在抢劫过程中预测异常和委托通知

Nikkath Bushra, S. Sibi, K. Vijayakumar, M. Niveditha
{"title":"在抢劫过程中预测异常和委托通知","authors":"Nikkath Bushra, S. Sibi, K. Vijayakumar, M. Niveditha","doi":"10.1109/ICECONF57129.2023.10084114","DOIUrl":null,"url":null,"abstract":"Nowadays, there are many problems due to robberies, and there are many solutions for this but this can't be stopped at that moment. The crime charge has increased because there aren't many security guards outside the cell. Consequently, there is a critical need for a sophisticated device that can detect an anomaly i.e., face occlusion and weapon detection are considered anomalous behavior. With the current system, the ongoing illegal behavior cannot be reported to the nearby protective authorities before the criminal may get away. With the aid of Convolutional neural network (CNN), YOLO algorithms, and SMTP for sending emails.this machine has provided a technique to identify and categories whether or not it's unusual behavior or not, and to send alerts to the security government. In which the MobileNetV2 model of CNN algorithm is used to detect the face mask of the burglar and YOLOv4 for detecting objects like guns, rifles, and knives. When compared to the ResNet50 model, MobileNetV2 gives high accuracy with less time consumption. With the number of crimes increasing as well as the lack of safety, there is a growing necessity to produce this kind of security gadget. This method helps in reporting the ongoing unlawful activity to the local government's concerned protection agency in order to prevent another robbery from occurring.","PeriodicalId":436733,"journal":{"name":"2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Predicting Anomalous and Consigning Apprise During Heists\",\"authors\":\"Nikkath Bushra, S. Sibi, K. Vijayakumar, M. Niveditha\",\"doi\":\"10.1109/ICECONF57129.2023.10084114\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays, there are many problems due to robberies, and there are many solutions for this but this can't be stopped at that moment. The crime charge has increased because there aren't many security guards outside the cell. Consequently, there is a critical need for a sophisticated device that can detect an anomaly i.e., face occlusion and weapon detection are considered anomalous behavior. With the current system, the ongoing illegal behavior cannot be reported to the nearby protective authorities before the criminal may get away. With the aid of Convolutional neural network (CNN), YOLO algorithms, and SMTP for sending emails.this machine has provided a technique to identify and categories whether or not it's unusual behavior or not, and to send alerts to the security government. In which the MobileNetV2 model of CNN algorithm is used to detect the face mask of the burglar and YOLOv4 for detecting objects like guns, rifles, and knives. When compared to the ResNet50 model, MobileNetV2 gives high accuracy with less time consumption. With the number of crimes increasing as well as the lack of safety, there is a growing necessity to produce this kind of security gadget. This method helps in reporting the ongoing unlawful activity to the local government's concerned protection agency in order to prevent another robbery from occurring.\",\"PeriodicalId\":436733,\"journal\":{\"name\":\"2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF)\",\"volume\":\"29 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECONF57129.2023.10084114\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECONF57129.2023.10084114","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

如今,由于抢劫有很多问题,也有很多解决办法,但这在那一刻是无法阻止的。犯罪指控增加了,因为牢房外没有很多保安。因此,迫切需要一种复杂的设备,可以检测异常,即面部遮挡和武器检测被认为是异常行为。在目前的制度下,正在进行的非法行为无法在罪犯逃跑之前向附近的保护当局报告。借助卷积神经网络(CNN)、YOLO算法和SMTP发送电子邮件。这台机器提供了一种技术来识别和分类它是否有不寻常的行为,并向安全政府发送警报。其中,CNN算法的MobileNetV2模型用于检测窃贼的面罩,YOLOv4用于检测枪支、步枪、刀具等物体。与ResNet50模型相比,MobileNetV2以更少的时间消耗提供了更高的精度。随着犯罪数量的增加以及安全性的缺乏,生产这种安全装置的必要性越来越大。这种方法有助于向当地政府有关保护机构报告正在进行的非法活动,以防止再次发生抢劫。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Predicting Anomalous and Consigning Apprise During Heists
Nowadays, there are many problems due to robberies, and there are many solutions for this but this can't be stopped at that moment. The crime charge has increased because there aren't many security guards outside the cell. Consequently, there is a critical need for a sophisticated device that can detect an anomaly i.e., face occlusion and weapon detection are considered anomalous behavior. With the current system, the ongoing illegal behavior cannot be reported to the nearby protective authorities before the criminal may get away. With the aid of Convolutional neural network (CNN), YOLO algorithms, and SMTP for sending emails.this machine has provided a technique to identify and categories whether or not it's unusual behavior or not, and to send alerts to the security government. In which the MobileNetV2 model of CNN algorithm is used to detect the face mask of the burglar and YOLOv4 for detecting objects like guns, rifles, and knives. When compared to the ResNet50 model, MobileNetV2 gives high accuracy with less time consumption. With the number of crimes increasing as well as the lack of safety, there is a growing necessity to produce this kind of security gadget. This method helps in reporting the ongoing unlawful activity to the local government's concerned protection agency in order to prevent another robbery from occurring.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信