Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3584376.3584589acmotherconferencesArticle/Chapter ViewAbstractPublication PagesricaiConference Proceedingsconference-collections
research-article
Open access

A real-time framework for dangerous behavior detection based on deep learning

Published: 19 April 2023 Publication History

Abstract

Identifying dangerous behaviors of workers in complex production operation scenarios is an important research field of intelligent monitoring technology. When implementing practical applications, it often has complex and diverse function requirements and business logic. To this end, this paper proposes a unified and simple framework for monitoring unsafe behavior based on deep learning technology. We first conduct data analysis and demand logic disassembly based on six actual production scenarios and decouple the complex task requirement as a coupled problem of object detection function, adaptive and variable scene recognition function, behavior analysis function, and safety logic reasoning function. Then we build a unified detection framework and use four sub-modules for real-time and high-efficiency detection, which are a perceptron-based efficient scene recognition module, a Yolov5s-based real-time object detection module, an area-based behavior judgment module, and a configurable safety rule inference module. While maintaining the characteristics of splitting and combining these modules for different application requirements, their effects on the test set have also reached the best. Among them, the accuracy rate of the scene recognition module has reached 100.00%, and the mAP of the object detection module has reached 99.06%, average FPS of the overall framework reached 72.05.

References

[1]
Bobick, A. F., J. W. J. I. T. o. p. a. Davis and m. intelligence. 2001. "The recognition of human movement using temporal templates." IEEE Transactions on pattern analysis machine intelligence 23(3): 257-267.
[2]
Cao, Z., T. Simon, S.-E. Wei and Y. Sheikh. 2017. Realtime multi-person 2d pose estimation using part affinity fields. Proceedings of the IEEE conference on computer vision and pattern recognition.
[3]
Chunhe, L. I., S. Tao and T. J. M. E. Technique. 2019. "Design of large data based real-time perception information acquisition system for mining personnel safety." Modern Electronics Technique.
[4]
Dollár, P., V. Rabaud, G. Cottrell and S. Belongie. 2005. Behavior recognition via sparse spatio-temporal features. 2005 IEEE international workshop on visual surveillance and performance evaluation of tracking and surveillance, IEEE.
[5]
Fang, H.-S., S. Xie, Y.-W. Tai and C. Lu. 2017. Rmpe: Regional multi-person pose estimation. Proceedings of the IEEE international conference on computer vision.
[6]
Girshick, R. 2015. Fast r-cnn. Proceedings of the IEEE international conference on computer vision.
[7]
Glenn, J. 2022. YOLOv5 release v6. 1.
[8]
Goutte, C. and E. Gaussier. 2005. A probabilistic interpretation of precision, recall and F-score, with implication for evaluation. European conference on information retrieval, Springer.
[9]
Junejo, I. N. J. S., Image and V. Processing. 2010. "Using dynamic Bayesian network for scene modeling and anomaly detection." Signal, Image Video Processing 4(1): 1-10.
[10]
Kobatake, H. and Y. J. I. T. o. M. I. Yoshinaga. 1996. "Detection of spicules on mammogram based on skeleton analysis." IEEE Transactions on Medical Imaging 15(3): 235-245.
[11]
Lee, J., K.-i. J. M. T. Hwang and Applications. 2022. "YOLO with adaptive frame control for real-time object detection applications." Multimedia Tools Applications 81(25): 36375-36396.
[12]
Li, C., L. Li, H. Jiang, K. Weng, Y. Geng, L. Li, Z. Ke, Q. Li, M. Cheng and W. J. a. p. a. Nie. 2022. "YOLOv6: a single-stage object detection framework for industrial applications." arXiv preprint arXiv:.02976.
[13]
Li, W., V. Mahadevan, N. J. I. t. o. p. a. Vasconcelos and m. intelligence. 2013. "Anomaly detection and localization in crowded scenes." IEEE transactions on pattern analysis machine intelligence 36(1): 18-32.
[14]
Lin, T.-Y., P. Goyal, R. Girshick, K. He and P. Dollár. 2017. Focal loss for dense object detection. Proceedings of the IEEE international conference on computer vision.
[15]
Mabrouk, A. B. and E. J. E. S. w. A. Zagrouba. 2018. "Abnormal behavior recognition for intelligent video surveillance systems: A review." Expert Systems with Applications 91: 480-491.
[16]
Neubeck, A. and L. Van Gool. 2006. Efficient non-maximum suppression. 18th International Conference on Pattern Recognition (ICPR'06), IEEE.
[17]
Padilla, R., S. L. Netto and E. A. Da Silva. 2020. A survey on performance metrics for object-detection algorithms. 2020 international conference on systems, signals and image processing (IWSSIP), IEEE.
[18]
Raudys, Š. J. N. N. 1998. "Evolution and generalization of a single neurone: I. Single-layer perceptron as seven statistical classifiers." Neural Networks 11(2): 283-296.
[19]
Redmon, J., S. Divvala, R. Girshick and A. Farhadi. 2016. You only look once: Unified, real-time object detection. Proceedings of the IEEE conference on computer vision and pattern recognition.
[20]
Ren, S., K. He, R. Girshick and J. J. A. i. n. i. p. s. Sun. 2015. Faster r-cnn: Towards real-time object detection with region proposal networks. Advances in neural information processing systems.
[21]
Singarimbun, R. N., E. B. Nababan and O. S. Sitompul. 2019. Adaptive moment estimation to minimize square error in backpropagation algorithm. 2019 International Conference of Computer Science and Information Technology (ICoSNIKOM), IEEE.
[22]
Sung, K.-K., T. J. I. T. o. p. a. Poggio and m. intelligence. 1998. "Example-based learning for view-based human face detection." IEEE Transactions on pattern analysis machine intelligence 20(1): 39-51.
[23]
Töreyin, B. U., Y. Dedeoğlu, U. Güdükbay and A. E. J. P. r. l. Cetin. 2006. "Computer vision based method for real-time fire and flame detection." Pattern recognition letters 27(1): 49-58.
[24]
Wang, C.-Y., A. Bochkovskiy and H.-Y. M. J. a. p. a. Liao. 2022. "YOLOv7: Trainable bag-of-freebies sets new state-of-the-art for real-time object detectors." arXiv preprint arXiv:.02696.
[25]
Wang, L., Y. Xiong, Z. Wang, Y. Qiao, D. Lin, X. Tang and L. Van Gool. 2016. Temporal segment networks: Towards good practices for deep action recognition. European conference on computer vision, Springer.
[26]
Wang, Q., Q. Ma, C.-H. Luo, H.-Y. Liu, C.-L. J. I. J. o. P. R. Zhang and A. Intelligence. 2016. "Hybrid histogram of oriented optical flow for abnormal behavior detection in crowd scenes." International Journal of Pattern Recognition Artificial Intelligence 30(02): 1655007.
[27]
Yang, X., S. Zhou, L. I. Na and X. J. S. i. C. M. Wang. 2019. "Deep Learning and Its Application in Coal Mine Safety." Safety in Coal Mines 50 (1): 253-256.
[28]
Yue-Hei Ng, J., M. Hausknecht, S. Vijayanarasimhan, O. Vinyals, R. Monga and G. Toderici. 2015. Beyond short snippets: Deep networks for video classification. Proceedings of the IEEE conference on computer vision and pattern recognition.
[29]
Zhu, Y., J. Zhao, Y. Wang and B.-B. J. A. A. S. Zheng. 2016. "A review of human action recognition based on deep learning." Acta Automatica Sinica 42(6): 848-857.

Cited By

View all
  • (2024)ViDAS: Vision-based Danger Assessment and ScoringProceedings of the Fifteenth Indian Conference on Computer Vision Graphics and Image Processing10.1145/3702250.3702279(1-9)Online publication date: 13-Dec-2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
RICAI '22: Proceedings of the 2022 4th International Conference on Robotics, Intelligent Control and Artificial Intelligence
December 2022
1396 pages
ISBN:9781450398343
DOI:10.1145/3584376
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 19 April 2023

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

RICAI 2022

Acceptance Rates

Overall Acceptance Rate 140 of 294 submissions, 48%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)477
  • Downloads (Last 6 weeks)75
Reflects downloads up to 08 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)ViDAS: Vision-based Danger Assessment and ScoringProceedings of the Fifteenth Indian Conference on Computer Vision Graphics and Image Processing10.1145/3702250.3702279(1-9)Online publication date: 13-Dec-2024

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media