CNN 1
CNN 1
PHASE I REPORT
Submitted by
P ANUSHIYA
212223310002
MASTER OF ENGINEERING
in
APPLIED ELECTRONICS
DECEMBER 2024
BONAFIDE CERTIFICATE
SIGNATURE SIGNATURE
DR. SRIGITHA S NATH DR. S PRAVEEN KUMAR
HEAD OF DEPARTMENT SUPERVISOR
Saveetha Engineering College Saveetha Engineering College
(Autonomous) (Autonomous)
Chennai – 602 105 Chennai – 602 105
NO. NO.
ABSTRACT 2
LIST OF FIGURES 7
LIST OF ABBREVATIONS 8
I INTRODUCTION 9
1.3 Objectives 9
II SYSTEM ANALYSIS 11
2.1.1 Limitations 11
3.3.1 C# 13
3.3.2 Implementation 14
distributed IP cameras
visual surveillance
estimation
V MODULES 21
V1 SYSTEM DESIGN 23
6.1 DFD-LEVEL 0 23
6.2 DFD-LEVEL 1 24
VII TESTING 25
IX CONCLUSION 49
X APPENDIX 52
XI REFERENCE 52
LIST OF FIGURES
INTRODUCTION
1.1 INTRODUCTION
1.3 OBJECTIVES
Alarm system covers the remaining part of the project on alerting the user
regarding the security threat. This is done by detection of any motion and a
alarm sound is set on. This alarm alerts the user about the security issue which
might be present. It also records the video on triggering the alarm.
1.2.1 Applications
1. Remote monitoring
2. Secured alarm system
1.2.2 Features
CHAPTER 2
SYSTEM ANALYSIS
2.1.1 LIMITATIONS:
Instability: The existing systems have a very large stability issues which
are very annoying.
Locality support: The local camera is not supported
Inefficiency: The existing systems do not have a very good efficient
motion detection due to which people don’t want to use them in most
cases
The proposed system is very efficient software that can be used to detect
and monitor security with ease. Simple architecture makes it user friendly too. It
does this by using a very efficient motion detection algorithm with a variable
sensitivity which makes it vital for the security purpose.
3
CHAPTER 3
SYSTEM SPECIFICATION
i. Hard disk : 40 GB
ii. RAM : 128 MB
iii. Processor: Pentium IV
i. Windows XP or Higher
ii. .Net Framework 3.5
iii. Directx 2010
iv. MJPEG supporting Web browser
Hejlsberg formed a team to build a new language at the time called Cool,
which stood for "C-like Object Oriented Language". Microsoft had
considered keeping the name "Cool" as the final name of the language,
but chose not to do so for trademark reasons. By the time the .NET
project was publicly announced at the July 2000 Professional Developers
Conference, the language had been renamed C#, and the class libraries
and ASP.NET runtime had been ported to C#.
C# is an elegant and type-safe object-oriented language that
enables developers to build a variety of secure and robust applications
that run on the .NET Framework. You can use C# to create traditional
Windows client applications, XML Web services, distributed
components, client-server applications, database applications, and much,
much more. Visual C# provides an advanced code editor, convenient user
interface designers, integrated debugger, and many other tools to make it
easier to develop applications based on version 4.0 of the C# language
and version 4.0 of the .NET Framework.
3.3.2. Implementations
The reference C# compiler is Microsoft Visual C#, which is
closed-source. Other C# compilers exist, often including an
implementation of the Common Language Infrastructure and the .NET
class libraries up to .NET 2.0:
The Mono project provides an open source C# compiler, a
complete open source implementation of the Common Language
Infrastructure including the required framework libraries as they
appear in the ECMA specification, and a nearly complete
implementation of the Microsoft proprietary .NET class libraries
up to .NET 3.5. As of Mono 2.6, no plans exist to
6
CHAPTER 4
LITERATURE REVIEW
Visual surveillance systems have gained a lot of interest in the last few
years. In this paper, we present a visual surveillance system that is based on the
integration of motion detection and visual tracking to achieve better
performance. Motion detection is achieved using an algorithm that combines
temporal variance with background modeling methods. The tracking algorithm
combines motion and appearance information into an appearance model and
uses a particle filter framework for tracking the object in subsequent frames.
The systems was tested on a large ground-truthed data set containing hundreds
of color and FLIR image sequences. A performance evaluation for the system
was performed and the average evaluation results are reported in this paper.
The Basic Idea Behind “Smart Web Cam Motion Detection Surveillance
System” Is To Stop The Intruder To Getting Into The Place Where A High End
Security Is Required. This Paper Proposes A Method For Detecting The Motion
Of A Particular Object Being Observed. The Motion Tracking Surveillance Has
Gained A Lot Of Interests Over Past Few Years. This System Is Brought Into
Effect Providing Relief To The Normal Video Surveillance System Which
Offers Time Consuming Reviewing Process. Through The Study And
Evaluation Of Products, We Propose A Motion Tracking Surveillance System
Consisting Of Its Method For Motion Detection And Its Own Graphic User
11
This paper presents a new algorithm to detect moving objects within a scene
acquired by a stationary camera. A simple recursive non linear operator, the
_lter, is used to estimate two orders of temporal statistics for every pixel of the
image. The output data provide a scene characterization allowing a simple and
ef_cient pixel-level change detection framework. For a more suitable detection,
exploiting spatial correlation in these data is necessary. We use them as a
multiple observation _eld in a Markov model, leading to a spatiotemporal
regularization of the pixel-level solution. This method yields a good trade-off in
terms of robustness and accuracy, with a minimal cost in memory and a low
computational complexity.
12
CHAPTER 5
MODULES
Camera video module is the part were we capture the video stream as it is
done by the camera and then display it within boundaries of a window in which
the user may see the captured video. A camera related operations package is
used in order to handle the camera related methods. Here we use the camera
class in order to capture the camera feed either of the local camera or the remote
IP camera and then display it in a window. This would be visible along with the
other security controls to the user.
2. Motion detection
A timer is run that waits for the camera to focus in, then the control
panels are activated. Settings like the keycode and option control states are
stored in the application's default properties. When first run, or if the keycode
property is cleared, the Arm/Disarm button acts as the keycode set button. The
sounds used in the application are instances of
13
3. Alarm system
Alarm system covers the remaining part of the project on alerting the user
regarding the security threat. This is done by detection of any motion and a
alarm sound is set on. This alarm alerts the user about the security issue which
might be present. It also records the video on triggering the alarm.
When the alarm is in Armed mode, all but the keypad and disarm switch
are disabled. This is done by disabling the Group Box that houses the controls.
The main form close button also needs to be deactivated. This is done both by
cancelling the form's exit in the Form Closing event, and by disabling the Close
button using the Get System Menu/Enable MenuItem API.
14
CHAPTER 6
SYSTEM DESIGN
15
DFD – LEVEL 0
16
DFD – LEVEL 1
17
CHAPTER 7
TESTING
System testing of software results that it works very well under the given
specifications of hardware and software. Also for the test of stability
simultaneously running software were implemented that dint result in any
change in the output which showed it is very much stable under load and worst
cases.
7.2.UNIT TESTING
Unit testing of the product resulted that the three separate modules work
efficiently and individually well. Each unit of the product was tested to ensure
maximum security and stability.
White Box testing of the program code of the functions shows that the
modules are stable at normal conditions and are efficient than the existing
systems in their stability and efficiency as such as in the motion detection
module that is less likely in existing systems.
18
CHAPTER 8
SYSTEM DEVELOPMENT
A Code Design is a document that sets rules for the design of a new
development. The code of this software is a step-by-step process written to
show the execution at every step and to make it simple rather than making it
more complex for executing and understanding. For example the camera video
module has a code design so that first the camera feed is captured and then it is
displayed to the user for the further processes. Testcase1:Uploading image and
detecting single object at a time. convolutional neural network (CNN) is a
regularized type of feed-forward neural network that learns features by itself via
filter (or kernel) optimization. This type of deep learning network has been
applied to process and make predictions from many different types of data
including text, images and audio. Convolution-based networks are the de-facto
standard in deep learning-based approaches to computer vision and image
processing, and have only recently have been replaced -- in some cases -- by
newer deep learning architectures such as the transformer. Vanishing gradients
and exploding gradients, seen during back propagation in earlier neural
20
• recommender systems,
• image classification,
• image segmentation,
CNNs are also known as shift invariant or space invariant artificial neural
networks, based on the shared-weight architecture of the convolution kernels or
filters that slide along input features and provide translation-equivariant
responses known as feature maps.[ Counter-intuitively, most convolutional
neural networks are not invariant to translation, due to the down sampling
operation they apply to the input.
21
Convolutional layers convolve the input and pass its result to the next
layer. This is similar to the response of a neuron in the visual cortex to a
specific stimulus. Each convolutional neuron processes data only for its
receptive field.Although fully connected feed forward neural networks
can be used to learn features and classify data, this architecture is
generally impractical for larger inputs (e.g., high-resolution images),
which would require massive numbers of neurons because each pixel is a
relevant input feature. A fully connected layer for an image of size 100 ×
100 has 10,000 weights for each neuron in the second layer. Convolution
reduces the number of free parameters, allowing the network to be
deeper. For example, using a 5 × 5 tiling region, each with the same
shared weights, requires only 25 neurons. Using regularized weights
over fewer parameters avoids the vanishing gradients and exploding
gradients problems seen during back propagation in earlier neural
networks. To speed processing, standard convolutional layers can be
replaced by depth wise separable convolutional layers, which are based
on a depth wise convolution followed by a point wise convolution. The
depth wise convolution is a spatial convolution applied independently
over each channel of the input tensor, while the point wise convolution is
a standard convolution restricted to the use of Pooling layer
Convolutional networks may include local and/or global pooling layers
along with traditional convolutional layers. Pooling layers reduce the
dimensions of data by combining the outputs of neuron clusters at one
layer into a single neuron in the next layer. Local pooling combines
small clusters, tiling sizes such as 2 × 2 are commonly used. Global
pooling acts on all the neurons of the feature map. There are two
common types of pooling in popular use: max and average. Max pooling
uses the maximum value of each local cluster of neurons in the feature
map, while average pooling takes the average value.
24
role in image processing. Image and signal compression is one of the most
important applications of wavelets. A key idea for wavelets is the concept of
scale. The discrete wavelet transforms decomposes an image into approximation
and detail.
Image Processing deals with the processing and display of images of real
objects. Their emphasis is on the modification of the image, which takes in a
digital image and produces some other information, decision etc.
Communication in digital image primarily involves local communication
between image processing systems and remote processing systems and remote
communication from one point to another, typically in connection with the
transmission of image hardware. Communication across vast distances presents
a more serious challenge if the intent is to communicate image data rather than
abstracted results. Monochrome and color TV monitors are the principle display
devices used in modern digital processing systems. Printing image display
devices are useful primarily for low-resolution image processing work.
Digital image processing applications include the following:
In Agriculture
Air pollution and environment survey.
Geology.
In Industry
Nondestructive testing & quality inspection.
Remote sensing.
Security industry.
Robotics.
Print industry.
Entertainment & Ad – industry.
In Health Care
Medical imaging.
Digital & computer assisted radiology.
8.3.1 Output Image
The term image, refers to a two-dimensional light intensity function f(x, y),
where x and y denote spatial coordinates and value at any point (x, y) is
proportional to the brightness of the image at that point.
A digital image can be considered as a matrix whose row and column indices
identify a point in the image and the corresponding matrix element values
identifies the gray level at that point. In a most generalized way, a digital image
is an array of numbers depicting spatial distribution of a certain field of
parameters. Digital image consists of discrete picture elements called pixels.
Based on the way that image data is saved, images can be split into 3 different
types. They are
Bitmap
Vector
29
Metafile
8.3.4 Bitmap
Bitmaps images are exactly what their name says they are: a collection of
bits that form an image. The image consists of a matrix of individual dots (or
pixels) that all have their own color described using bits. Bitmap graphics are
also called raster images. A picture saved using the Paint program is likely to
have the .bmp file extension, for bit map. The data in .bmp files is not
compressed; therefore bitmap files tend to be very large. Bitmap graphics can
be saved in any of these formats: GIF, JPEG, TIFF, BMP, PICT, PNG and
PCX.
8.3.5 Vector
In vector graphics, the co-ordinates of images (lines and curves) are saved as
mathematical data. You can imagine the co-ordinates as being all the points
through which lines and curves pass. It's a little like drawing a square on a piece
of graph paper and describing it, using the co-ordinates of all 4 corners.
Computer Aided Design (CAD) is based on vector graphics. Images produced
using vector graphics are ideal for many purposes because they're so much
smaller than bitmaps - it is not necessary to store information about every pixel,
just about the lines and curves, their co-ordinates, width and color. The format
of your vector graphic could be draw or one of many others depending on the
software used. Examples of commercial software that uses vector graphics are
Corel and Draw, Macromedia Flash and Adobe Illustrator. Scalable Vector
Graphics, or SVG, is a new graphics format that allows Web designers to
include very realistic interactive vector graphics and animation to Web pages
using only plain text commands based on XML (extensible Markup Language).
Metafile graphics are simply 2D graphics that are made up of both vector and
bitmap. If you drew a shape using vector graphics, and then filled it with a
bitmap pattern, then you would have metafile. The vector object still retains the
30
property of scalability without any loss of resolution. The circle above was
created as a vector graphic, and then a fill added. It was saved as a .gif to
include on this page, which unfortunately changes it to a bitmap with a
subsequent loss of scalability. Clip Art images for use with desktop publishing
are usually supplied as metafiles. If you're a sub-editor or a desk top publishing
user, you would want to be able to rescale or stretch graphics to fill the space
you have, whilst retaining resolution, rather than to create one again from
scratch. Metafile graphics suit this purpose admirably. The formats that you're
likely to meet are: WMF (Windows Metafile), EMF (Enhanced Metafile), and
CGM (Computer Graphics Metafile).CGM graphics have many applications
because the image size is independent of file size, which means that you can
enlarge the size of the original graphic without increasing the file size. This
makes it ideal for many electronic document applications, maps (think of being
able to zoom in without waiting for ages for the image to load), technical
drawings, and icons.
8.3.6 Bitmap Graphics Formats
Bitmap graphics format is the specific format in which an image file is saved.
The format is identified by three-letter extension at the end of the file name.
Every format has its own characteristics, advantages and disadvantages. By
defining the file format it may be possible to determine the number of bits per
pixel. The Bitmap graphics formats are listed below
GIF Format
JPEG Format
TIFT Format
BMP Format
PICT Format
PNG Format
PCX Format
31
Image Processing deals with the processing and display of images of real
objects. Their emphasis is on the modification of the image, which takes in a
digital image and produces some other information, decision etc. A digital
image is an array of real or complex processing of any two dimensional
data.The elements of the general-purpose system capable of performing the
image processing operations are:
1. Image Acquisition
2. Image Storage
3. Processing the image
4. Communication
5. Display
8.3.7 Image Acquisition
Image acquisition is the process of acquiring the digital images using some
physical devices and digitizer. The most commonly used image acquisition
devices are scanner and video cameras. Image acquisition is the process of
acquiring a digital image. To acquire an image we require an imaging sensor
and the capability to digitize the signal produced by the sensor.
They are
There are seven steps involved in the digital image processing. Image
Processing and Analysis can be defined as the "act of examining images for the
purpose of identifying the objects and judging their significance". A major
attraction of digital imaging is the ability to manipulate image and video
information with the computer. Digital image processing is now a very
33
Image Descriptor
Enhancement Knowledge
Base Recognizer
Image Acquisition
&
Segmentation partitions the input image into its constituted parts or objects.
In general, autonomous segmentation is one of the most difficult tasks in digital
image processing.
Description, also called feature selection, deals with extracting features that
result in some quantitative information of interest or features that are basic for
differentiating one class of objects from another.
The knowledge base can be quite complex such as an interrelated list of all
major possible defects in a materials inspection problem or an image database
containing high-resolution satellite images of a region in connection with
change-detection applications
The increasing number of digital photos on both personal devices and the
Internet has posed a big challenge for storage. With the fast development and
35
On the other hand, when dealing with a group of correlated images, the inter
image redundancy can be exploited by organizing images as a pseudo sequence
and compress the sequence like a video , or subtracting a representative signal
(e.g., an average image) from each image and coding the residues using image
coding methods. Recently, inter image redundancy has also been investigated
for image compression using a predefined 3D model , similar images retrieved
from clouds or videos. However, all these compression schemes are designed
for coding pixels in raw images. To the best of our knowledge, there is no
lossless compression scheme for the existing JPEG coded image set presented
before.
coding. Compared with our preliminary work reported in, we not only provide
more details and discussions of our scheme here, but more importantly we
further improve the coding performance by introducing both the intra frame
lossless compression algorithm and advanced entropy coding methods. The cost
of storage and transmission of JPEG-coded image collections (e.g. geotagged
images and personal albums) transparently for personal and cloud applications
is reduced.
CHAPTER 9
CONCLUSION
CHAPTER 10
APPENDIX
REFERENCE
[1]Echoboomer:www.worldwidewords.org/turnsofphrase/tpech1.htm.
[3] J.-S. Hu and T.-M. Su, “Robust Environmental Change Detection Using
PTZ Camera via Spatial-Tempora Probabilistic Modeling”, IEEE/ASME
Transactions on Mechatronics, Vol.12, Issue 3, pp. 339-344 (2007).
1 2 Shen, Wei; Bai, Xiang; Hu, Rong; Wang, Hongyuan; Jan Latecki, Longin
(February 2011). "Skeleton growing and pruning with bending potential ratio".
Pattern Recognition. 44 (2): 196–209. Bibcode:2011PatRe..44..196S.
doi:10.1016/j.patcog.2010.08.021. ISSN 0031-3203.
↑ Duan, Huichuan; Wang, Jinling; Liu, Xiyu; Liu, Hong (October 2008). "A
Skeleton Pruning Approach Using Contour Length as the Significance
Measure". 2008 Third International Conference on Pervasive Computing and
Applications. IEEE. pp. 360