Drowsiness Detecting System using Convolutional Neural Networks

Driver fatigue and drowsiness are major causes of road accidents worldwide, emphasizing the need for an efficient and reliable detection system. This paper presents a Drowsiness Detection System based on Convolutional Neural Networks (CNNs), designed to monitor driver alertness in real time. The proposed system captures facial images using a camera and analyzes visual features such as eye closure, yawning frequency, and head position. A CNN-based model is trained to classify the driver’s state as active or drowsy by learning spatial and temporal patterns from the image dataset. The system generates alerts through visual or audio notifications when signs of fatigue are detected, helping to prevent potential accidents. Experimental evaluation demonstrates high accuracy and robustness of the proposed model under varying lighting and environmental conditions. The integration of deep learning with computer vision provides a cost-effective and automated solution for enhancing road safety and driver assistance technologies.

  • Research Type: Applied Research
  • Paper Type: Cause and Effect Research Paper
  • Vol.2 , Issue 3 , Pages: 28 - 31, Jun 2020
  • Published on: 07 Jun, 2020
  • Issue Type: Regular
  • Cite Score
    :

    100

  • No. of authors
    :

    75

  • No. of Downloads
    :

    43

  • Cite Score
    :

    100

  • No. of authors
    :

    75

  • No. of Downloads
    :

    43

  • Cite Score
    :

    100

  • No. of authors
    :

    75

  • No. of Downloads
    :

    43

About Authors:
YEGIREDDI RAMESH
India
Aditya Institute of Technology and Management

""


Copyright © 2020, This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC-BY-NY-SA). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Corresponding Author: YEGIREDDI RAMESH, rameshyegireddi@gmail.com

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.

Conflict of interest: The author declares that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher’s note: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

Global Readers View
  • No. of Readers
    38
  • No. of Reaction
    0
  • No. of Comments
    0
  • No. of Downloads
    3

Or share your Opinion

Edited by:
  • Editor-In-Chief
    IJRDES
Reviewed by:
Similar Papers
Authors’ other publications
  • Phishing URL Detection us...
    14 Jun, 2020

    Phishing is one of the most prevalent cyber threats, where attackers deceive users through fraudulent websites or URLs...

  • Predicting Botnet Attack...
    01 Nov, 2025

    As an extension of cloud services to the edge, Fog computing is a current paradigm for latency-sensitive and...

  • Designing Interpretable a...
    05 Nov, 2025

    The world's food supply relies on individual with small holding farmers, but these farmers frequently lack access to...

  • Blockchain for Cybersecur...
    02 Mar, 2026

    Academic institutions have become prominent targets for evolving cyber threats, including ransom ware, credential theft, data manipulation attacks,...

×