dc.contributor.advisor | Rahman, Md. Khalilur | |
dc.contributor.author | Sakiba, Cyrus | |
dc.contributor.author | Tarannum, Syeda Maisha | |
dc.contributor.author | Nur, Farzana | |
dc.contributor.author | Arpan, Fahad Faisal | |
dc.contributor.author | Anzum, Ahnaf Ahmed | |
dc.date.accessioned | 2023-12-31T04:24:57Z | |
dc.date.available | 2023-12-31T04:24:57Z | |
dc.date.copyright | 2023 | |
dc.date.issued | 2023-05 | |
dc.identifier.other | ID 19101512 | |
dc.identifier.other | ID 19101178 | |
dc.identifier.other | ID 19101480 | |
dc.identifier.other | ID 22341070 | |
dc.identifier.other | ID 22341086 | |
dc.identifier.uri | http://hdl.handle.net/10361/22038 | |
dc.description | This thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science, 2023. | en_US |
dc.description | Cataloged from PDF version of thesis. | |
dc.description | Includes bibliographical references (pages 50-51). | |
dc.description.abstract | The principal goal of this study is to create a crime detection system in real-time that
can effectively handle closed-circuit television (CCTV) video feeds and evaluate them
for possible criminal occurrences. The system’s goal is to improve public safety by
offering an advanced approach that makes use of ConvLSTM’s expertise in modeling
temporal dynamics and YOLO v7’s expertise in object recognition. We suggest a
posture and weapon recognition system that can be applied to real-time videos.
The first method proposes the utilization of ConvLSTM for the detection of violent
postures. The Conv part is derived from MobileNet v2, while a bi-directional LSTM
technique is used. MobileNet v2 was chosen for its superior accuracy and efficiency
as a result of its lightweight architecture. The model will be trained to recognize
illegal behavior by being exposed to annotated datasets of surveillance videos that
depict different types of crime. The output of the system distinguishes between
violent and non-violent postures in real-time videos. The system identifies violent
postures as kicking, collar grabbing, choking, hair pulling, punching, slapping, etc.,
while identifying non-violent postures as hugging, handshaking, touching shoulders,
walking, etc. We used the real-time violence and non-violence dataset from Kaggle.
The second method uses YOLO v7 to detect weapons in three categories, e.g., sticks,
guns, and sharp objects. The YOLO v4 was also employed for the aforementioned
objective; however, the YOLO v7 yielded superior outcomes, hence it was chosen for
further implementation. We customized the weapons dataset to enable our model
to accurately detect local Asian weapons like machetes and sticks. The system’s
intended use is to prevent illegal acts using two distinct machine learning models in
a seamless way. | en_US |
dc.description.statementofresponsibility | Cyrus Sakiba | |
dc.description.statementofresponsibility | Syeda Maisha Tarannum | |
dc.description.statementofresponsibility | Farzana Nur | |
dc.description.statementofresponsibility | Fahad Faisal Arpan | |
dc.description.statementofresponsibility | Ahnaf Ahmed Anzum | |
dc.format.extent | 51 pages | |
dc.language.iso | en | en_US |
dc.publisher | Brac University | en_US |
dc.rights | Brac University theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. | |
dc.subject | Deep learning | en_US |
dc.subject | Bidirectional LSTM | en_US |
dc.subject | YOLOv7 | en_US |
dc.subject | YOLOv4 | en_US |
dc.subject | MobilenetV2 | en_US |
dc.subject | Violence prediction | en_US |
dc.subject | Realtime | en_US |
dc.subject.lcsh | Machine learning | |
dc.subject.lcsh | Cognitive learning theory | |
dc.subject.lcsh | Real-time data processing | |
dc.title | Real-time crime detection using convolutional LSTM and YOLOv7 | en_US |
dc.type | Thesis | en_US |
dc.contributor.department | Department of Computer Science and Engineering, Brac University | |
dc.description.degree | B.Sc. in Computer Science | |