Project Title: Intruder Detection in Fog Computing for Smart Surveillance
Category: Deep Learning / Computer Vision
Project File: Download Project File
Hina Rafique
hina.rafique@vu.edu.pk
live:hina.rafique
Project Category
Computer Vision
Surveillance systems play a crucial role in maintaining security and public safety. However, traditional cloud-based video analytics face challenges such as high latency, bandwidth congestion, and excessive reliance on centralized resources. The delay in transmitting real-time video streams to cloud servers leads to inefficiencies in detecting and responding to security threats, particularly unauthorized intrusions.
This project aims to implement a fog-based smart surveillance system specifically designed for intruder detection using a software-only approach. The system will integrate YOLOv5 and Faster R-CNN to identify unauthorized persons in restricted areas. Additionally, it will optimize task scheduling and resource allocation in a simulated fog computing environment using iFogSim. The study evaluates system performance in terms of latency reduction, bandwidth optimization, and resource efficiency compared to traditional cloud-based approaches.
· Develop an intruder detection model for real-time surveillance using YOLOv5 and Faster R- CNN.
· Implement a fog computing simulation framework for decentralized video processing.
· Optimize task scheduling and resource allocation using AI-based techniques (MPSO & RL) in a software environment.
· Evaluate system performance with iFogSim simulation.
· Compare fog-based intruder detection with traditional cloud-based methods.
3.1System Overview
The proposed system will be entirely software-based and will be developed using simulated data
instead of physical hardware. Key functionalities include:
· Detect unauthorized individuals in restricted areas using YOLOv5/Faster R-CNN.
· Process simulated video feeds from pre-recorded datasets or real-time streams. Fog Computing Simulation
· Use iFogSim to simulate a fog computing environment.
· Optimize bandwidth by sending only security alerts to the cloud.
· Implement Modified Particle Swarm Optimization (MPSO) for load balancing.
· Simulate fog-cloud architecture using iFogSim.
· No dependency on physical hardware such as edge devices, cameras, or sensors.
· Utilize synthetic or publicly available surveillance datasets.
4.1 System Components
Simulated Video Feeds: Pre-recorded surveillance datasets or real-time video streams processed in software.
Fog Nodes (Simulated in iFogSim): Virtualized processing nodes for local object detection.
Cloud Server (Simulated in iFogSim): Stores logs and handles deep learning model updates.
User Dashboard (Software-based GUI): Displays detection results and sends alerts in a simulated environment.
1. Simulated video feed is processed in a software-based pipeline.
2️. Fog computing simulation in iFogSim distributes tasks to virtual nodes.
3️. Fog node performs real-time intruder detection using YOLOv5/Faster R-CNN.
4️. AI-based task scheduling optimizes resource allocation within the simulation.
Step 1: Research & Model Selection (YOLO vs. Faster R-CNN) on pre-trained dataset.
Step 2: Setup iFogSim for simulation
Step 3: Develop object detection pipeline
Step 4: Implement scheduling algorithms for fog resource management (MPSO)
Step 5: Test & compare performance with cloud-based processing
Supervisor:
Name: Hina Rafique
Email ID: hina.rafique@vu.edu.pk
Skype ID: live:hina.rafique
No reviews available for this project.