AU2021107321A4 - Crime prediction and prevention using computer vision and deep learning model - Google Patents
Crime prediction and prevention using computer vision and deep learning model Download PDFInfo
- Publication number
- AU2021107321A4 AU2021107321A4 AU2021107321A AU2021107321A AU2021107321A4 AU 2021107321 A4 AU2021107321 A4 AU 2021107321A4 AU 2021107321 A AU2021107321 A AU 2021107321A AU 2021107321 A AU2021107321 A AU 2021107321A AU 2021107321 A4 AU2021107321 A4 AU 2021107321A4
- Authority
- AU
- Australia
- Prior art keywords
- model
- yolo
- output image
- crime
- neural network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
- 230000002265 prevention Effects 0.000 title claims description 6
- 238000013136 deep learning model Methods 0.000 title abstract description 9
- 238000001514 detection method Methods 0.000 claims abstract description 15
- 238000000034 method Methods 0.000 claims description 16
- 238000013528 artificial neural network Methods 0.000 claims description 11
- 238000011176 pooling Methods 0.000 claims description 7
- 238000012549 training Methods 0.000 claims description 6
- 238000012545 processing Methods 0.000 claims description 2
- 238000012958 reprocessing Methods 0.000 claims description 2
- 238000010801 machine learning Methods 0.000 abstract description 9
- 238000004458 analytical method Methods 0.000 abstract description 5
- 238000013527 convolutional neural network Methods 0.000 abstract description 5
- 238000004140 cleaning Methods 0.000 abstract description 4
- 230000009466 transformation Effects 0.000 abstract description 4
- 238000003066 decision tree Methods 0.000 abstract description 3
- 238000013135 deep learning Methods 0.000 abstract description 3
- 230000008901 benefit Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 7
- 238000011160 research Methods 0.000 description 4
- 238000012360 testing method Methods 0.000 description 3
- 238000013459 approach Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000003466 anti-cipated effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000001815 facial effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 230000001537 neural effect Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/50—Context or environment of the image
- G06V20/52—Surveillance or monitoring of activities, e.g. for recognising suspicious objects
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Image Analysis (AREA)
Abstract
Crime detection is one of the most useful applications for deep
learning because it helps curb crime and increase people's security. In
this disclosure, a system is developed for object detection using YOLO
Darknet model for the detection of suspicious objects like weapons and
knives in the hands of an individual. This ensures that false alarms can be
prevented by only detecting a weapon or knife. The model will help to
detect and predict the crimes. The proposed model is implemented using
Convolutional Neural Network with YOLO V3 model and this has achieved
an better accuracy than other existing algorithms. The model has also
shown that how deep learning model can perform better than the
machine learning model in the case of object detection.
9
Descriptive analysis of data
Cleaning and transformation
of data
Modelling of data
Performance estimation
FIGURE 3
Model Accuracy (%)
Decision tree 59.15
K-NN (K=10) 87.53
Traditional CNN 94.3
Faster RCNN 95.44
YOLO V2 96.76
YOLO V3 98.89
FIGURE 4
Description
Descriptive analysis of data
Cleaning and transformation of data
Modelling of data
Performance estimation
FIGURE 3
Model Accuracy (%) Decision tree 59.15
K-NN (K=10) 87.53
Traditional CNN 94.3 Faster RCNN 95.44
YOLO V2 96.76
YOLO V3 98.89
FIGURE 4
Crime prediction and prevention using computer vision and deep learning model
The system and the method for crime prediction and prevention are detailed in this disclosure which involves computer vision and deep learning-based approaches.
Computer vision is a branch for training a computer in recognizing to grasp a virtual object or word and so gives a feel to comprehend the environment. It largely analyses surrounding data from a camera and is hence important for its applications. They can be used to recognise the face, recognise plaques for numbers, increase and blend realities, locate and identify objects. Research on mathematical strategies are currently being undertaken for the recovery and computer comprehension of 3D images. Obtaining 3D object visuals can help us with the detection of objects, pedestrian recognition, face-recognition, active look, personal. These are merely basic applications and can be studied further in any of the categories indicated above. The algorithms is introduced for undertaking quick prototyping research into computer vision such that a tool is much faster than anticipated in order to achieve computer vision outcomes. Human posture can also be identified with regard to facial detection / human recognition.
Machine Learning (ML) allows to learn from prior events and improve them automatically without having to be explicitly programmed. After evaluating the data, it is not always possible to discern an accurate pattern or information. The exact pattern and information is used to interpret the ML in such circumstances. ML advocates the idea that the machine may learn and resolve complicated mathematical issues and some specialised problems.
The machine is trained in supervised learning, that enable it to achieve correct conclusions. The machine has a series of data in unattended learning and has to come across certain patterns as well as connections between the data. Neural networks have been studied since the 1980s and are significant tools for supervised learning. The researcher also suggests that several elements are necessary to achieve an exit from the completeness of the non-deterministic polynomial (NP) and that architectural restrictions are not enough.
It is simple to forecast crimes before they occur, yet the concept needs much more than to realize. This study was designed to help researchers build and utilize advanced technologies in real life to execute crime prediction. This study set out a foundation for developing a system that is much better for police forces. The initial problem is making this system effective, followed, among other things. A notable feature of this invention is that we have implemented YOLO (You Only Look Once) model with Convolutional Neural Network for the object detection. The model has achieved better accuracy than the traditional CNN models.
This disclosure has a second objective: applying the deep learning method for detecting the crime, that can prevent us from further happening any crime.
The disclosures outlined above present the modes of operation that can be combined with DL to assist in identifying and detecting the crime.
This disclosure is also made to show how effective the deep learning model is in comparison to the other machine learning algorithms already on the market.
Detailed drawings and additional information on the invention can be found in the attachment. The scope of the invention is not limited by the above illustrations, which only show the most common aspects of the storey. Specificity and detail will be provided alongside the drawings to supplement the explanation.
When the following thorough explanation is read concerning the accompanying drawings, where like characters indicate like parts throughout the drawings, these and other features, aspects, and advantages of the current disclosure will become clearer: Figure 1 illustrates a flow diagram of a method for crime prediction and prevention, Figure 2 illustrates a data flow diagram of a system in which collection of images based on different types of crimes is predicted by using deep learning models for the analysis of crime detection, Figure 3 illustrates a flow diagram for the functionality approach of the proposed model. This includes the data cleaning and the transformation before modeling the data. Finally the performance is estimated using the parameter i.e. accuracy. Figure 4 illustrates the comparison table of the models in which machine learning algorithms are compared with deep learning models on the basis of parameters i.e. accuracy. The table has also shown the comparison of different types of YOLO models. The YOLO V3 has achieved the accuracy of 9 8 .8 9 % which is better than the other states of the art algorithms.
Figure 5 illustrates the comparison graph based on the accuracy of the machine learning models and the deep learning models. The graph has also shown that the deep learning models performed better than the machine learning algorithm in the case of object detection and the object prediction.
Further, skilled artisans will appreciate that elements in the drawings are illustrated for simplicity and may not have been necessarily been drawn to scale. For example, the flow charts illustrate the method in terms of the most prominent steps involved to help to improve understanding of aspects of the present disclosure. Furthermore, in terms of the construction of the device, one or more components of the device may have been represented in the drawings by conventional symbols, and the drawings may show only those specific details that are pertinent to understanding the embodiments of the present disclosure so as not to obscure the drawings with details that will be readily apparent to those of ordinary skill in the art having benefit of the description herein.
Embodiments of the present invention will be described below in detail with reference to the accompanying drawings.
The new features depend entirely on the computer and thus require human development interaction, but once developed, they function without interaction and release people for other tasks. The proposed method has been implemented in a variety of research using well-known or state-of-the-art designs. Some research; on the other hand, have presented their own customized algorithm and architecture, which are not based on well-known architectures. In this disclosure we have used the YOLO object detection model for detecting the crime scene. Previously deep learning model i.e. Convolutional Neural
Network (CNN) is used for the classification, but it cannot be considered a better model for the detection purpose. So, for performing the detection, a YOLO model is proposed with CNN.
Figure 1 illustrates a flow diagram of a method for crime prediction and prevention, wherein the method compromises of: Step (102) discloses about capturing an image of surrounding using a capturing module.
Step (104) discloses about processing captured image using a neural network having a plurality of filters for producing a first output image, wherein adding a first pooling layer to the first output image, wherein the neural network is a convolution neural network (CNN) having 16 filters of size 3X3 having a first input size is selected from but not limited to 416x416X3 to obtain the first output image of size is selected from but not limited to 416x416X16.
Step (106) discloses about reprocessing the first output image using the neural network to obtain a second output image, wherein adding a second pooling layer to the second output image, wherein the CNN includes a second input size is selected from but not limited to 208 x 208 x 16 to obtain the second output image of size is selected from but not limited to 208 x 208 x 32, wherein a size of the pooling layer is selected from but not limited to 2X2.
Step (108) discloses about predicting multiple bounding boxes and class probabilities of boxes of the first output image and the second output image using the neural network, wherein predicting the crime based on the predicted bounding boxes, wherein a training model of the CNN you only look once (YOLO) trains the captured photos and optimizes detection performance by identifying and eliminating false positives.
Referring to Figure 2, a data flow diagram of a system for the prediction of crime scene is implemented. In the first step data is collected and preprocessed. Then in the second phase, model is selected i.e. Convolutional Neural Network for performing the training and testing and finally fine tuning is performed by YOLO models. This YOLO model is finally used for detection and prediction of the crime images.
All the implementation is done through python programming language. The crime related image dataset is split into two parts i.e. training dataset and the testing dataset. The model is developed using the training dataset and the validation is done through the testing dataset. The model used is Convolutional neural networks which consist of different types of dropout layer, regularization method and the max pooling layers. Finally the model is tuned using the YOLO V3 model.
Figure 3 illustrates a flow diagram of a method for the functional architecture of the proposed model. The descriptive analysis of the data is done in the first step, followed by the cleaning and the transformation of the data. Finally the modeling of the data is implemented with the performance evaluation of the model.
Figure 4 illustrates the comparison table of these models based on the parameters such as accuracy. The models used for the comparison are decision tree, K-NN, CNN, and the YOLO V2 model. It can be observed that YOLO V3 has performed better than the other existing models. The model has achieved the accuracy of 9 8 . 8 9 %. So it can be easily said that YOLO V3 is better than the other states of the art algorithms.
Figure 5 illustrates the comparison graph of the proposed model and the existing classifiers. YOLO V3 has achieved the accuracy of 98.89%.
The drawings and the forgoing description give examples of embodiments. Those skilled in the art will appreciate that one or more of the described elements may well be combined into a single functional element. Alternatively, certain elements may be split into multiple functional elements. Elements from one embodiment may be added to another embodiment. For example, orders of processes described herein may be changed and are not limited to the manner described herein. Moreover, the actions of any flow diagram need not be implemented in the order shown; nor do all of the acts necessarily need to be performed. Also, those acts that are not dependent on other acts may be performed in parallel with the other acts. The scope of embodiments is by no means limited by these specific examples. Numerous variations, whether explicitly given in the specification or not, such as differences in structure, dimension, and use of material, are possible. The scope of embodiments is at least as broad as given by the following claims.
Benefits, other advantages, and solutions to problems have been described above with regard to specific embodiments. However, the benefits, advantages, solutions to problems, and any component(s) that may cause any benefit, advantage, or solution to occur or become more pronounced are not to be construed as a critical, required, or essential feature or component of any or all the claims.
Claims (5)
1. A method for crime prediction and prevention, wherein the method compromises of: capturing an image of surrounding using a capturing module; processing captured image using a neural network having a plurality of filters for producing a first output image, wherein adding a first pooling layer to the first output image; reprocessing the first output image using the neural network to obtain a second output image, wherein adding a second pooling layer to the second output image; and predicting multiple bounding boxes and class probabilities of boxes of the first output image and the second output image using the neural network, wherein predicting the crime based on the predicted bounding boxes.
2. The method as claimed in claim 1, wherein the neural network is a convolution neural network (CNN) having 16 filters of size 3X3 having a first input size is selected from but not limited to 416x416X3 to obtain the first output image of size is selected from but not limited to 416x416X16.
3. The method as claimed in claim 1, wherein the CNN includes a second input size is selected from but not limited to 208 x 208 x 16 to obtain the second output image of size is selected from but not limited to 208 x 208 x 32.
4. The method as claimed in claim 1, wherein a size of the pooling layer is selected from but not limited to 2X2.
5. the method as claimed in claim 1, wherein a training model of the CNN you only look once (YOLO) trains the captured photos and optimizes detection performance by identifying and eliminating false positives.
FIGURE 2 FIGURE 1
FIGURE 3
FIGURE 4
FIGURE 4
FIGURE 5
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2021107321A AU2021107321A4 (en) | 2021-08-25 | 2021-08-25 | Crime prediction and prevention using computer vision and deep learning model |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2021107321A AU2021107321A4 (en) | 2021-08-25 | 2021-08-25 | Crime prediction and prevention using computer vision and deep learning model |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2021107321A4 true AU2021107321A4 (en) | 2021-12-16 |
Family
ID=78948973
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2021107321A Ceased AU2021107321A4 (en) | 2021-08-25 | 2021-08-25 | Crime prediction and prevention using computer vision and deep learning model |
Country Status (1)
Country | Link |
---|---|
AU (1) | AU2021107321A4 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115861185A (en) * | 2022-11-14 | 2023-03-28 | 杭州电子科技大学 | Rice planthopper counting model with field complex background |
CN115936431A (en) * | 2022-11-28 | 2023-04-07 | 四川大学华西医院 | Crime risk assessment method, crime risk assessment device, computer equipment and readable storage medium |
-
2021
- 2021-08-25 AU AU2021107321A patent/AU2021107321A4/en not_active Ceased
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115861185A (en) * | 2022-11-14 | 2023-03-28 | 杭州电子科技大学 | Rice planthopper counting model with field complex background |
CN115861185B (en) * | 2022-11-14 | 2023-08-11 | 杭州电子科技大学 | Rice planthopper counting method for field complex background |
CN115936431A (en) * | 2022-11-28 | 2023-04-07 | 四川大学华西医院 | Crime risk assessment method, crime risk assessment device, computer equipment and readable storage medium |
CN115936431B (en) * | 2022-11-28 | 2023-10-20 | 四川大学华西医院 | Re-crime risk assessment method, device, computer equipment and readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Cao et al. | An attention enhanced bidirectional LSTM for early forest fire smoke recognition | |
AU2021107321A4 (en) | Crime prediction and prevention using computer vision and deep learning model | |
Alfaifi et al. | Human action prediction with 3D-CNN | |
CN111738074B (en) | Pedestrian attribute identification method, system and device based on weak supervision learning | |
Banjarey et al. | Human activity recognition using 1D convolutional neural network | |
CN114764869A (en) | Multi-object detection with single detection per object | |
McCoy et al. | Ensemble deep learning for sustainable multimodal uav classification | |
Zhao et al. | Driver drowsiness recognition via transferred deep 3D convolutional network and state probability vector | |
Kashevnik et al. | Human head angle detection based on image analysis | |
Wang et al. | Fusion of skeleton and inertial data for human action recognition based on skeleton motion maps and dilated convolution | |
Pandiaraja et al. | An Analysis of Abnormal Event Detection and Person Identification from Surveillance Cameras using Motion Vectors with Deep Learning | |
Ragesh et al. | Fast R-CNN based Masked Face Recognition for Access Control System | |
Chatterjee et al. | Pose4Gun: A pose-based machine learning approach to detect small firearms from visual media | |
Raza et al. | Pedestrian classification by using stacked sparse autoencoders | |
Usman et al. | Abnormal crowd behavior detection using heuristic search and motion awareness | |
Devi et al. | Deep learn helmets-enhancing security at ATMs | |
Sarkar et al. | A comparative study of classifiers used in facial embedding classification | |
Doulamis et al. | An architecture for a self configurable video supervision | |
Begampure et al. | Enhanced video analysis framework for action detection using deep learning. | |
Shringare et al. | Face Mask Detection Based Entry Control Using XAI and IoT | |
Vosta et al. | KianNet: A violence detection model using an attention-based CNN-LSTM structure | |
Athalla et al. | Analysis of Smart Home Security System Design Based on Facial Recognition With Application of Deep Learning | |
Paul et al. | Low-computation iot system framework for face recognition using deep learning algorithm | |
Liu | Crime prediction from digital videos using deep learning | |
Singh et al. | Face Recognition–Based Surveillance System: A New Paradigm for Criminal Profiling |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FGI | Letters patent sealed or granted (innovation patent) | ||
MK22 | Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry |