SlideShare une entreprise Scribd logo
1  sur  5
Base paper Title: Creating Alert Messages Based on Wild Animal Activity Detection Using
Hybrid Deep Neural Networks
Modified Title: Developing Alert Messages using Hybrid Deep Neural Networks for Wild
Animal Activity Detection
Abstract
The issue of animal attacks is increasingly concerning for rural populations and forestry
workers. To track the movement of wild animals, surveillance cameras and drones are often
employed. However, an efficient model is required to detect the animal type, monitor its
locomotion and provide its location information. Alert messages can then be sent to ensure the
safety of people and foresters. While computer vision and machine learning-based approaches
are frequently used for animal detection, they are often expensive and complex, making it
difficult to achieve satisfactory results. This paper presents a Hybrid Visual Geometry Group
(VGG)−19+ Bidirectional Long Short-Term Memory (Bi-LSTM) network to detect animals
and generate alerts based on their activity. These alerts are sent to the local forest office as a
Short Message Service (SMS) to allow for immediate response. The proposed model exhibits
great improvements in model performance, with an average classification accuracy of 98%, a
mean Average Precision (mAP) of 77.2%, and a Frame Per Second (FPS) of 170. The model
was tested both qualitatively and quantitatively using 40, 000 images from three different
benchmark datasets with 25 classes and achieved a mean accuracy and precision of above 98%.
This model is a reliable solution for providing accurate animal-based information and
protecting human lives.
Existing System
In general, animal activity detection creates numerous challenges for researchers due
to the continuous streaming of inputs and the cluttered backgrounds. There are huge varieties
of wildlife categories with different facial, nose, body, and tail structures. The detection and
classification of such animals in video sequences and the processing of huge feature maps
demand the need to develop a robust framework. Such developments in real-time cases need
large-scale video data for training and testing purposes and high GGPU-based computing
resources. Moreover, the incorporating techniques should handle the data in an intelligent way
to produce plausible results. Hence, there is a high demand for developing such a model to
detect animal activities in forest regions. Although numerous advancements have been made
in this technological era, research in this area still seeks higher attention to produce a strong
model. With this work, we can save humans from sudden animal attacks as well as send alert
messages with location information to the forest officers for quick action. These systems offer
better monitoring services and help to find the activities of animals and detect if there is any
hunting by humans or hindrance to wildlife. These clusters of activities, such as tracking the
animal object and finding its activity and generating the alert messages, pose huge complexity
in the Deep Learning area. Research on this work, investigates the advancements in video
analysis techniques and complex neural network-based architectures. Recent developments in
Deep Learning techniques have produced impressive results in image recognition,
classification, and generation tasks [1]. Due to these developments, we focus our aim on
developing a robust model for monitoring the activities of animals and generating alerts to the
forest officers in case of any abnormal activity such as hunting, animals entering into human
living areas or agricultural land. The development of the proposed model investigates this
problem from multiple angles to provide a better solution.
Drawback in Existing System
 Limited Generalization:
The model's performance may vary in different environmental conditions, times of
day, or geographical locations. Training the model on a specific dataset may not cover
all possible scenarios, limiting its generalization.
 Deployment and Maintenance Costs:
Implementing a hybrid deep neural network system requires not only initial
investment but also ongoing costs for maintenance, updates, and monitoring. This
includes the cost of sensors, computing resources, and personnel for system upkeep.
 Energy Consumption:
Continuous monitoring and processing of data by deep neural networks can be
computationally intensive, leading to high energy consumption. Finding energy-
efficient solutions is important, especially in remote areas with limited power resources.
 User Acceptance and Education:
Users may not fully understand or trust the system, leading to skepticism or a lack of
compliance with alerts. Proper education and transparent communication are crucial for
user acceptance.
Proposed System
 The proposed Hybrid VGG-19+Bi-LSTM model is built using deep neural networks
with fine- tuned hyper parameters to yield greater recognition accuracy results.
 The proposed system offers foresters more accurate prediction performance about
animal detection and also supports them with faster alert services via SMS.
 Proposed wild animal detection using a multi-level graph cut approach for investigating
spatial details and a cross-frame temporal patch verification technique for temporal
details. The model analyzes the foreground and background details of the camera trap
videos.
 Proposed animal detection using Convolutional Neural Network (CNN), and the author
proposed animal detection using Iterative Embedded Graph Cut (IEGC) techniques to
form regions over images and Deep CNN features and machine learning classification
algorithms [15] for classification purposes.
Algorithm
 Data Processing Algorithms:
 Noise Reduction:
Apply algorithms to filter out noise from sensor data, ensuring that the input data is
clean and relevant.
 Normalization:
Normalize sensor data to a common scale for consistency in model training.
 Hybrid Deep Neural Network Algorithms:
 Ensemble Learning:
Combine multiple neural network models into an ensemble for improved overall
performance.
 Transfer Learning:
Apply transfer learning to leverage pre-trained models, enhancing the model's ability
to generalize to new environments.
 Energy-Efficient Algorithms:
 Model Quantization:
Use model quantization techniques to reduce the memory and computation
requirements of the neural network.
 Edge Computing:
Deploy parts of the system on edge devices to minimize energy consumption and
enable real-time processing in remote areas.
Advantages
 Improved Accuracy:
Hybrid Architecture: Combining different neural network models (e.g., CNNs for
image processing and RNNs for sequence modeling) allows the system to capture both
spatial and temporal features, enhancing overall accuracy in detecting wild animal
activities.
 Adaptability and Generalization:
Transfer Learning: Leveraging pre-trained models through transfer learning
facilitates better generalization, especially when dealing with limited labeled data.
The system can adapt to new environments and species more effectively.
 Privacy Preservation:
Privacy-Preserving Algorithms: The use of privacy-preserving algorithms, such as
data anonymization and encryption, addresses concerns about privacy and compliance
with regulations.
 Mitigation of Human-Wildlife Conflicts:
Early Warning System: Early detection of wild animal activities allows for proactive
measures to mitigate potential conflicts between humans and wildlife, contributing to
conservation efforts and ensuring the safety of both.
Software Specification
 Processor : I3 core processor
 Ram : 4 GB
 Hard disk : 500 GB
Software Specification
 Operating System : Windows 10 /11
 Frond End : Python
 Back End : Mysql Server
 IDE Tools : Pycharm

Contenu connexe

Similaire à Creating Alert Messages Based on Wild Animal Activity Detection Using Hybrid Deep Neural Networks.docx

PADDY CROP DISEASE DETECTION USING SVM AND CNN ALGORITHM
PADDY CROP DISEASE DETECTION USING SVM AND CNN ALGORITHMPADDY CROP DISEASE DETECTION USING SVM AND CNN ALGORITHM
PADDY CROP DISEASE DETECTION USING SVM AND CNN ALGORITHMIRJET Journal
 
Medical Herb Identification and It’s Benefits
Medical Herb Identification and It’s BenefitsMedical Herb Identification and It’s Benefits
Medical Herb Identification and It’s BenefitsIRJET Journal
 
A Literature Research Review On Animal Intrusion Detection And Repellent Systems
A Literature Research Review On Animal Intrusion Detection And Repellent SystemsA Literature Research Review On Animal Intrusion Detection And Repellent Systems
A Literature Research Review On Animal Intrusion Detection And Repellent SystemsScott Bou
 
IRJET - Deep Learning Applications and Frameworks – A Review
IRJET -  	  Deep Learning Applications and Frameworks – A ReviewIRJET -  	  Deep Learning Applications and Frameworks – A Review
IRJET - Deep Learning Applications and Frameworks – A ReviewIRJET Journal
 
Unobtrusive hand gesture recognition using ultra-wide band radar and deep lea...
Unobtrusive hand gesture recognition using ultra-wide band radar and deep lea...Unobtrusive hand gesture recognition using ultra-wide band radar and deep lea...
Unobtrusive hand gesture recognition using ultra-wide band radar and deep lea...IJECEIAES
 
Deep Learning based Multi-class Brain Tumor Classification
Deep Learning based Multi-class Brain Tumor ClassificationDeep Learning based Multi-class Brain Tumor Classification
Deep Learning based Multi-class Brain Tumor ClassificationIRJET Journal
 
Motion Detection System for Security Using IoT- Survey
Motion Detection System for Security Using IoT- SurveyMotion Detection System for Security Using IoT- Survey
Motion Detection System for Security Using IoT- SurveyIRJET Journal
 
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docx
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docxAbnormal Traffic Detection Based on Attention and Big Step Convolution.docx
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docxShakas Technologies
 
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docx
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docxAbnormal Traffic Detection Based on Attention and Big Step Convolution.docx
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docxShakas Technologies
 
Dog Breed Identification
Dog Breed IdentificationDog Breed Identification
Dog Breed IdentificationIRJET Journal
 
Review of Deep Neural Network Detectors in SM MIMO System
Review of Deep Neural Network Detectors in SM MIMO SystemReview of Deep Neural Network Detectors in SM MIMO System
Review of Deep Neural Network Detectors in SM MIMO Systemijtsrd
 
IRJET - Automating the Identification of Forest Animals and Alerting in Case ...
IRJET - Automating the Identification of Forest Animals and Alerting in Case ...IRJET - Automating the Identification of Forest Animals and Alerting in Case ...
IRJET - Automating the Identification of Forest Animals and Alerting in Case ...IRJET Journal
 
IRJET- A Review on Machine Learning Algorithm Used for Crop Monitoring System...
IRJET- A Review on Machine Learning Algorithm Used for Crop Monitoring System...IRJET- A Review on Machine Learning Algorithm Used for Crop Monitoring System...
IRJET- A Review on Machine Learning Algorithm Used for Crop Monitoring System...IRJET Journal
 
Millimeter wave channel modelıng via generatıve neural network ppt
Millimeter wave channel modelıng via generatıve neural network pptMillimeter wave channel modelıng via generatıve neural network ppt
Millimeter wave channel modelıng via generatıve neural network pptMirza Baig
 
A Review Paper on Elderly Fall Detection
A Review Paper on Elderly Fall DetectionA Review Paper on Elderly Fall Detection
A Review Paper on Elderly Fall DetectionIRJET Journal
 
An intrusion detection system for packet and flow based networks using deep n...
An intrusion detection system for packet and flow based networks using deep n...An intrusion detection system for packet and flow based networks using deep n...
An intrusion detection system for packet and flow based networks using deep n...IJECEIAES
 
SWARM OPTIMIZED MODULAR NEURAL NETWORK BASED DIAGNOSTIC SYSTEM FOR BREAST CAN...
SWARM OPTIMIZED MODULAR NEURAL NETWORK BASED DIAGNOSTIC SYSTEM FOR BREAST CAN...SWARM OPTIMIZED MODULAR NEURAL NETWORK BASED DIAGNOSTIC SYSTEM FOR BREAST CAN...
SWARM OPTIMIZED MODULAR NEURAL NETWORK BASED DIAGNOSTIC SYSTEM FOR BREAST CAN...ijscai
 
Network Intrusion Detection System using Machine Learning
Network Intrusion Detection System using Machine LearningNetwork Intrusion Detection System using Machine Learning
Network Intrusion Detection System using Machine LearningIRJET Journal
 

Similaire à Creating Alert Messages Based on Wild Animal Activity Detection Using Hybrid Deep Neural Networks.docx (20)

PADDY CROP DISEASE DETECTION USING SVM AND CNN ALGORITHM
PADDY CROP DISEASE DETECTION USING SVM AND CNN ALGORITHMPADDY CROP DISEASE DETECTION USING SVM AND CNN ALGORITHM
PADDY CROP DISEASE DETECTION USING SVM AND CNN ALGORITHM
 
Medical Herb Identification and It’s Benefits
Medical Herb Identification and It’s BenefitsMedical Herb Identification and It’s Benefits
Medical Herb Identification and It’s Benefits
 
V01 i010405
V01 i010405V01 i010405
V01 i010405
 
A Literature Research Review On Animal Intrusion Detection And Repellent Systems
A Literature Research Review On Animal Intrusion Detection And Repellent SystemsA Literature Research Review On Animal Intrusion Detection And Repellent Systems
A Literature Research Review On Animal Intrusion Detection And Repellent Systems
 
IRJET - Deep Learning Applications and Frameworks – A Review
IRJET -  	  Deep Learning Applications and Frameworks – A ReviewIRJET -  	  Deep Learning Applications and Frameworks – A Review
IRJET - Deep Learning Applications and Frameworks – A Review
 
Unobtrusive hand gesture recognition using ultra-wide band radar and deep lea...
Unobtrusive hand gesture recognition using ultra-wide band radar and deep lea...Unobtrusive hand gesture recognition using ultra-wide band radar and deep lea...
Unobtrusive hand gesture recognition using ultra-wide band radar and deep lea...
 
Deep Learning based Multi-class Brain Tumor Classification
Deep Learning based Multi-class Brain Tumor ClassificationDeep Learning based Multi-class Brain Tumor Classification
Deep Learning based Multi-class Brain Tumor Classification
 
Motion Detection System for Security Using IoT- Survey
Motion Detection System for Security Using IoT- SurveyMotion Detection System for Security Using IoT- Survey
Motion Detection System for Security Using IoT- Survey
 
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docx
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docxAbnormal Traffic Detection Based on Attention and Big Step Convolution.docx
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docx
 
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docx
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docxAbnormal Traffic Detection Based on Attention and Big Step Convolution.docx
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docx
 
Dy4301752755
Dy4301752755Dy4301752755
Dy4301752755
 
Dog Breed Identification
Dog Breed IdentificationDog Breed Identification
Dog Breed Identification
 
Review of Deep Neural Network Detectors in SM MIMO System
Review of Deep Neural Network Detectors in SM MIMO SystemReview of Deep Neural Network Detectors in SM MIMO System
Review of Deep Neural Network Detectors in SM MIMO System
 
IRJET - Automating the Identification of Forest Animals and Alerting in Case ...
IRJET - Automating the Identification of Forest Animals and Alerting in Case ...IRJET - Automating the Identification of Forest Animals and Alerting in Case ...
IRJET - Automating the Identification of Forest Animals and Alerting in Case ...
 
IRJET- A Review on Machine Learning Algorithm Used for Crop Monitoring System...
IRJET- A Review on Machine Learning Algorithm Used for Crop Monitoring System...IRJET- A Review on Machine Learning Algorithm Used for Crop Monitoring System...
IRJET- A Review on Machine Learning Algorithm Used for Crop Monitoring System...
 
Millimeter wave channel modelıng via generatıve neural network ppt
Millimeter wave channel modelıng via generatıve neural network pptMillimeter wave channel modelıng via generatıve neural network ppt
Millimeter wave channel modelıng via generatıve neural network ppt
 
A Review Paper on Elderly Fall Detection
A Review Paper on Elderly Fall DetectionA Review Paper on Elderly Fall Detection
A Review Paper on Elderly Fall Detection
 
An intrusion detection system for packet and flow based networks using deep n...
An intrusion detection system for packet and flow based networks using deep n...An intrusion detection system for packet and flow based networks using deep n...
An intrusion detection system for packet and flow based networks using deep n...
 
SWARM OPTIMIZED MODULAR NEURAL NETWORK BASED DIAGNOSTIC SYSTEM FOR BREAST CAN...
SWARM OPTIMIZED MODULAR NEURAL NETWORK BASED DIAGNOSTIC SYSTEM FOR BREAST CAN...SWARM OPTIMIZED MODULAR NEURAL NETWORK BASED DIAGNOSTIC SYSTEM FOR BREAST CAN...
SWARM OPTIMIZED MODULAR NEURAL NETWORK BASED DIAGNOSTIC SYSTEM FOR BREAST CAN...
 
Network Intrusion Detection System using Machine Learning
Network Intrusion Detection System using Machine LearningNetwork Intrusion Detection System using Machine Learning
Network Intrusion Detection System using Machine Learning
 

Plus de Shakas Technologies

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionShakas Technologies
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...Shakas Technologies
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.Shakas Technologies
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...Shakas Technologies
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024Shakas Technologies
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024Shakas Technologies
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Shakas Technologies
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...Shakas Technologies
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSEShakas Technologies
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Shakas Technologies
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONShakas Technologies
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCEShakas Technologies
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Shakas Technologies
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Shakas Technologies
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Shakas Technologies
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Shakas Technologies
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Shakas Technologies
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxShakas Technologies
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Shakas Technologies
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Shakas Technologies
 

Plus de Shakas Technologies (20)

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying Detection
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
 

Dernier

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Dernier (20)

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

Creating Alert Messages Based on Wild Animal Activity Detection Using Hybrid Deep Neural Networks.docx

  • 1. Base paper Title: Creating Alert Messages Based on Wild Animal Activity Detection Using Hybrid Deep Neural Networks Modified Title: Developing Alert Messages using Hybrid Deep Neural Networks for Wild Animal Activity Detection Abstract The issue of animal attacks is increasingly concerning for rural populations and forestry workers. To track the movement of wild animals, surveillance cameras and drones are often employed. However, an efficient model is required to detect the animal type, monitor its locomotion and provide its location information. Alert messages can then be sent to ensure the safety of people and foresters. While computer vision and machine learning-based approaches are frequently used for animal detection, they are often expensive and complex, making it difficult to achieve satisfactory results. This paper presents a Hybrid Visual Geometry Group (VGG)−19+ Bidirectional Long Short-Term Memory (Bi-LSTM) network to detect animals and generate alerts based on their activity. These alerts are sent to the local forest office as a Short Message Service (SMS) to allow for immediate response. The proposed model exhibits great improvements in model performance, with an average classification accuracy of 98%, a mean Average Precision (mAP) of 77.2%, and a Frame Per Second (FPS) of 170. The model was tested both qualitatively and quantitatively using 40, 000 images from three different benchmark datasets with 25 classes and achieved a mean accuracy and precision of above 98%. This model is a reliable solution for providing accurate animal-based information and protecting human lives. Existing System In general, animal activity detection creates numerous challenges for researchers due to the continuous streaming of inputs and the cluttered backgrounds. There are huge varieties of wildlife categories with different facial, nose, body, and tail structures. The detection and classification of such animals in video sequences and the processing of huge feature maps demand the need to develop a robust framework. Such developments in real-time cases need large-scale video data for training and testing purposes and high GGPU-based computing resources. Moreover, the incorporating techniques should handle the data in an intelligent way to produce plausible results. Hence, there is a high demand for developing such a model to
  • 2. detect animal activities in forest regions. Although numerous advancements have been made in this technological era, research in this area still seeks higher attention to produce a strong model. With this work, we can save humans from sudden animal attacks as well as send alert messages with location information to the forest officers for quick action. These systems offer better monitoring services and help to find the activities of animals and detect if there is any hunting by humans or hindrance to wildlife. These clusters of activities, such as tracking the animal object and finding its activity and generating the alert messages, pose huge complexity in the Deep Learning area. Research on this work, investigates the advancements in video analysis techniques and complex neural network-based architectures. Recent developments in Deep Learning techniques have produced impressive results in image recognition, classification, and generation tasks [1]. Due to these developments, we focus our aim on developing a robust model for monitoring the activities of animals and generating alerts to the forest officers in case of any abnormal activity such as hunting, animals entering into human living areas or agricultural land. The development of the proposed model investigates this problem from multiple angles to provide a better solution. Drawback in Existing System  Limited Generalization: The model's performance may vary in different environmental conditions, times of day, or geographical locations. Training the model on a specific dataset may not cover all possible scenarios, limiting its generalization.  Deployment and Maintenance Costs: Implementing a hybrid deep neural network system requires not only initial investment but also ongoing costs for maintenance, updates, and monitoring. This includes the cost of sensors, computing resources, and personnel for system upkeep.  Energy Consumption: Continuous monitoring and processing of data by deep neural networks can be computationally intensive, leading to high energy consumption. Finding energy- efficient solutions is important, especially in remote areas with limited power resources.
  • 3.  User Acceptance and Education: Users may not fully understand or trust the system, leading to skepticism or a lack of compliance with alerts. Proper education and transparent communication are crucial for user acceptance. Proposed System  The proposed Hybrid VGG-19+Bi-LSTM model is built using deep neural networks with fine- tuned hyper parameters to yield greater recognition accuracy results.  The proposed system offers foresters more accurate prediction performance about animal detection and also supports them with faster alert services via SMS.  Proposed wild animal detection using a multi-level graph cut approach for investigating spatial details and a cross-frame temporal patch verification technique for temporal details. The model analyzes the foreground and background details of the camera trap videos.  Proposed animal detection using Convolutional Neural Network (CNN), and the author proposed animal detection using Iterative Embedded Graph Cut (IEGC) techniques to form regions over images and Deep CNN features and machine learning classification algorithms [15] for classification purposes. Algorithm  Data Processing Algorithms:  Noise Reduction: Apply algorithms to filter out noise from sensor data, ensuring that the input data is clean and relevant.  Normalization: Normalize sensor data to a common scale for consistency in model training.  Hybrid Deep Neural Network Algorithms:  Ensemble Learning: Combine multiple neural network models into an ensemble for improved overall performance.
  • 4.  Transfer Learning: Apply transfer learning to leverage pre-trained models, enhancing the model's ability to generalize to new environments.  Energy-Efficient Algorithms:  Model Quantization: Use model quantization techniques to reduce the memory and computation requirements of the neural network.  Edge Computing: Deploy parts of the system on edge devices to minimize energy consumption and enable real-time processing in remote areas. Advantages  Improved Accuracy: Hybrid Architecture: Combining different neural network models (e.g., CNNs for image processing and RNNs for sequence modeling) allows the system to capture both spatial and temporal features, enhancing overall accuracy in detecting wild animal activities.  Adaptability and Generalization: Transfer Learning: Leveraging pre-trained models through transfer learning facilitates better generalization, especially when dealing with limited labeled data. The system can adapt to new environments and species more effectively.  Privacy Preservation: Privacy-Preserving Algorithms: The use of privacy-preserving algorithms, such as data anonymization and encryption, addresses concerns about privacy and compliance with regulations.  Mitigation of Human-Wildlife Conflicts: Early Warning System: Early detection of wild animal activities allows for proactive measures to mitigate potential conflicts between humans and wildlife, contributing to conservation efforts and ensuring the safety of both.
  • 5. Software Specification  Processor : I3 core processor  Ram : 4 GB  Hard disk : 500 GB Software Specification  Operating System : Windows 10 /11  Frond End : Python  Back End : Mysql Server  IDE Tools : Pycharm