<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="reviewer-report"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Balkan Journal of Electrical and Computer Engineering</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">2147-284X</issn>
                                        <issn pub-type="epub">2147-284X</issn>
                                                                                            <publisher>
                    <publisher-name>MUSA YILMAZ</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.17694/bajece.1223050</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Artificial Intelligence</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Yapay Zeka</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                                                            <article-title>Intelligent Video Surveillance System Using Faster Regional Convolutional Neural Networks</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-2294-5545</contrib-id>
                                                                <name>
                                    <surname>Olaniyi</surname>
                                    <given-names>Olayemi</given-names>
                                </name>
                                                                    <aff>Federal University of Technology,Minna,Nigeria</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0003-4182-3890</contrib-id>
                                                                <name>
                                    <surname>Ganiyu</surname>
                                    <given-names>Shefiu</given-names>
                                </name>
                                                                    <aff>Federal University of Technology,Minna</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20231222">
                    <day>12</day>
                    <month>22</month>
                    <year>2023</year>
                </pub-date>
                                        <volume>11</volume>
                                        <issue>4</issue>
                                        <fpage>346</fpage>
                                        <lpage>351</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20221222">
                        <day>12</day>
                        <month>22</month>
                        <year>2022</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20230818">
                        <day>08</day>
                        <month>18</month>
                        <year>2023</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2013, Balkan Journal of Electrical and Computer Engineering</copyright-statement>
                    <copyright-year>2013</copyright-year>
                    <copyright-holder>Balkan Journal of Electrical and Computer Engineering</copyright-holder>
                </permissions>
            
                                                                                                                        <abstract><p>Insecurity remains a major challenge in our society. Government, private organizations, and individuals strive to ensure their possessions are kept safe from intruders. Automated surveillance system plays a key role to ensure that the environment is safe with little human intervention. Therefore, object detection, classification, and tracking are vital in building a robust and remote intelligent video surveillance system to aid security in physical environments. Previous studies used enhanced background subtraction techniques for object detection which recorded notable achievements but performance issues in distinguishing humans, pets and vehicles. For insecurity to be solved more intelligently, deep neural network techniques are employed. In this paper, an intelligent video surveillance system that detects only human intrusion and sends an SMS notification to the user with the registered mobile number was developed. The results of the system performance evaluation recorded an accuracy of 96%, a precision of 94%, and a recall of 98%. The experimental results showed that the intelligent system was suitable for detecting human intrusion, thereby contributing to the safety of physical environments.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Video</kwd>
                                                    <kwd>  surveillance</kwd>
                                                    <kwd>  CNN</kwd>
                                                    <kwd>  deep learning</kwd>
                                                    <kwd>  Detection</kwd>
                                            </kwd-group>
                            
                                                                                                                                                    </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">[1]	Y. Kurylyak, “A Real-Time Motion Detection for Video Surveillance System,”. IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, Rende, Italy, 2009, pp. 386-389, doi: 10.1109/IDAACS.2009.5342954.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">[2]	S. W. Ibrahim, “A comprehensive review on intelligent surveillance systems”, CST, vol. 1, no. 1, pp 7-14, May 2016</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">[3]	O.M. Olaniyi, S. Ganiyu and S. J. Akam. Intelligent Video Surveillance Systems: A Survey. Balkan Journal of Electrical and Computer Engineering (BAJECE).1(1).pp 57-53</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">[4]	A. A. Shafie, F. Hafizhelmi, and K. Zaman, “Smart Video Surveillance System for Vehicle Detection and Traffic Flow Control”. Journal of Engineering Science &amp; Technology (JESTEC). Vol.13 no 7. 2195-2210</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">[5]	B. Benjdira, T. Khursheed, A. Koubaa, A. Ammar, and K. Ouni, “Car Detection using Unmanned Aerial Vehicles: Comparison between Faster R-CNN and YOLOv3,” 2019 1st Int. Conf. Unmanned Veh. Syst., pp. 1–6, 2019</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">[6]	W. Tan, “Object Detection with Multi-RCNN Detectors,” pp. 193–197.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">[7]	A. H. Sanoob, J. Roselin, and P. Latha, “Smartphone Enabled Intelligent Surveillance System,” no. c, pp. 1–7, 2015, doi: 10.1109/JSEN.2015.2501407.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">[8]	L. W. Yang and C. Y. Su, “Low-cost CNN Design for Intelligent Surveillance System,” 2018 Int. Conf. Syst. Sci. Eng., pp. 1–4, doi: 10.1109/ICSSE.2018.8520133.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">[9]	. M. Olaniyi, J. A. Bala, S. O. Ganiyu, and P. E. Wisdom, “A Systematic Review of Background Subtraction Algorithms for Smart Surveillance System,” vol. 8, no. 1, pp. 35–54, 2020</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">[10]	C. Jin, S. Li, and H. Kim, “Real-Time Action Detection in Video Surveillance using Sub-Action Descriptor with Multi-CNN,” pp. 1–29.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">[11]	A. Ullah, K. Muhammad, J. Del Ser, S. W. Baik, and V. Albuquerque, “Activity Recognition using Temporal Optical Flow Convolutional Features and Multi-Layer LSTM,” IEEE Trans. Ind. Electron., vol. PP, no. c, p. 1, 2018, doi: 10.1109/TIE.2018.2881943.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">[12]	H. Kaya, H. Dibeklio, and A. A. Salah, “Kernel ELM and CNN based Facial Age Estimation,” pp. 80–86.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">[13]	A. Antoniou, “A General Purpose Intelligent Surveillance System For Mobile Devices using Deep Learning,” pp. 2879–2886, 2016</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">[14]	. Muhammad, S. Khan, S. Member, and V. Palade, “Edge Intelligence-Assisted Smoke Detection in,” IEEE Trans. Ind. Informatics, vol. PP, no. c, p. 1, 2019, doi: 10.1109/TII.2019.2915592</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">[15]	. Hargude and M. T. It, “i-surveillance: Intelligent Surveillance System Using Background Subtraction Technique,” vol. 1.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">[16]	C. Gao, P. Li, Y. Zhang, J. Liu, and L. Wang, “Author ’ s Accepted Manuscript People counting based on head detection combining environment Reference : To appear in : Neurocomputing,” Neurocomputing, 2016, doi: 10.1016/j.neucom.2016.01.097.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">[17]	. Y. Nikouei, Y. Chen, S. Song, R. Xu, B. Y. Choi, and T. Faughnan, “Smart surveillance as an edge network service: From harr-cascade, SVM to a Lightweight CNN,” Proc. - 4th IEEE Int. Conf. Collab. Internet Comput. CIC 2018, pp. 256–265, 2018, doi: 10.1109/CIC.2018.00042.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">[18]	Z. Xu, C. Hu, and L. Mei, “Video structured description technology based intelligence analysis of surveillance videos for public security applications,” 2015, doi: 10.1007/s11042-015-3112-5.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">[19]	T. Hussain, K. Muhammad, A. Ullah, Z. Cao, S. W. Baik, and V. H. C. De Albuquerque, “Cloud-assisted multiview video summarization using CNN and bidirectional LSTM,” IEEE Trans. Ind. Informatics, vol. 16, no. 1, pp. 77–86, 2020, doi: 10.1109/TII.2019.2929228.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">[20]	H. Kaya, H. Dibeklio, and A. A. Salah, “Kernel ELM and CNN based Facial Age Estimation,” pp. 80–86.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">[21]	Y. Byeon and S. Pan, “A Surveillance System Using CNN for Face Recognition with Object, Human and Face Detection,” pp. 975–984, doi: 10.1007/978-981-10-0557-2.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">[22]	Nogay, H.S. T.C. Akinci, and M. Yilmaz. &quot;Detection of invisible cracks in ceramic materials using by pre-trained deep convolutional neural network.&quot; Neural Computing and Applications 34.2 (2022): 1423-1432.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">[23]	A. N. Shuaibu, A. S. Malik, and I. Faye, “Adaptive Feature Learning CNN for Behavior Recognition in Crowd Scene,” pp. 357–361, 2017</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">[24]	H. Ahamed, I. Alam, and M. Islam, “HOG-CNNBasedRealTimeFaceRecognition,” 2018 Int. Conf. Adv. Electr. Electron. Eng., pp. 1–4, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">[25]	X. Xiang, N. Lv, X. Guo, S. Wang, and A. El Saddik, “Engineering vehicles detection based on modified faster R-CNN for power grid surveillance,” Sensors (Switzerland), vol. 18, no. 7, 2018, doi: 10.3390/s18072258.</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">[26]	M. H. Gauswami, “Implementation of Machine Learning for Gender Detection using CNN on Raspberry Pi Platform,” 2018 2nd Int. Conf. Inven. Syst. Control, no. Icisc, pp. 608–613, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">[27]	D. Chahyati, M. I. Fanany, and A. M. Arymurthy, “Tracking People by Detection Using CNN Features,” Procedia Comput. Sci., vol. 124, pp. 167–172, 2018, doi: 10.1016/j.procs.2017.12.143.</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">[28]	D. Chahyati, M. I. Fanany, and A. M. Arymurthy, “Tracking People by Detection Using CNN Features,” Procedia Comput. Sci., vol. 124, pp. 167–172, 2018, doi: 10.1016/j.procs.2017.12.143.</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">[29]	H. C. Shin and J. Y. Lee, “Pedestrian Video Data Abstraction and Classification for Surveillance System,” 9th Int. Conf. Inf. Commun. Technol. Converg. ICT Converg. Powered by Smart Intell. ICTC 2018, pp. 1476–1478, 2018, doi: 10.1109/ICTC.2018.8539426.</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">[30]	A. Ullah, K. Muhammad, J. Del Ser, S. W. Baik, and V. Albuquerque, “Activity Recognition using Temporal Optical Flow Convolutional Features and Multi-Layer LSTM,” IEEE Trans. Ind. Electron., vol. PP, no. c, p. 1, 2018, doi: 10.1109/TIE.2018.2881943.</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">[31]	L. Du, R. Zhang, and X. Wang, &quot;Overview of two-stage detection algorithms,&quot; 2020, doi:10.1088/1742-6596/1544/1/012033
R. Arti, “Animal Detection Using Deep Learning Algorithm,” vol. 7, no. 1, pp. 434–439, 2020</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">[32] O., Türk, A. Çalışkan, Acar, E. and B. Ergen. “Palmprint recognition system based on deep region of interest features with the aid of hybrid approach. SIViP ”  17, 3837–3845. 2023.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
