Acta Scientific Computer Sciences

Research Article Volume 5 Issue 5

Real-Time Threat Detection Using the Yolo Version-4 Algorithm

Subhani Shaik, V Kakulapati*, Saadiq, Ontela Sanjay and Krishna Reddy

Sreenidhi Institute of Science and Technology, Yamnampet, Ghatkesar, Hyderabad, Telangana, India

*Corresponding Author: V Kakulapati, Sreenidhi Institute of Science and Technology, Yamnampet, Ghatkesar, Hyderabad, Telangana, India.

Received: March 25, 2023; Published: April 12, 2023

Abstract

Big data applications are consuming the bulk of the space in industry and research. CCTV camera video streams are just as important as social media data, sensor data, agricultural data, medical data, and data produced from space research when it comes to big data. Surveillance videos provide a substantial contribution to unstructured big data. All places where security is a concern have CCTV cameras installed. It indicates that manual surveillance is inconvenient and time-consuming. Depending on the scenario, security may be defined in a variety of ways, such as detecting theft, detecting violence, estimating the risk of an explosion, and so on. The phrase "security" in crowded public places applies to almost any uncommon incident. In addition to assessing whether the captured movements are odd or suspicious, it demands a workforce and constant attention. Much of the research in the literature review suggested implementing surveillance using hardware and software tools that take video as input and require massive datasets. As it includes group activities, detecting violence among them is tough. Due to various real-world constraints, detecting anomalous or aberrant behaviour in a crowd video scene is extremely challenging. This work begins with item recognition in a crowded area. The main goal of this application is to identify weapons in the surrounding area, such as guns, knives, and fire, and to notify management of the potential threat by sending a screenshot to the user interface. This could be a good way for security and law enforcement staff to find out about the weapon in the surveillance.

Keywords: Yolo Version-4 Algorithm; Surveillance Videos; CCTV Camera; Threat Detection; Sensors; Violence; Risk; Hardware

References

  1. Radhika C., et al. “Face Recognition Based Attendance System Using Machine Learning Algorithms". Proceedings of the Second International Conference on Intelligent Computing and Control Systems (ICICCS 2018) IEEE Xplore Compliant Part Number: CFP18K74-ART (2018).
  2. Omar Abdul., et al. “Class Attendance Management System Using Face Recognition”. 2018 7th International Conference on Computer and Communication Engineering (ICCCE) IEEE (2018).
  3. Adrian Rhesa Septian Siswanto., et al. “Implementation of Face Recognition Algorithm for Biometrics Based time Attendance System "Center for Information Communication Technology Agency for the Assessment Application of Technology (PTIKBPPT) Teknologi 3 BId., 3F, PUSPIPTEK Serpong, Tangerang, INDONESIA, 15314.5ITM Web of Conferences 32,02001 (2020).
  4. Jinsu Kim., et al. “Face Recognition Enhancement by Employing Facial Component Classification and Reducing the Candidate Gallery Set. Department of Computer Engineering, Sejong University, Seoul, 143-747, Korea (sbmoon@sejong.ac.kr).
  5. Nusrat Mubin Ara., et al. “Convolutional Neural Network (CNN) Approach for Vision Based Student Recognition System". 2017 20th International Conference of Computer and Information Technology (ICCIT), 22-24 December (2017).
  6. Xin Xiong Liu and Wanru Wang. “User-Centered Design of Attendance Record System Based on Mobile Terminals" 2017 International Symposium on Computer Science and Intelligent Attendance System in College Using Face Recognition and NFC". International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology6 (2017): 14-21.
  7. Rekha E and Ram Prasad. P. “An Efficient Automated Attendance Management System based on Eigen Face Recognition". Department of Electrical Engineering, Amity University, Dubai-UAE.
  8. Shu Zhan Toru Kuriharak and Shigeru Ando “Facial Authentication System Based on Real-Time 3D Facial Imaging By Using Correlation Image Sensor" School of Computer and Information Department of Information Physics and Computing Hefei University of Technology The University of Tokyo Hefei, Anhui, 230009, China 7-3-1 Bunkyo-Ku, Tokyo113-8656.
  9. Asri Nuhi., et al. “Smart Attendance System using QR code”. 9th Mediterranean conference Embedded Computing, Budva, Montenegro (2020).
  10. MA Meor., et al. “Centre for Telecommunication Research and Innovation FakultiKej. ElektronikdanKej. Komputer Universiti Teknikal Malaysia Melaka Hang TuahJaya, Durian Tunggal 76100, Melaka, Malaysia (2014).
  11. Amena Khatun., et al. “Design and Implementation of Iris Recognition Based Attendance Management System”. ICEEICT Jahangirnagar University, Bangladesh (2015).
  12. Shreyak Sawhney., et al. “Real Time Smart Attendance System using Face Recognition Techniques” in Amity University Uttar Pradesh, Noida, (2019).
  13. Awais Ahmed. “LBPH-based Improved face recognition at low Resolution”. UNIVERSITY OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA 2018 IEEE.
  14. “Multi-Faces Recognition Process Using Haar Cascades and Eigenface Methods” Teddy Montoro, Media A. Ayu, Suhendi Sampoerna University, Jakarta, Indonesia (2018).
  15. HAO YANG and XIAO FENG HAN. “Face Recognition Attendance System Based on Real-Time Video Processing” is supported in part by the Basic Public Welfare Research Project of Zhejiang Province under Grant LGF 20H 180001, (2020).

Citation

Citation: V Kakulapati., et al. “Real-Time Threat Detection Using the Yolo Version-4 Algorithm". Acta Scientific Computer Sciences 5.5 (2023): 50-55.

Copyright

Copyright: © 2023 V Kakulapati., et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.




Metrics

Acceptance rate35%
Acceptance to publication20-30 days

Indexed In




News and Events


  • Certification for Review
    Acta Scientific certifies the Editors/reviewers for their review done towards the assigned articles of the respective journals.
  • Submission Timeline for Upcoming Issue
    The last date for submission of articles for regular Issues is May 30, 2024.
  • Publication Certificate
    Authors will be issued a "Publication Certificate" as a mark of appreciation for publishing their work.
  • Best Article of the Issue
    The Editors will elect one Best Article after each issue release. The authors of this article will be provided with a certificate of "Best Article of the Issue"
  • Welcoming Article Submission
    Acta Scientific delightfully welcomes active researchers for submission of articles towards the upcoming issue of respective journals.

Contact US