Model for Hidden Weapon Detection Using Deep Convolutional Neural Network

Article Sidebar

Main Article Content

Moradeke Grace Adewumi
Olumide Sunday Adewale
Bolanle A. Ojokoh

Abstract: Insecurity has been a major threat to government and civilians in Nigeria for the past decade. Development of a security system is not yet enough to curb the situation. Hence, the need for weapon detection using Convolutional Neural Network. The researchers downloaded different images with guns and knives from the internet. Image labeler software was used to annotate each image separately and the results were saved as XML files. This was converted to CSV files which are represented in form of rows and columns. Rows are each element, while the column are the weight, height, Xmin, Ymin, Xmax and Ymax. Which represent the shape and location of the boxes. Extra files were created which was mapped to a particular number, and the label was represented in form of numbers such as 1 for knife and 0 for gun. TensorFlow API was used for the training. We trained 300epochs at 0.03 learning rate for Resnet50, Resnet101, InceptionV1 and the proposed model. The success rate of the training was determined, and the trained model was tested. The proposed model performed better than three other models when trained and tested with the same datasets.

Model for Hidden Weapon Detection Using Deep Convolutional Neural Network. (2024). International Journal of Latest Technology in Engineering Management & Applied Science, 13(11), 124-129. https://doi.org/10.51583/IJLTEMAS.2024.1311013

Downloads

Downloads

Download data is not yet available.

References

Adewumi, M. G., Adewale, O. S., Akinwumi, A. O., & Ajisola, K. T. (2022). Security Intelligence Framework for Suicide Bombers Identification in a Crowd. International Journal of Academic Research in Business and Social Sciences, 12(4), 697–706. https://doi.org/10.6007/ijarbss/v12-i4/13124 DOI: https://doi.org/10.6007/IJARBSS/v12-i4/13124

Akcay, S., Kundegorski, M. E., Willcocks, C. G., & Breckon, T. P. (2020). On Using Deep Convolutional Neural Network Architectures for Object Classification and Detection within X-ray Baggage Security Imagery. 1–13. DOI: https://doi.org/10.1109/TIFS.2018.2812196

Fox, W., Vesecky, J., & Laws, K. (2017). Mathematical Modeling and Simulation for Detection of Suicide bomber. 993943, 22–30.

Jong Hyun Kim, H. G. H. and K. R. P. (2017). Convolutional Neural Network-Based Human Detection in Nighttime Images Using Visible Light Camera Sensors. MPDI.

Kaya, V., Tuncer, S., & Baran, A. (2021). Detection and classification of different weapon types using deep learning. Applied Sciences (Switzerland), 11(16). https://doi.org/10.3390/app11167535 DOI: https://doi.org/10.3390/app11167535

Kingdom, U., Nnamdi, A. C., Assembly, N., Sebastine, A. I., Junior, E. O., Kingdom, U., & Anyanwu, K. (2015). Boko-haram Crisis and Implications for Development in the Northern Nigeria. III(4), 1–12.

Lim, S. (2017). Classification in Few Class Problem. Elsevier Journal. 21(1); 144–150. DOI: https://doi.org/10.6109/jkiice.2017.21.1.144

Qiang, B., Chen, R., Zhou, M., Pang, Y., & Zhai, Y. (2020). Convolutional Neural Networks-Based Object Detection Algorithm by Jointing Semantic. MPDI. DOI: https://doi.org/10.3390/s20185080

Rafi, U. (2016). An Efficient Convolutional Network for Human Pose Estimation.IEEE Journal of Computer Society, 10(6); 1002-1034. DOI: https://doi.org/10.5244/C.30.109

Sultana, F., Sufian, A., & Dutta, P. (2019). A Review of Object Detection Models based on Convolutional Neural Network. DOI: https://doi.org/10.1007/978-981-15-4288-6_1

Vanimireddy, A., & Kumari, D. A. (2012). Detection of Explosives Using Wireless Sensor Networks. 3, 277–280.

Wei, S., Ramarkrishna, V., Kanade, T., and Sheikah, Y., (2019). Convolutional Pose Machines. CVF. IEEE Xplore. 4724-4731.

Article Details

How to Cite

Model for Hidden Weapon Detection Using Deep Convolutional Neural Network. (2024). International Journal of Latest Technology in Engineering Management & Applied Science, 13(11), 124-129. https://doi.org/10.51583/IJLTEMAS.2024.1311013

Similar Articles

You may also start an advanced similarity search for this article.