management
Safety Helmet Detection in Engineering and Management
 
IRJET- Object Detection in an Image using Convolutional Neural Network
IRJET- Object Detection in an Image using Convolutional Neural NetworkIRJET- Object Detection in an Image using Convolutional Neural Network
IRJET- Object Detection in an Image using Convolutional Neural Network
 

Más de IRJET Journal

Más de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Último

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 

Último (20)

kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 

IRJET- Threat Detection in Hostile Environment with Deep Learning based on Drone’s Vision

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 477 Threat Detection in Hostile Environment with Deep Learning based on Drone’s Vision Sufiyan Shaikh1, Rushikesh Raskar2, Lajri Pande3, Zeenat Khan4, Prof Shweta P.Guja5 1,2,3,4B.E student, Dept. of computer, NBN Sinhgad School of Engineering, Ambegaon, Pune-411041, Maharashtra, India 5Prof. ,Dept of Engineering, NBN Sinhgad School of Engineering, Ambegaon, Pune-411041, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - We consider a video surveillanceapplication, using fa camera mounted on a drone flying over the area to be monitored and sending the video to a control center. The resulting network is composed of a static component, and a moving component (Drone). The video signal will be transferred via radio signal to the control center. The control center will be equipped with AI/Ml enabled application which will be able to detect what is in the frame. This system is very useful in hostile environment where we need to examine the whole area before proceeding and where the involvement of human being is dangerous to his life. This drone will the video feed with minimum to very low latency. The drone will be stealth and will make low noice which will make it difficult to be easily noticed 1. INTRODUCTION Nowadays, the interest and demand in a droneareincreased very much. Due to this increase in demands, drone merchandise of newer types is being designed and manufactured, so that civilians can afford to buy them for various purposes (i.e., research, leisure,etc.).Asforthisshift, the commercial drone industry keeps on growing. There has been a massive production in commercial drones to satisfy the civilian's needs, but this has a drawback. As it became easier to spot drones outdoors, more safety issues have been brought up as concerns. These are not merely about accidents regarding drones harming individuals, but include drones invading government restricted areas. Additionally, consideringthata coordinatedfleetofdronesis capable of more various tasks, drones can be a bigger threat than people could imagine. As there are more drones out in public, it became harder to regulate them legally and safely. When it comes to the field of detection, the first thing that comes to mind is a radar. Radar can be bigger or smaller in size depending upon the application. In this paper, we propose a comprehensive drone detection system based on machine learning as an alternativesolution for the aforementioned matter. This system applies object detection to capture the possible threats in the image. Our system can be applied in an environment with surveillance drones with the following scenario. During its mission, the surveillance drone will take off from the start position and fly to a specified point and then record its surroundings on camera. If there is any vulnerability or threats, it will be found on the video frame by applying object detection and the system will mark it on the frame. The marked frame is then used further. The system which has learned various threats through machine learning identifies the threat by using the model. Such-system can be applied to another surveillance system such as complement it is applied to the other ability to find unknown threats. For image processing, the system uses GPU with CUDA programming on the video frames. In each frame, the object detection algorithm is applied to spot the threat in the video frames. Specifically, the YOLOalgorithmisadaptedforobject detection. With the help of machine learning based on various threat images, which are given and processed beforehand, the system learns how to detect the threats accurately from frames. Then, frames with threats detected are processed once more to identify the threat model type 2. RELATED WORK In this section, we introduce various researches relevant to our research. The content of this paper can be summarized as a drone detection and identification system based on image processing and machine learning. YOLO is applied for object detection. This technique has three key characteristics. One is that by using Integral Image, features used by the detector can be computed very quickly, making its computation complexity O (1).Two is the method constructing the classifier by selecting a small number important feature using a learning algorithm,yieldinga very efficient classifier. Three is the method for combining increasingly more complex classifiers in cascade fashion, making it dramatically fast. Recently, deep learninghasbeenapplied,inmanystudies in image processing field. Among the deep neural network structures, Convolutional Neural Network (CNN) has been gaining great interest because it automatically detects the important features during its learning phase. It has already shown performance breakthroughs in image classification and object detection. The reason why CNN shows great performance in extracting feature is its capability in extracting abstract features. This allows it process with greater accuracy and speed. In this paper, threat identification is based on supervised learning. Supervised learning is a systematicallymoreadjustedCNN,andhasbeen
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 478 applied. It has been gaining recognition by showing better performance than unsupervised learning. Fig. 1: Process of Drone Detection and Identification System. Based on the aforementioned researches, we have chosen CNN to increase speed and efficiency. The two modules implemented in this system requires learning based on images. As it heavily relies on machine learning, with careful calibration and sufficient learning, the system can show better performance. 3. SYSTEM DESIGN AND IMPLEMENTATION In this section, we describe our proposed system and implementation details. We first explain the overall system. Then, we describe each modules in detail. 3.1 Overall System The proposed system is designed to be on top of a computing board established on each surveillance drones. After going through the process described in Fig.1, the drones are to report to the Ground Control Station (GCS). 3.2 Threat Detector Module The threat detector is module that detects threats on video frames taken by the camera on the drones. Accurate 2D detection on the frame iskeytotheoverallsystem.Therefore, to ensure accuracy while maintaining speed, our system adapts YOLOalgorithmandOpenCVlibraries.Fortrainingthe classifier, weused 2088positiveexamplesand3019negative examples. We collected the positive examples from Google, and manual cropped the drone from every images. Negative examples were collected fromhttp://face.urtho.net/.By applying image distortion on the positive examples, we expanded our positive example pool to 7000. Based on these positive images, we trained our Classifier. The trained classifier finds the 2D area on the frame, where the threat is located. Then, the area is cropped, andpassedontothedrone identifier module. 3.3 Threat Identifier Module The threat identifier is a module that classifies the unknown threat into vendor models based on the cropped image. To identify the type of the thread, a CNN is constructed. Threat detection and threat identificationcanbedonebyothertypes of deep learning such as ResNet or Raster R-CNN. However, due to its depth, it would take a very long time for training, and the complexity is too great to construct. To overcome this, wehave separated the system intoaclassifierandaCNN forprocessing. Additionally, thisallowsustotrainfasterwith fewer image. The CNN consists of two Conv layers and two fully connected layers. Each fully connected layer are implemented with a 30 percent dropout. For the activation function, Rectified Linear Unit (ReLu) is used, and Adaptive Motion Estimation (Adam) is used for the gradient descent algorithm. 4. PERFOMANCE EVALUAITON In this section, we show our experiment results and performance analysis. First, we show how the threat detection module works. Then, we analyze the performance of the threat identifier module. In the system, we use the YOLO algorithm for object detection. The YOLO is a very fast real-time multi-object detection algorithm. YOLO stands for “You Only Look Once”. This algorithm applies a neural network to an entire image. The image is divided by the network into an S x S grid and gives the result with bounding boxes, which are boxes drawn around images and predicted probabilities for each of these regions. The method used to come up with these probabilities is logistic regression. The bounding boxes are weightedby theassociatedprobabilities. For class prediction, independentlogisticclassifiersareused.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 479 4.1 Threat Detector Experiment Before running the threat detector module, it is required to go through a learning phase. For the learning, the images collected from Google has been used for the drone detectors supervised learning. After using the 2088 positive example images, we have prepared 829 test images for testing the performance of the system. These test images were not used for the learning process, and have only been used for performance evaluation. This is to validate that our system can still detect threats from unfamiliar images that has not been exposed. The detection results of the threat detector. As shown in the image, if the system estimates that there is a threat in the image, then the area, where the threat is expected to be, is marked in a rectangular box. 4.2 Threat Identifier Experiment The threat identifier is to identify the threat model.The2088 positive example images were all manually labeled. 1777 image among the positive example images were used for training, and 429 were used as evaluation test images. Minibatch with 256 batch size was used for training. The threat identifier shows maximum of 91.6 percent accuracy. False classification are only made in cases that are quite challanging even for the human eyes. Shows that the system reaches its maximum accuracy within a few iteration, and saturates around 89 percent. This experiment proves that Deep CNN is very efficient for classifying threat by model using a drone equipped with a camera. Additionally, it shows that it doesnt requires much training data. 5. CONCLUSIONS In this paper, weproposeathreatdetectionandidentification system making decision based on video free obtained from a camera which is placed on a drone. This system has shown that even with simple artificial intelligence, the performance is very promising. All systems were actually implemented, and training data were collected from the web. With small amount of easily collectable training data, the system still showed great accuracy, which makes it more appealing. For future work, we would like to develop a distance estimation module to complement the existing system. Based images, estimating the distance between the surveillance drone and the unknown threatscan be valuable information,andcanbe used for tracking. Although commercial drones have been massively produced to satisfy the civilian's needs, therehave been some downsides to this. As it became easier to spot drones outdoors, more safety issues have been brought up as concerns. These are not merely about accidents regarding drones harming individuals, but include drones invading government restricted areas. The major need for this type of technology will be in the area of detection. The drone can be used for detecting harmful threads, it can be used for detecting any vulnerability in the crowded areas. The system which will internally, can be trained to detect anything with maximum possible accuracy. The camera mounted on the drone will feed the video signal to the algorithm which will identify the elements of interest and createa bounding box and also predict the probability of accuracy of the identification. REFERENCES [1] S. Yoo, J. Jung, A. Y. Chung, K. Kim, J. Lee, S. Park, S. K. Lee, H. K. Lee, and H. Kim, “Empowering drones teamwork with airborne network,” in Advanced Information Networking and Applications (AINA), 2017 IEEE 31st International Conference on. IEEE, 2017, pp. 678–685.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 480 [2] J. Jung, S. Yoo, W. La, D. Lee, M. Bae, and H. Kim, “Avss: Airborne video surveillance system,” Sensors, vol. 18, no. 6, p. 1939, 2018. [3] S. Cook, CUDA programming: a developer’s guide to parallel computing with GPUs. Newnes, 2012. [4] P. Viola and M. Jones, “Rapid object detection using a boosted cascade of simple features,” in ComputerVision and Pattern Recognition, 2001. CVPR 2001.Proceedings of the 2001 IEEE Computer Society Conference on, vol. 1. IEEE, 2001, pp. I–I. [5] K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2016, pp. 770–778. [6] S. Ren, K. He, R. Girshick, and J. Sun, “Faster r-cnn: Towards real-timeobjectdetection withregionproposal networks,” in Advances in neural information processing systems, 2015, pp. 91–99. [7] W. Shi, J. Caballero, F. Husz´ar, J. Totz, A. P. Aitken, R. Bishop, D. Rueckert, and Z. Wang, “Real-time single image and video superresolution using an efficient sub- pixel convolutional neural network,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2016, pp. 1874–1883. [8] C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich, “Going deeper with convolutions,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2015, pp. 1–9. [9] Y. LeCun, Y. Bengio, and G. Hinton, “Deep learning,” nature, vol. 521, no. 7553, p. 436, 2015.