Persistent Fish School-Inspired Deep Belief Network for Object Detection in Varied Weather Traffic Surveillance

Persistent Fish School-Inspired Deep Belief Network for Object Detection in Varied Weather Traffic Surveillance

  IJETT-book-cover           
  
© 2024 by IJETT Journal
Volume-72 Issue-6
Year of Publication : 2024
Author : V. Valarmathi, S. Dhanalakshmi
DOI : 10.14445/22315381/IJETT-V72I6P119

How to Cite?

V. Valarmathi, S. Dhanalakshmi, "Persistent Fish School-Inspired Deep Belief Network for Object Detection in Varied Weather Traffic Surveillance," International Journal of Engineering Trends and Technology, vol. 72, no. 6, pp. 178-194, 2024. Crossref, https://doi.org/10.14445/22315381/IJETT-V72I6P119

Abstract
Traffic surveillance is pivotal in ensuring public safety and efficient urban mobility. With the continuous improvements in computer vision, surveillance systems can now identify things automatically in real-time, greatly expanding their possibilities. However, the challenges associated with object detection, particularly in diverse weather conditions, pose a considerable obstacle. Adverse weather elements, such as rain and snow, can impede the accuracy of detection algorithms, impacting the overall effectiveness of traffic surveillance systems. This research addresses these challenges by introducing the Persistent Fish School Search-Inspired Deep Belief Network (PFSS-DBN), a novel algorithm designed to bolster object detection in varying weather climates. Inspired by fish schools’ persistent and adaptive nature, PFSS-DBN leverages deep belief networks to navigate complex visual data. The algorithm dynamically adapts its parameters, optimizing its performance for weather scenarios. This adaptability enhances detection accuracy and ensures reliable surveillance outcomes even in challenging conditions. The study employs the AAU RainSnow Traffic Surveillance Dataset to evaluate the proposed PFSS-DBN algorithm. Through comprehensive experimentation, the results demonstrate the superior performance of PFSS-DBN compared to traditional methods, showcasing its efficacy in mitigating the impact of adverse weather on object detection. The findings underscore the potential of PFSS-DBN as a valuable solution for improving the reliability of traffic surveillance systems, particularly in regions prone to diverse weather conditions

Keywords
Adaptive parameter optimization, Nature-Inspired computing, Object detection, PFSS-DBN, Traffic surveillance, Weather-Adaptive algorithms.

References
[1] Enrico Lagona et al., “Autonomous Trajectory Optimisation for Intelligent Satellite Systems and Space Traffic Management,” Acta Astronaut., vol. 194, pp. 185–201, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Yi-Chieh Sun, and Inseok Hwang, “Gaussian Mixture Probability Hypothesis Density Filter with Dynamic Probabilities: Application to Road Traffic Surveillance,” European Journal of Control, vol. 69, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Xueqian Xu et al., “Exploiting High-Fidelity Kinematic Information from Port Surveillance Videos via A YOLO-Based Framework,” Ocean & Coastal Management, vol. 222, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Shenghua Zhou et al., “Integrating Computer Vision and Traffic Modeling for Near-Real-Time Signal Timing Optimization of Multiple Intersections,” Sustainable Cities and Society, vol. 68, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Yaochen Li et al., “Vehicle Detection from Road Image Sequences for Intelligent Traffic Scheduling,” Computers and Electrical Engineering, vol. 95, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Syed Khandker et al., “Cybersecurity Attacks on Software Logic and Error Handling Within ADS-B Implementations: Systematic Testing of Resilience and Countermeasures,” IEEE Transactions on Aerospace and Electronic Systems, vol. 58, no. 4, pp. 2702–2719, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Moein Shakeri, and Hong Zhang, “COROLA: A Sequential Solution to Moving Object Detection using Low-Rank Approximation,” Computer Vision and Image Understanding, vol. 146, pp. 27–39, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[8] H.B. Resmi, V.A. Deepambika, and M. Abdul Rahman, “Symmetric Mask Wavelet Based Detection and Tracking of Moving Objects Using Variance Method,” Procedia Computer Science, vol. 58, pp. 58–65, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Sarmad Rafique et al., “Optimized Real-Time Parking Management Framework using Deep Learning,” Expert Systems with Applications, vol. 220, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Claudio V. Ribeiro, Aline Paes, and Daniel de Oliveira, “AIS-Based Maritime Anomaly Traffic Detection: A Review,” Expert Systems with Applications, vol. 231, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Shakir Khan, and Lulwah AlSuwaidan, “Agricultural Monitoring System in Video Surveillance Object Detection Using Feature Extraction And Classification By Deep Learning Techniques,” Computers and Electrical Engineering, vol. 102, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Zhaofeng Xu, Bin Wei, and Jian Zhang, “Reproduction of Spatial–Temporal Distribution of Traffic Loads on Freeway Bridges via Fusion of Camera Video and ETC Data,” Structures, vol. 53, pp. 1476–1488, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Bharat Mahaur, and K.K. Mishra, “Small-Object Detection Based on YOLOv5 in Autonomous Driving Systems,” Pattern Recognition Letters, vol. 168, pp. 115–122, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Feng Guo, Yi Wang, and Yu Qian, “Real-Time Dense Traffic Detection using Lightweight Backbone and Improved Pathaggregation Feature Pyramid Network,” Journal of Industrial Information Integration, vol. 31, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Yuxing Yang, Zeyu Fu, and Syed Mohsen Naqvi, “Abnormal Event Detection for Video Surveillance Using an Enhanced Two-Stream Fusion Method,” Neurocomputing, vol. 553, pp. 1-12, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Veronika Adamová, and Martin Boroš, “Effective Placement of Video Surveillance System Using 3D Scanning Technology for Traffic Safety,” Transportation Research Procedia, vol. 55, pp. 1665–1672, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Bharat Mahaur, K.K. Mishra, and Anoj Kumar, “An Improved Lightweight Small Object Detection Framework Applied to Real-Time Autonomous Driving,” Expert Systems with Applications, vol. 234, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Waseem Ullah et al., “TransCNN: Hybrid CNN and Transformer Mechanism for Surveillance Anomaly Detection,” Engineering Applications of Artificial Intelligence, vol. 123, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[19] George Adaimi, Sven Kreiss, and Alexandre Alahi, “Traffic Perception from Aerial Images using Butterfly Fields,” Transportation Research Part C: Emerging Technologies, vol. 153, pp. 1-16, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Edeh Michael Onyema et al., “Remote Monitoring System Using Slow-Fast Deep Convolution Neural Network Model for Identifying Anti-Social Activities in Surveillance Applications,” Measurement: Sensors, vol. 27, pp. 1-11, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[21] J. Ramkumar et al., “Optimal Approach For Minimizing Delays In Iot-Based Quantum Wireless Sensor Networks Using Nm-Leach Routing Protocol,” Journal of Theoretical and Applied Information Technology, vol. 102, no. 3, pp. 1099–1111, 2024.
[Google Scholar] [Publisher Link]
[22] J. Ramkumar, and R. Vadivel, “Multi-Adaptive Routing Protocol for Internet of Things based Ad-hoc Networks,” Wireless Personal Communications, vol. 120, no. 2, pp. 887–909, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[23] S.P. Geetha et al., “Energy Efficient Routing in Quantum Flying Ad Hoc Network (Q-FANET) Using Mamdani Fuzzy Inference Enhanced Dijkstra’S Algorithm (MFI-EDA),” Journal of Theoretical and Applied Information Technology, vol. 102, no. 9, pp. 3708–3724, 2024.
[Google Scholar] [Publisher Link]
[24] M.P. Swapna, and J. Ramkumar, “Multiple Memory Image Instances Stratagem to Detect Fileless Malware,” Second International Conference on Advancements in Smart Computing and Information Security, Rajkot, India, pp. 131–140, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Nitish Kumar Ojha, Archana Pandita, and J. Ramkumar, “Cyber Security Challenges and Dark Side of AI: Review and Current Status,” Demystifying the Dark Side of AI in Business, pp. 117–137, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Ramkumar Jaganathan, and Vadivel Ramasamy, “Performance Modeling of Bio-Inspired Routing Protocols in Cognitive Radio Ad Hoc Network to Reduce End-to-End Delay,” International Journal of Intelligent Engineering and Systems, vol. 12, no. 1, pp. 221–231, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[27] J. Ramkumar et al., “Gallant Ant Colony Optimized Machine Learning Framework (GACO-MLF) for Quality of Service Enhancement in Internet of Things-Based Public Cloud Networking,” Data Science and Communication, pp. 425–438, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[28] J. Ramkumar, K.S. Jeen Marseline, and D.R. Medhunhashini, “Relentless Firefly Optimization-Based Routing Protocol (RFORP) for Securing Fintech Data in IoT-Based Ad-Hoc Networks,” International Journal of Computer Networks and Applications, vol. 10, no. 4, pp. 668–687, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[29] J. Ramkumar, and R. Vadivel, “CSIP—Cuckoo Search Inspired Protocol for Routing in Cognitive Radio Ad Hoc Networks,” Proceedings of the International Conference on Computational Intelligence in Data Mining, pp. 145–153, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[30] J. Ramkumar, and R. Vadivel, “Improved Frog Leap Inspired Protocol (IFLIP) – for Routing in Cognitive Radio Ad Hoc Networks (CRAHN),” World Journal of Engineering, vol. 15, no. 2, pp. 306–311, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[31] D. Jayaraj et al., “AFSORP: Adaptive Fish Swarm Optimization-Based Routing Protocol for Mobility Enabled Wireless Sensor Network,” International Journal of Computer Networks and Applications, vol. 10, no. 1, pp. 119–129, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[32] M. Lingaraj et al., “Query Aware Routing Protocol for Mobility Enabled Wireless Sensor Network,” International Journal of Computer Networks and Applications, vol. 8, no. 3, pp. 258–267, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[33] R. Vadivel, and Ramkumar Jaganathan, “QoS-Enabled Improved Cuckoo Search-Inspired Protocol (ICSIP) for Iot-Based Healthcare Applications,” Incorporating the Internet of Things in Healthcare Applications and Wearable Devices, pp. 109–121, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[34] J. Ramkumar, and R. Vadivel, “Improved Wolf Prey Inspired Protocol for Routing in Cognitive Radio Ad Hoc networks,” International Journal of Computer Networks and Applications, vol. 7, no. 5, pp. 126–136, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[35] A. Senthilkumar et al., “Minimizing Energy Consumption in Vehicular Sensor Networks Using Relentless Particle Swarm Optimization Routing,” International Journal of Computer Networks and Applications, vol. 10, no. 2, pp. 217–230, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[36] Ramkumar Jaganathan, and Ramasamy Vadivel, “Intelligent Fish Swarm Inspired Protocol (IFSIP) for Dynamic Ideal Routing in Cognitive Radio Ad-Hoc Networks,” International Journal of Computing and Digital Systems, vol. 10, no. 1, pp. 1063–1074, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[37] P. Menakadevi, and J. Ramkumar, “Robust Optimization Based Extreme Learning Machine for Sentiment Analysis in Big Data,” International Conference on Advanced Computing Technologies and Applications, Coimbatore, India, pp. 1–5, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[38] J. Ramkumar et al., “Energy Consumption Minimization in Cognitive Radio Mobile Ad-Hoc Networks using Enriched Ad-hoc On-demand Distance Vector Protocol,” International Conference on Advanced Computing Technologies and Applications, Coimbatore, India, pp. 16, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[39] J. Ramkumar, R. Vadivel, and B. Narasimhan, “Constrained Cuckoo Search Optimization Based Protocol for Routing in Cloud Network,” International Journal of Computer Networks and Applications, vol. 8, no. 6, pp. 795–803, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[40] Lingaraj Mani, Senthilkumar Arumugam, and Ramkumar Jaganathan, “Performance Enhancement of Wireless Sensor Network Using Feisty Particle Swarm Optimization Protocol,” Proceedings of the 4th International Conference on Information Management & Machine Intelligence, Jaipur India, pp. 1–5, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[41] J. Ramkumar et al., “IoT-Based Kalman Filtering and Particle Swarm Optimization for Detecting Skin Lesion,” Soft Computing Applications in Modern Power and Energy Systems, pp. 17–27, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[42] J. Ramkumar, and R. Vadivel, “Whale Optimization Routing Protocol for Minimizing Energy Consumption in Cognitive Radio Wireless Sensor Network,” International Journal of Computer Networks and Applications, vol. 8, no. 4, pp. 455–464, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[43] Shaharyar Alam Ansari, and Aasim Zafar, “A Fusion of Dolphin Swarm Optimization and Improved Sine Cosine Algorithm for Automatic Detection and Classification of Objects from Surveillance Videos,” Measurement, vol. 192, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[44] Malik Javed Akhtar et al., “A Robust Framework for Object Detection in a Traffic Surveillance System,” Electronics, vol. 11, no. 21, pp. 1-20, 2022.
[CrossRef] [Google Scholar] [Publisher Link]