AI Empowered Security Monitoring System with the Help of Deployed ML Models

Authors

  • Amitha. K, Ram Manohar Reddy. M, Yashwanth. K, Shylaja. K, Rahul Reddy. M Student, B.Tech CSE 4th Year, Holy Mary Inst. of Tech. and Science, Hyderabad, TG, India Author
  • Srinu. B Assistant Professor, Dept. of CSE, Holy Mary Inst. of Tech. and Science, Hyderabad, TG, India Author
  • Dr.Prasad Dharnasi Professor, Dept. of CSE, Holy Mary Inst. of Tech. and Science, Hyderabad, TG, India Author

DOI:

https://doi.org/10.15680/IJCTECE.2026.0901011

Keywords:

Artificial Intelligence, Machine Learning, Computer Vision, Security Monitoring, Intruder Detection, Face Recognition, OpenCV, TensorFlow, PyTorch, MediaPipe, YOLO Algorithm, Video Surveillance, Real-time Detection, Flask, Django, Automated Alert System, Deep Learning, Pygame

Abstract

This project introduces a fully software-based intelligent surveillance system that leverages Artificial Intelligence (AI) and Machine Learning (ML) models to automate video monitoring, detect intruders, suspicious movements, and faces in real time. Traditional surveillance systems rely heavily on manual observation, which is time-consuming and prone to human error. To overcome these limitations, the proposed system integrates computer vision techniques with Python libraries such as OpenCV, TensorFlow, PyTorch, and MediaPipe to deliver a smart, responsive solution.

 The system processes live or recorded video feeds, drawing bounding boxes around detected objects or faces and triggering audio alerts using pygame with a cooldown mechanism to prevent repeated notifications. This ensures efficient monitoring while minimizing false alarms. For enhanced accessibility, the solution can be deployed with Flask or Django, enabling real-time visualization and remote monitoring through a web interface. Since the system is entirely software-driven, it eliminates the need for external hardware components, making it cost-effective, scalable, and adaptable to diverse environments such as offices, laboratories, and residential areas. By combining lightweight ML models, real-time detection, and automated alerting, this project demonstrates how AI can minimize human effort, reduce error, and enhance security through a smart, fully software-driven approach.

References

1. Vani, S., Malathi, P., Ramya, V. J., Sriman, B., Saravanan, M., & Srivel, R. (2024). An efficient black widow optimization-based faster R-CNN for classification of COVID-19 from CT images. Multimedia Systems, 30(2), 108.

2. Dharnasi, P. (2025). A Multi-Domain AI Framework for Enterprise Agility Integrating Retail Analytics with SAP Modernization and Secure Financial Intelligence. International Journal of Humanities and Information Technology, 7(4), 61-66.

3. Sugumar, R. (2025). Explainable AI-Driven Secure Multi-Modal Analytics for Financial Fraud Detection and Cyber-Enabled Pharmaceutical Network Analysis. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 8(6), 13239-13249.

4. Sakthivel, T. S., Ragupathy, P., & Chinnadurai, N. (2025). Solar System Integrated Smart Grid Utilizing Hybrid Coot-Genetic Algorithm Optimized ANN Controller. Iranian Journal of Science and Technology, Transactions of Electrical Engineering, 1-24.

5. Ananth, S., Radha, D. K., Prema, D. S., & Nirajan, K. (2019). Fake news detection using convolution neural network in deep learning. International Journal of Innovative Research in Computer and Communication Engineering, 7(1), 49-63.

6. Kumar, A. S., Saravanan, M., Joshna, N., & Seshadri, G. (2019). Contingency analysis of fault and minimization of power system outage using fuzzy controller. International Journal of Innovative Technology and Exploring Engineering, 9(1), 4111-4115.

7. David, A. (2020). Air pollution control monitoring & delivery rate escalated by efficient use of markov process in manet networks: to measure quality of service parameters. Test Engineering & Management, The Mattingley Publishing Co., Inc. ISSN, 0193-4120.

8. Saravanan, M., Kumar, A. S., Devasaran, R., Seshadri, G., & Sivaganesan, S. (2019). Performance analysis of very sparse matrix converter using indirect space vector modulation. Intern. Jou. of Inn. Techn. and Expl. Eng, 9(1), 4756-4762.

9. Prasanna, D., Ahamed, N. A., Abinesh, S., Karthikeyan, G., & Inbatamilan, R. (2024, November). Cloud based automatically human document authentication processes for secured system. In 2024 International Conference on Integrated Intelligence and Communication Systems (ICIICS) (pp. 1-7). IEEE.

10. Karthikeyan, K., & Umasankar, P. (2025). A novel Buck-Boost Modified Series Forward (BBMSF) converter for enhanced efficiency in hybrid renewable energy systems. Ain Shams Engineering Journal, 16(10), 103557.

11. Saravanan, M., & Sivakumaran, T. S. (2016). Three phase dual input direct matrix converter for integration of two AC sources from wind turbines. Circuits Syst., 7, 3807-3817.

12. Poornachandar, T., Latha, A., Nisha, K., Revathi, K., & Sathishkumar, V. E. (2025, September). Cloud-Based Extreme Learning Machines for Mining Waste Detoxification Efficiency. In 2025 4th International Conference on Innovative Mechanisms for Industry Applications (ICIMIA) (pp. 1348-1353). IEEE.

13. Madheswaran, M., Dhanalakshmi, R., Ramasubramanian, G., Aghalya, S., Raju, S., & Thirumaraiselvan, P. (2024, April). Advancements in immunization management for personalized vaccine scheduling with IoT and machine learning. In 2024 10th International Conference on Communication and Signal Processing (ICCSP) (pp. 1566-1570). IEEE.

14. Aashiq Banu, S., Sucharita, M. S., Soundarya, Y. L., Nithya, L., Dhivya, R., & Rengarajan, A. (2020). Robust Image Encryption in Transform Domain Using Duo Chaotic Maps—A Secure Communication. In Evolutionary Computing and Mobile Sustainable Networks: Proceedings of ICECMSN 2020 (pp. 271-281). Singapore: Springer Singapore.

15. Karthikeyan, K., Umasankar, P., Parathraju, P., Prabha, M., & Pulivarthy, P. Integration and Analysis of Solar Vertical Axis Wind Hybrid Energy System using Modified Zeta Converter.

16. Ananth, S., Radha, D. K., Prema, D. S., & Nirajan, K. (2019). Fake news detection using convolution neural network in deep learning. International Journal of Innovative Research in Computer and Communication Engineering, 7(1), 49-63.

17. Inbavalli, M., & Arasu, T. (2015). Efficient Analysis of Frequent Item Set Association Rule Mining Methods. International Journal of Scientific & Engineering Research, 6(4).

18. Prasanna, D., & Manishvarma, R. (2025, February). Skin cancer detection using image classification in deep learning. In 2025 3rd International Conference on Integrated Circuits and Communication Systems (ICICACS) (pp. 1-8). IEEE.

19. Yashwanth, K., Adithya, N., Sivaraman, R., Janakiraman, S., & Rengarajan, A. (2021, July). Design and Development of Pipelined Computational Unit for High-Speed Processors. In 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT) (pp. 1-5). IEEE.

20. Poornima, G., & Anand, L. (2025). Medical image fusion model using CT and MRI images based on dual scale weighted fusion based residual attention network with encoder-decoder architecture. Biomedical Signal Processing and Control, 108, 107932.

21. Kiran, A., Rubini, P., & Kumar, S. S. (2025). Comprehensive review of privacy, utility and fairness offered by synthetic data. IEEE Access.

22. Lakshmi, A. J., Dasari, R., Chilukuri, M., Tirumani, Y., Praveena, H. D., & Kumar, A. P. (2023, May). Design and Implementation of a Smart Electric Fence Built on Solar with an Automatic Irrigation System. In 2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC) (pp. 1553-1558). IEEE.

23. Sammy, F., Chettier, T., Boyina, V., Shingne, H., Saluja, K., Mali, M., ... & Shobana, A. (2025). Deep Learning-Driven Visual Analytics Framework for Next-Generation Environmental Monitoring. Journal of Applied Science and Technology Trends, 114-122.

Downloads

Published

2026-02-21

How to Cite

AI Empowered Security Monitoring System with the Help of Deployed ML Models. (2026). International Journal of Computer Technology and Electronics Communication, 9(Issue 1), 69-73. https://doi.org/10.15680/IJCTECE.2026.0901011

Most read articles by the same author(s)