SlideShare a Scribd company logo
1 of 14
Department of Computer Science & Engineering
B. Tech IV-II project
A Deep Learning-Based Efficient Firearms Monitoring
Technique for Building Secure Smart Cities
Student Names Roll Number Guide
K. Silpa 20W51A0535
Mrs. Y. JYOTHSNA M. Tech
M. Mounika 20W51A0540
K. Mohammad Sharif 20W51A0533
K. Pallavi 20W51A0532
A Deep Learning-Based Efficient Firearms
Monitoring Technique for Building Secure Smart
Cities
AGENDA
1. Abstract
2. Existing system
3. Proposed system
4. Literature survey
5. Hardware requirements
6. Software requirements
7. References
ABSTRACT
Firearm-related deaths are currently a global
phenomenon. It is a threat to society and a challenge to law
enforcement agencies. A significant portion of such crimes
happen in semi-urban areas or cities. Governments and private
organizations use CCTV-based surveillance extensively today
for prevention and monitoring. However, human-based
monitoring requires a significant amount of person-hours as a
resource and is prone to mistakes . The project main focus is
to showcase that deep learning-based techniques can be used
in combination to detect firearms (particularly guns). This
project uses different detection techniques, such as Faster
Region-Based Convolutional Neural Networks(Faster
RCNN)and the latest EfficientDet-based architectures for
detecting guns and human faces.
EXISTING SYSTEM
Multiple boxes are generated due to multiple detectors for
the same image. The novelty of our work is to empirically
demonstrate that the ensemble of Faster RCNN and the latest
EfficientDet architectures provide an improved object detection
scheme using the same trained models as the performance of the
individual model. In the project title, the term efficient indicates
that the detection results can be improved with the existing
trained models without further training in the proposed scheme.
The project has aimed to contribute as follows:
⋆ Automated detection of human faces and different types of guns
together in the wild.
⋆ Introducing a deep learning-based framework to improve the
performance of object detection through ensemble.
⋆ Thus, securing smart cities using intelligent surveillance.
PROPOSED SYSTEM
The ensemble of FRCNN and EffcientDet object
detection architectures with NMW and WBF combining techniques is
the novelty of this paper, specifically in this domain. Some test case
images before and after the implementation of ensemble combining
techniques
A. Faster region-based convolutional neural networks
B. EfficientDet
C. Mean average precision
D. Non-maximum suppression
E. Non-maximum weighted
F. Weighted boxes fusion
G. Ensemble detection scheme
PARAMETERS
• Id
• Accused name
• Date of Incident
• Manner of Killed
• Age
• Lien ace Name
• City
• Detected
• Gender
• Race
ARCHITECTURE
SOFTWARE REQUIREMENTS
• PYTHON 3.7.0
• WAMP SERVER
HARDWARE REQUIREMENTS
• HARD DISK
• PROCESSOR
• 4 GB RAM
ALGORITHMS
• Algorithm 1 :
Greedy Ensemble Object Detection
(ENSD)
• Algorithm 2:
compute_mAP(mod_set,ImgSet)
LITERATURE SURVEY
TITLE AUTHORS DISCRIPTION RESULT
Efficient
Firearms
Monitoring
Technique
for Building
Secure
Smart Cities
by Deep
Learning
TANUPRIYA
CHOUDHURY,
BISWARANJAN
ACHARYA,
ANKITA
CHATTERJEE and
RAJDEEP
CHATTERJEE
An ensemble
(stacked)
scheme has
improved the
detection
performance to
identify human
faces and guns.
The comparative results
of various detection
techniques and their
ensembles. It helps the
police gather quick
intelligence about the
incident and take
preventive measures at
the earliest.
REFERENCES
[1] D. Trottier, ‘‘Crowdsourcing CCTV surveillance on the internet,’’ Inf.,
Commun. Soc., vol. 17, no. 5, pp. 609–626, May 2014.
[2] S. Ren, K.He,R.Girshick, and J. Sun, ‘‘Faster R-CNN: Towards real-time
object detection with region proposal networks,’’ in Proc. Adv. Neural Inf.
Process. Syst., 2015, pp. 91–99.
[3] S. Targ, D. Almeida, and K. Lyman, ‘‘ResNet in ResNet: Generalizing
residual architectures,’’ 2016, arXiv:1603.08029.
[4] K. He, X. Zhang, S. Ren, and J. Sun, ‘‘Deep residual learning for image
recognition,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR),
Jun. 2016, pp. 770–778.
[5] Z. Wu, C. Shen, and A. Van Den Hengel, ‘‘Wider or deeper: Revisiting the
ResNet model for visual recognition,’’ Pattern Recognit., vol. 90, pp. 119–
133, Jun. 2019.
[6] M. Tan, R. Pang, and Q. V. Le, ‘‘EfficientDet: Scalable and efficient
object detection,’’ in Proc. IEEE/CVFConf.
Comput.Vis.PatternRecognit. (CVPR), Jun. 2020, pp. 10781–10790.
[7] M. Tan and Q. V. Le, ‘‘EfficientNet : Rethinking model scaling for
convolutional neural networks,’’ 2019, arXiv:1905.11946.
[8] A.Egiazarov, V. Mavroeidis, F. M. Zennaro, and K. Vishi , ‘‘Firearm
detection and segmentation using an ensemble of semantic neural
networks,’’ in Proc. Eur. Intell. Secur. Informat. Conf. (EISIC), Nov.
2019, pp. 70–77.
[9] S. Akçay, M. E. Kundegorski, M. Devereux, and T. P. Breckon,
‘‘Transfer learning using convolutional neural networks for object
classification within X-ray baggage security imagery,’’ in Proc. IEEE
Int. Conf. Image Process. (ICIP), Sep. 2016, pp. 1057–1061.
[10] R. Olmos, S. Tabik, and F. Herrera, ‘‘Automatic handgun detection
alarm in videos using deep learning,’’ Neurocomputing, vol. 275, pp.
66–72, Jan. 2018.

More Related Content

Similar to reducing firearms based on deep learning

People Monitoring and Mask Detection using Real-time video analyzing
People Monitoring and Mask Detection using Real-time video analyzingPeople Monitoring and Mask Detection using Real-time video analyzing
People Monitoring and Mask Detection using Real-time video analyzingvivatechijri
 
MDM-2013, Milan, Italy, 6 June, 2013
MDM-2013, Milan, Italy, 6 June, 2013MDM-2013, Milan, Italy, 6 June, 2013
MDM-2013, Milan, Italy, 6 June, 2013Charith Perera
 
The Concurrent Constraint Programming Research Programmes -- Redux
The Concurrent Constraint Programming Research Programmes -- ReduxThe Concurrent Constraint Programming Research Programmes -- Redux
The Concurrent Constraint Programming Research Programmes -- ReduxPierre Schaus
 
TOP 5 Most View Article From Academia in 2019
TOP 5 Most View Article From Academia in 2019TOP 5 Most View Article From Academia in 2019
TOP 5 Most View Article From Academia in 2019sipij
 
Machine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkMachine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkGauthamSK4
 
Human Activity Recognition Using Neural Network
Human Activity Recognition Using Neural NetworkHuman Activity Recognition Using Neural Network
Human Activity Recognition Using Neural NetworkIRJET Journal
 
BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY DETECTION IN...
 BIG DATA ANALYTICS FOR USER-ACTIVITY  ANALYSIS AND USER-ANOMALY DETECTION IN... BIG DATA ANALYTICS FOR USER-ACTIVITY  ANALYSIS AND USER-ANOMALY DETECTION IN...
BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY DETECTION IN...Nexgen Technology
 
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCECRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCEvivatechijri
 
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...AIRCC Publishing Corporation
 
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...ijcsit
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEOIRJET Journal
 
HOW TO WASTE YOUR TIME ON SIMPLE THINGS DONT JUST FEEL INSTEAD BLAME OTHERS A...
HOW TO WASTE YOUR TIME ON SIMPLE THINGS DONT JUST FEEL INSTEAD BLAME OTHERS A...HOW TO WASTE YOUR TIME ON SIMPLE THINGS DONT JUST FEEL INSTEAD BLAME OTHERS A...
HOW TO WASTE YOUR TIME ON SIMPLE THINGS DONT JUST FEEL INSTEAD BLAME OTHERS A...lanaw86385
 
Project Synopsis Electricity Theft Detection.docx
Project Synopsis Electricity Theft Detection.docxProject Synopsis Electricity Theft Detection.docx
Project Synopsis Electricity Theft Detection.docxKomal526846
 
Handwritten digit recognition using quantum convolution neural network
Handwritten digit recognition using quantum convolution neural networkHandwritten digit recognition using quantum convolution neural network
Handwritten digit recognition using quantum convolution neural networkIAESIJAI
 
Real-Time Pertinent Maneuver Recognition for Surveillance
Real-Time Pertinent Maneuver Recognition for SurveillanceReal-Time Pertinent Maneuver Recognition for Surveillance
Real-Time Pertinent Maneuver Recognition for SurveillanceIRJET Journal
 
Broadcasting Forensics Using Machine Learning Approaches
Broadcasting Forensics Using Machine Learning ApproachesBroadcasting Forensics Using Machine Learning Approaches
Broadcasting Forensics Using Machine Learning Approachesijtsrd
 
Social distance and face mask detector system exploiting transfer learning
Social distance and face mask detector system exploiting  transfer learningSocial distance and face mask detector system exploiting  transfer learning
Social distance and face mask detector system exploiting transfer learningIJECEIAES
 
Developing an Artificial Immune Model for Cash Fraud Detection
Developing an Artificial Immune Model for Cash Fraud Detection   Developing an Artificial Immune Model for Cash Fraud Detection
Developing an Artificial Immune Model for Cash Fraud Detection khawla Osama
 

Similar to reducing firearms based on deep learning (20)

People Monitoring and Mask Detection using Real-time video analyzing
People Monitoring and Mask Detection using Real-time video analyzingPeople Monitoring and Mask Detection using Real-time video analyzing
People Monitoring and Mask Detection using Real-time video analyzing
 
MDM-2013, Milan, Italy, 6 June, 2013
MDM-2013, Milan, Italy, 6 June, 2013MDM-2013, Milan, Italy, 6 June, 2013
MDM-2013, Milan, Italy, 6 June, 2013
 
The Concurrent Constraint Programming Research Programmes -- Redux
The Concurrent Constraint Programming Research Programmes -- ReduxThe Concurrent Constraint Programming Research Programmes -- Redux
The Concurrent Constraint Programming Research Programmes -- Redux
 
TOP 5 Most View Article From Academia in 2019
TOP 5 Most View Article From Academia in 2019TOP 5 Most View Article From Academia in 2019
TOP 5 Most View Article From Academia in 2019
 
Machine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkMachine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia Network
 
Human Activity Recognition Using Neural Network
Human Activity Recognition Using Neural NetworkHuman Activity Recognition Using Neural Network
Human Activity Recognition Using Neural Network
 
BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY DETECTION IN...
 BIG DATA ANALYTICS FOR USER-ACTIVITY  ANALYSIS AND USER-ANOMALY DETECTION IN... BIG DATA ANALYTICS FOR USER-ACTIVITY  ANALYSIS AND USER-ANOMALY DETECTION IN...
BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY DETECTION IN...
 
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCECRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
 
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
 
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
 
HOW TO WASTE YOUR TIME ON SIMPLE THINGS DONT JUST FEEL INSTEAD BLAME OTHERS A...
HOW TO WASTE YOUR TIME ON SIMPLE THINGS DONT JUST FEEL INSTEAD BLAME OTHERS A...HOW TO WASTE YOUR TIME ON SIMPLE THINGS DONT JUST FEEL INSTEAD BLAME OTHERS A...
HOW TO WASTE YOUR TIME ON SIMPLE THINGS DONT JUST FEEL INSTEAD BLAME OTHERS A...
 
Project Synopsis Electricity Theft Detection.docx
Project Synopsis Electricity Theft Detection.docxProject Synopsis Electricity Theft Detection.docx
Project Synopsis Electricity Theft Detection.docx
 
Handwritten digit recognition using quantum convolution neural network
Handwritten digit recognition using quantum convolution neural networkHandwritten digit recognition using quantum convolution neural network
Handwritten digit recognition using quantum convolution neural network
 
ni2018.pdf
ni2018.pdfni2018.pdf
ni2018.pdf
 
Real-Time Pertinent Maneuver Recognition for Surveillance
Real-Time Pertinent Maneuver Recognition for SurveillanceReal-Time Pertinent Maneuver Recognition for Surveillance
Real-Time Pertinent Maneuver Recognition for Surveillance
 
Broadcasting Forensics Using Machine Learning Approaches
Broadcasting Forensics Using Machine Learning ApproachesBroadcasting Forensics Using Machine Learning Approaches
Broadcasting Forensics Using Machine Learning Approaches
 
Social distance and face mask detector system exploiting transfer learning
Social distance and face mask detector system exploiting  transfer learningSocial distance and face mask detector system exploiting  transfer learning
Social distance and face mask detector system exploiting transfer learning
 
Developing an Artificial Immune Model for Cash Fraud Detection
Developing an Artificial Immune Model for Cash Fraud Detection   Developing an Artificial Immune Model for Cash Fraud Detection
Developing an Artificial Immune Model for Cash Fraud Detection
 
CV _Manoj
CV _ManojCV _Manoj
CV _Manoj
 

Recently uploaded

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

reducing firearms based on deep learning

  • 1. Department of Computer Science & Engineering B. Tech IV-II project A Deep Learning-Based Efficient Firearms Monitoring Technique for Building Secure Smart Cities Student Names Roll Number Guide K. Silpa 20W51A0535 Mrs. Y. JYOTHSNA M. Tech M. Mounika 20W51A0540 K. Mohammad Sharif 20W51A0533 K. Pallavi 20W51A0532
  • 2. A Deep Learning-Based Efficient Firearms Monitoring Technique for Building Secure Smart Cities
  • 3. AGENDA 1. Abstract 2. Existing system 3. Proposed system 4. Literature survey 5. Hardware requirements 6. Software requirements 7. References
  • 4. ABSTRACT Firearm-related deaths are currently a global phenomenon. It is a threat to society and a challenge to law enforcement agencies. A significant portion of such crimes happen in semi-urban areas or cities. Governments and private organizations use CCTV-based surveillance extensively today for prevention and monitoring. However, human-based monitoring requires a significant amount of person-hours as a resource and is prone to mistakes . The project main focus is to showcase that deep learning-based techniques can be used in combination to detect firearms (particularly guns). This project uses different detection techniques, such as Faster Region-Based Convolutional Neural Networks(Faster RCNN)and the latest EfficientDet-based architectures for detecting guns and human faces.
  • 5. EXISTING SYSTEM Multiple boxes are generated due to multiple detectors for the same image. The novelty of our work is to empirically demonstrate that the ensemble of Faster RCNN and the latest EfficientDet architectures provide an improved object detection scheme using the same trained models as the performance of the individual model. In the project title, the term efficient indicates that the detection results can be improved with the existing trained models without further training in the proposed scheme. The project has aimed to contribute as follows: ⋆ Automated detection of human faces and different types of guns together in the wild. ⋆ Introducing a deep learning-based framework to improve the performance of object detection through ensemble. ⋆ Thus, securing smart cities using intelligent surveillance.
  • 6. PROPOSED SYSTEM The ensemble of FRCNN and EffcientDet object detection architectures with NMW and WBF combining techniques is the novelty of this paper, specifically in this domain. Some test case images before and after the implementation of ensemble combining techniques A. Faster region-based convolutional neural networks B. EfficientDet C. Mean average precision D. Non-maximum suppression E. Non-maximum weighted F. Weighted boxes fusion G. Ensemble detection scheme
  • 7. PARAMETERS • Id • Accused name • Date of Incident • Manner of Killed • Age • Lien ace Name • City • Detected • Gender • Race
  • 9. SOFTWARE REQUIREMENTS • PYTHON 3.7.0 • WAMP SERVER
  • 10. HARDWARE REQUIREMENTS • HARD DISK • PROCESSOR • 4 GB RAM
  • 11. ALGORITHMS • Algorithm 1 : Greedy Ensemble Object Detection (ENSD) • Algorithm 2: compute_mAP(mod_set,ImgSet)
  • 12. LITERATURE SURVEY TITLE AUTHORS DISCRIPTION RESULT Efficient Firearms Monitoring Technique for Building Secure Smart Cities by Deep Learning TANUPRIYA CHOUDHURY, BISWARANJAN ACHARYA, ANKITA CHATTERJEE and RAJDEEP CHATTERJEE An ensemble (stacked) scheme has improved the detection performance to identify human faces and guns. The comparative results of various detection techniques and their ensembles. It helps the police gather quick intelligence about the incident and take preventive measures at the earliest.
  • 13. REFERENCES [1] D. Trottier, ‘‘Crowdsourcing CCTV surveillance on the internet,’’ Inf., Commun. Soc., vol. 17, no. 5, pp. 609–626, May 2014. [2] S. Ren, K.He,R.Girshick, and J. Sun, ‘‘Faster R-CNN: Towards real-time object detection with region proposal networks,’’ in Proc. Adv. Neural Inf. Process. Syst., 2015, pp. 91–99. [3] S. Targ, D. Almeida, and K. Lyman, ‘‘ResNet in ResNet: Generalizing residual architectures,’’ 2016, arXiv:1603.08029. [4] K. He, X. Zhang, S. Ren, and J. Sun, ‘‘Deep residual learning for image recognition,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR), Jun. 2016, pp. 770–778. [5] Z. Wu, C. Shen, and A. Van Den Hengel, ‘‘Wider or deeper: Revisiting the ResNet model for visual recognition,’’ Pattern Recognit., vol. 90, pp. 119– 133, Jun. 2019.
  • 14. [6] M. Tan, R. Pang, and Q. V. Le, ‘‘EfficientDet: Scalable and efficient object detection,’’ in Proc. IEEE/CVFConf. Comput.Vis.PatternRecognit. (CVPR), Jun. 2020, pp. 10781–10790. [7] M. Tan and Q. V. Le, ‘‘EfficientNet : Rethinking model scaling for convolutional neural networks,’’ 2019, arXiv:1905.11946. [8] A.Egiazarov, V. Mavroeidis, F. M. Zennaro, and K. Vishi , ‘‘Firearm detection and segmentation using an ensemble of semantic neural networks,’’ in Proc. Eur. Intell. Secur. Informat. Conf. (EISIC), Nov. 2019, pp. 70–77. [9] S. Akçay, M. E. Kundegorski, M. Devereux, and T. P. Breckon, ‘‘Transfer learning using convolutional neural networks for object classification within X-ray baggage security imagery,’’ in Proc. IEEE Int. Conf. Image Process. (ICIP), Sep. 2016, pp. 1057–1061. [10] R. Olmos, S. Tabik, and F. Herrera, ‘‘Automatic handgun detection alarm in videos using deep learning,’’ Neurocomputing, vol. 275, pp. 66–72, Jan. 2018.