SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 12 | Dec 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 174
Real Time Crime Detection using Deep Learning
Kowshik, Shoeb, Dr.Y.Rama Devi
Abstract - Crime detection and prevention have always
been critical concerns for society. With the rapid
advancements in technology, particularly in the field of deep
learning and artificial intelligence, new opportunities have
emerged to enhance real-time crime detection capabilities.
Deep learning techniques have demonstrated remarkable
potential in analysing various types of data sources, such as
surveillance footage, sensor data, and social media feeds, to
identify criminal activities, predict incidents, and aid law
enforcement agencies in proactive responses. This survey
paper seeks to provide a thorough overview of the application
of deep learning in real-time crime detection. This paper digs
into the various deep learning architectures and
methodologies employed for this purpose, explore the
challenges and limitations associated with these techniques,
and discuss ethical and legal considerations.
Key Words: crime detection, crime datasets, deep
learning, CNN, LSTM.
1. INTRODUCTION
The number of recorded criminal incidents is increasing,
including robbery, vandalism, assault, murder, and
kidnapping. However, the conventional methods of criminal
investigation and prevention are often labor-intensive and
inefficient. To address this challenge, a novel deep learning-
based system named "Spot Crime" has been proposed. Spot
Crime is a web application designed to enhance public safety
and support law enforcement efforts by automating the
monitoring of liveCCTVfootageandalertingpoliceofficialsto
suspicious activities. This innovativesystememployscustom
convolutional neural networks(CNNs)andadvancedmodels
for behaviour classification, allowing it to analyze human
activity in real-time video frames. The selection of the best-
performing model is based on validation accuracy, and its
purpose is to aid in the early detection of criminal incidents.
In light of the increasing crime rates in India, especially
during lockdowns, the need for such a system has become
paramount. Spot Crime offers a solution to the challenges
posed by manual surveillance, providing a more effective
means of crime prevention and promoting public safety by
promptly notifying authorities of potential criminal activity
and its location [1].
YOLO,standsoutasaneffectiveobjectdetectionalgorithm
using a single convolutional neural network to predict
bounding boxes and probabilities. It relies on a sizable
training dataset for optimal performance. Google
Collaboratory with an integrated Tesla K80 GPU is preferred
forefficient GPUutilization.ThetrainedYOLOmodelexcelsin
detecting numerous objects even in complex scenes, striving
to improve Mean Average Precision and minimize average
loss for accurate object recognition. [2] The YOLOv5
architecturehas emerged asa promising choice forreal-time
facial recognition. In this research paper, a comparative
analysis was conducted, pitting YOLOv5 against its
predecessors (v3 and v4) for real-time facial recognition
systems. The experiments revealed an 87% accuracy ratefor
YOLOv5 on the FDDB dataset and an impressive 94%
accuracy on a custom real-time face recognition dataset,
significantly outperforming its predecessors. This
underscores the potential of deep learning in the realm of
facial recognition,suggestingthatwiththerightdirectionand
approach, deep learning and AI have much more to offer in
the future. [3]. Public information resources areimportantin
crime prediction. As a result, they gathered historical data
using information resources such as news websites. They
gathered information about occurrences that occurred
around the country at a specific time and used classification
to forecast future crimes. In the process, classification
methods such as Support Vector Machine (SVM), Decision
Tree, Random Forest, and logistic regression are used.
Furthermore, the system uses all of the collected data to
predict crime activity and visually displays regions with a
higher risk of crimeoccurrenceonamap.Theseforecastscan
be used to improve emergency response by allocating
resources depending on demand, as well as to prevent crime
[4].
The present algorithms successfully detect items in
certain annotated photographs, but they require locations,
classes, andbackgrounddistributions.Whentheobjectswere
manually annotated, however, the assignment process
became onerous and time-consuming. The former sliding
window object identification approach's handcrafted
characteristics had limitations that made it impossible to
reliably recognise the items. [9] Furthermore, CNN
outperformed the traditional technique in object detection.
However, due to challenging situations such as object
occlusion, increased variation in object scale, and weak
lighting, the CNN detector was unable to achieve acceptable
accuracy. [5]
[8] Deep Learning pre-trained models are built models
that assist users in learning about algorithms or
Kowshik & Student,Dept of AI&ML,Chaitanya Bharathi Institute of Technology, Hyderabad, Telanagana
Shoeb & Student,Dept of AI&ML,Chaitanya Bharathi Institute of Technology, Hyderabad, Telanagana
---------------------------------------------------------------------***---------------------------------------------------------------------
Dr. Y. Rama Devi& Professor,Dept of AI&ML,Chaitanya Bharathi Institute of Technology, Hyderabad, Telanagana
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 12 | Dec 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 175
experimenting with existingframeworksforbetteroutcomes
without explicitly developing. In addition, deep learning
neural networks have five layers, which include input and
output layers with Convolution, Max-Pooling, and Fully
connected layers. Because of limited time, memory, and
resources such as CPUs and Processors, many people prefer
Deep Learning pre-trained concepts. And,whencomparedto
machine learning, which requires us to construct explicitly,
these pre-trained models will provide the best and most
accurate outcomes. There is a significant amount of human
interaction required to detectfirearmsinsurveillancevideos,
which is prone to human error. It is required to design an
automaticsurveillance system thatdetectsfirearmswithless
computing time in order to limit crime incidence.[10]
2. Literature Survey
Samundeswari S[1] рrороsed Real-time fingerprint and
criminal facial detection. Since the creation of CNN, real-time
object identificationhassignificantlyadvanced,leadingtothe
development of other object detection techniques, including
YOLO, SSD, and others. CNN performs a rather good job of
detecting guns and criminalactivity. The fastest performeris
NN, taking 44 milliseconds to complete one image. During
training, the accuracy of the model was 90.7 percent, and the
loss was 23.88 percent. Validation accuracy for the model is
76.05 percent, and validation loss is 66.80 percent. Adam is
the optimizer that's been used to make the model better. The
model's epoch value is thirty.
P. Sivakumar[2] proposed the following system which
make use of detecting crime scene objects like weapons.
Based on that it will classify frames as suspicious or not.
F. Majeed[3] predicted crimes using a combination of
deep learning and machinelearning.Regressionanalysiswas
employed to model the correlation among weather,
demographic, and theftcrimedata.Toestimatethelikelihood
of stealing offences in urban populations, the regression
model uses two deep learning models: a Spatio-Temporal
Graph Convolutional Network (ST-GCN) and a Long Short-
Term Memory (LSTM) network.
C. Rajapakshe[4] used LSTM to encode the temporal
features as RNN’s are ideal solution for encoding the
sequential data in videos.
Fig.2. Sigmoid Function
Fig.3. Architecture
Theyusedsigmoidfunctionforbuildingsuspicioushuman
identification model.
Nandhini T J[5] proposed CNN architecture as displayed
in below figure. Trained the model with 146 images and
predicted the type of tool used for crime.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 12 | Dec 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 176
CNN NETWORK ARCHITECTURE
VARUN MANDALAPU[6] applied machine learning and
deep learning algorithms to forecast crime. They modelled
the associationbetweenstolencrimedata,demographicdata,
and weather data using regression. To estimate the risk of
theft offences in urban populations, the regression model
employs two deep learning models: a Long Short-Term
Memory (LSTM) network and a Spatio-Temporal Graph
Convolutional Network (ST-GCN).
WAJIHA SAFAT[7] presented a crime prediction and
analysis system that predicts crime in a given location using
machine learning techniques. To convert the data into a
format appropriate for analysis and detection, the authors
adopted a pre-processing procedure. They concentrated on
predicting the type of crime that may occur based on the
location.
Sharmila Chackravarthy[8] introduced Intelligent Crime
Anomaly Detection, which employs CNN, RNN, and Hybrid
deep learning algorithms to extract high-performance
characteristicsineachframe.Afacialrecognitionsystemwith
a high accuracy rating is built in phases. Using the object
tracking method, abnormal behaviours are discovered using
the DCNN and RNN networks. Using the HDL method, DCNN
retrieves the higher performance attributes fromtheframes.
Uma. N[9] proposed Deep Convolutional Generative
Adversarial Networks for Crime Scene Object Detection. The
author used two-stage architectureforemployingPerceptual
GANs to detect Crime objects, consisting of Generator,
Discriminator, Feature Pyramid Network (FPN), Attention
Mechanisms.
Umadevi V Navalgund[10] proposed Crime Intention
Detection
Fig.5. Architecture for Crime Classification
3. Methodology
The primary aim is to select best algorithm for the model
building. On studying about features and implications of
various we chosen 3-4 models. And the Evaluation Metrics
defined in different papers are also carefully studied and
examined and consider it for the evaluation for our model.
3.1 Data Collection
For this task we have chosen Kaggle UCF crime dataset of
violent and non-violentsituationdatasetandUCFcrimes.The
first dataset consists of 1000 non-violence dataset and 1000
violence datasets. The second dataset consists of 14 types of
crime each folder consists of 50 videos for each crime.
3.2 Preprocessing
 Clean and preprocess the data to remove noise and
inconsistencies. This step might involve data
augmentation, normalization, andothertechniquesto
make the data suitable for deep learning models.
 Data Augmentation can also be implemented
 The input will be multiplied by a factor known as
"rescale" before any further processing is performed.
The RGB values of our original images range from 0 to
255, but at a typical learning rate, these values would
be too high forour models to comprehend. To achieve
values between 0 and 1, we scale our original
photographs by a factor of 1/255.
 Shearing transformations can be applied at random
with shear range
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 12 | Dec 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 177
3.3 Training Model using Deep Learning
Techniques
1) Customized CNN:
CNN (Convolution Neural Network) is a well-known
algorithm for crime detection. It takes a picture as input and
distinguishes distinct components and objects in the image
by assigning different weights and biases to them. There are
32 filters in use. The spatial dimensions of the outputvolume
are then minimised via max pooling. Then 64 filters are
applied. Max pooling is utilised once again to reduce the
spatial dimensions. Finally, there are 128 filters. The
customised NN model with optimisedparametersperformed
well in training and adequately in the test dataset.
2) R-CNN:
The Faster R-CNN approach is employed in a real-time
crimescene evidenceprocessingsystemthatcandetectitems
in an interior setting. The proposed system employs the
Region Proposal Network and the VGG-16networkforobject
detection. Seven Convolution layers with Max-pooling, one
Flatten, and the SoftMax activation function comprise the
following architecture. The first convolution layer has 32
filters, while the next six hidden layers include 100 filters,
each measuring 3 x 3. Max-pooling is also performed at each
layer on a 2 x 2 scale. The convolutional layers are then
flattened and normalised using the SoftMax step. The
activation function "ReLu" is used by all layers, and the
output range ranges from 0 to infinity. The shear and stride
values are both 1.
3) VGGNET19 based on Fast RCNN & RCNN:
R-CNN(Region-basedConvolutionalNeuralNetwork)and
Fast R-CNN are two pivotal advancements in the field of
computer vision, specifically designed for object detection
tasks. They both address the challenge of identifying and
localizing objects within images, but they differ in terms of
their architectureand efficiency.R-CNNalgorithmisadopted
to detect multiple objects relevant to crime in real time
videos and images. The Fast R-CNN architecture can be
utilized to extract features from the proposed regions. These
features can represent various aspects of the scene, such as
objects, people, or vehicles. Crime detection often involves
recognizing patterns and anomalies over time. R-CNN and
Fast R-CNN can be applied to analyse video frames
sequentially, allowing for the detection of events like break-
ins, thefts, or altercations
4) ResNet50+LSTM (for Classification)
Residual Network, often known as ResNet, is a 152-layer
deep neural network. It goes 8* deeper than VGG nets of
lower complexity. It has been demonstrated to be more
accurate than VGG and GoogLeNet. The picture input size is
set to 224 x 224*3. RNNs are extended by LSTMs. It employs
a hybrid of two forms of memory: long-term memory and
short-term memory. This model is most effective at
predicting crime in real time. In terms of feature extraction
time, each video took roughly 8 seconds on average. To
optimise the process, Transfer Learning methods were
applied. Models were trained on the retrieved featuresfor30
epochs with a batchsize of 16. Each epoch tookan average of
66 seconds. Before eachepoch,trainingdatawasrandomised
in batch-size chunks. Models were trained and evaluated
using the same dataset and training circumstances.
5) YOLOv5:
YOLOv5 (You Only Look Once) is now regarded the
benchmark for object detection and face recognition. It has
four versions: YOLOv5s, YOLOv5m, YOLOv5l, and YOLOv5xl.
It is divided into three phases. The first step is the backbone
network, which is a convolutional neural network that
focuses on learning high-level features from input pictures.
The neck is the second level of the network, and it is focused
with learning characteristics at multiple scales in order to
learn the samepicturewith variedsizes.Incomparisontothe
backbone network, it has more layers. Finally, there is the
head network, which is primarily responsible for identifying
bounding boxes around objects and delivering final
annotated pictures.
6) Simple YOLO
The You Only Look Once algorithm's primary goal is item
recognition and categorization. The YOLO algorithmhasfour
variations, each of which improves the model'sperformance.
In comparison toRCNN,theYOLOalgorithmemploysawhole
picture feature rather than a portion of the collected image.
The YOLO method conducts bounding box and class
prediction concurrently, which distinguishes it from other
standard systems. Instead of a standard region proposal and
classification, YOLO addresses the object detection problem
as a regression problem. This allows YOLO to run more
effectively in real-time while sacrificing some accuracy.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 12 | Dec 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 178
7) MobileNet
MobileNet is a cutting-edge deep learning architecture
designed for efficient and real-time object detection tasks,
making it an ideal candidate for enhancing crime detection
capabilities. Leveraging the power of MobileNet, law
enforcement agencies and security systems can efficiently
process live video streams and images from surveillance
cameras, smartphones, and drones to identify and classify
criminal activities in real-time. Its lightweight and
computationally efficient design allow for rapid analysis of
diverse visual data, enabling swift response to incidents like
theft, vandalism, or unauthorized intrusions. MobileNet's
versatility makes itavaluabletoolforenhancingpublicsafety
by providing accurate and timely alerts to law enforcement
personnel, helping to mitigate potential threats and ensure
the security of communities.
8)Xception
Xception, a state-of-the-art deep learning architecture,
offers advanced capabilities for real-time crime detection
applications. Its intricate design, characterized by a depth-
wise separable convolutional network, enables highly
accurate and efficient object recognition in surveillance
videos and images. Xception's exceptional accuracy and
speed make ita formidable toolforlawenforcementagencies
and security systems. By harnessing Xception's capabilities,
authorities can swiftly analyse live video feeds, identify
criminal activities, andrespondpromptlytoincidentssuchas
break-ins, suspicious behaviour, or vehicle theft. Its abilityto
process visual data with precision and efficiency empowers
public safety efforts by delivering timely notifications to law
enforcement, thereby enhancing overall security and crime
prevention in communities.
9)InseptionV3+LSTM
InceptionV3 is astate-of-the-art CNNarchitectureknown
for its exceptional performance in image recognitiontasks.It
efficiently extracts hierarchical features from images,
enabling accurate object detection and classification.
InceptionV3 can process video frames to identify potential
objects, individuals, or activities associated with criminal
behaviour. LSTM can analyse sequential data from video
frames to detect patterns of suspicious activities, such as
loitering, trespassing, or violent actions. LSTM can analyze
historical crime data alongside real-time video feeds to
predict potential crime hotspots or times, aiding in resource
allocation and proactive policing.
10) VGG16+LSTM
VGG16 is a well-known deep CNN architecturerenowned
for its simplicity and strong performance in image
classification tasks. It is characterized by its deep and
uniform architecture with 16 weight layers. LSTM can
identify anomalies in video sequences, such as sudden
changes in behaviour or the presence of unexpected objects
or individuals. VGG16 can locateand track objectsorpersons
of interest within a video feed, providing real-time
information on their movements.
3.4 Evaluation Metrics
The models are evaluated using Precision, AccuracyLoss,etc
4.Results
MODEL METRICS
Customized CNN Accuracy of 90.7%, training
loss of 0.4292
R-CNN Precision- 0.82 , F-score- 0.86
VGGNET19 built on
Fast RCNN and RCNN.
Accuracy- 85%
ResNet50+LSTM Accuracy- 85%, loss- 0.0031
YOLOV5 Accuracy- 87%
Simple YOLO Accuracy- 78.39%
MobileNet Accuracy- 82%
Xception Accuracy- 80%
InseptionV3+LSTM Accuracy- 74.71%, Loss-
0.4820
VGG16+LSTM Accuracy- 67.82%, Loss-
0.5023
5. CONCLUSION
This research study proposes a system to detect illegal
activities in real time and warn police personnel in order to
increase social security and cut crime rates. With a good
training accuracy and less loss on training we are proposing
а reаl-time сriminаl deteсtiоn system emрlоying the СNN
аlgоrithms and variants of CNN саn suссessfully identify
сriminаls even in сrоwded аreаs. With use of Web
Terminology, we can develop a web application to identify
suspicious activity and report to higher authorities.
REFERENCES
[1] S Samundeswari , Harini M, Dharshini, ”Real-timeCrime
Detection Using Customized CNN”, 2022 1st
International Conference on Computational Scienceand
Technology
[2] P. Sivakumar, and K. S, "Real Time Crime Detection
Using Deep Learning Algorithm," 2021 International
Conference on System, Computation, Automation and
Networking (ICSCAN), 2021.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 12 | Dec 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 179
[3] F. Majeed, F. Z. Khan, M. J. Iqbal and M. Nazir, "Real-Time
Surveillance System based Facial Recognition using
YOLOv5," 2021 Mohammad Ali Jinnah University
International Conference on Computing (MAJICC).
[4] C. Rajapakshe, S. Balasooriya, H. Dayarathna, N.
Ranaweera, N.Walgampaya and N. Pemadasa, "Using
CNNs RNNs and Machine Learning Algorithms for Real-
time Crime Prediction," 2019 International Conference
on Advancements in Computing (ICAC)
[5] Nandhini T J and K Thinakaran “Detection of Crime
Scene Objects using Deep Learning Techniques”,2023
International Conference on Intelligent Data
[6] Varun Mnadalpu , Lavanya Elluri , Piyush , AND
Nirmalya Royl,” Crime Prediction Using Machine
Learning and Deep Learning: A Systematic Review and
Future Directions”,2023
[7] WAJIHA SAFAT, SOHAIL ASGHAR,ANDSAIRAANDLEEB
GILLANI, "Empirical Analysis for Crime Prediction and
Forecasting Using Machine Learning and DeepLearning
Techniques", 2021.
[8] Sharmila Chackravarthy, Steven Schmitt, Li Yang,”
Intelligent Crime Anomaly Detection in Smart Cities
using Deep Learning” 2018 IEEE 4th International
Conference on Collaboration and Internet Computing.
[9] Uma. N,” Deep Convolutional Generative Adversarial
Networks for Crime Scene Object Detection”,2023
Second International Conference on Augmented
Intelligence and Sustainable Systems.
[10] Umadevi V Navalgund, Priyadharshini.K,” Crime
Intention Detection System Using Deep Learning”,2018
International Conference on Circuits and Systems in
Digital Enterprise Technology (ICCSDET)

More Related Content

Similar to Real Time Crime Detection using Deep Learning

Novel framework for optimized digital forensic for mitigating complex image ...
Novel framework for optimized digital forensic  for mitigating complex image ...Novel framework for optimized digital forensic  for mitigating complex image ...
Novel framework for optimized digital forensic for mitigating complex image ...IJECEIAES
 
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEMDEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEMIJMIT JOURNAL
 
People Monitoring and Mask Detection using Real-time video analyzing
People Monitoring and Mask Detection using Real-time video analyzingPeople Monitoring and Mask Detection using Real-time video analyzing
People Monitoring and Mask Detection using Real-time video analyzingvivatechijri
 
IRJET- Comparative Study of Different Techniques for Text as Well as Object D...
IRJET- Comparative Study of Different Techniques for Text as Well as Object D...IRJET- Comparative Study of Different Techniques for Text as Well as Object D...
IRJET- Comparative Study of Different Techniques for Text as Well as Object D...IRJET Journal
 
APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...
APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...
APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...ijitcs
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningIRJET Journal
 
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIERATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIERCSEIJJournal
 
Attack Detection Availing Feature Discretion using Random Forest Classifier
Attack Detection Availing Feature Discretion using Random Forest ClassifierAttack Detection Availing Feature Discretion using Random Forest Classifier
Attack Detection Availing Feature Discretion using Random Forest ClassifierCSEIJJournal
 
Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...IJECEIAES
 
Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...
Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...
Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...IRJET Journal
 
Enhancements in the world of digital forensics
Enhancements in the world of digital forensicsEnhancements in the world of digital forensics
Enhancements in the world of digital forensicsIAESIJAI
 
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCECRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCEvivatechijri
 
4. paper 10 nov 10, 2017 edit sat
4. paper 10 nov 10, 2017 edit sat4. paper 10 nov 10, 2017 edit sat
4. paper 10 nov 10, 2017 edit satIAESIJEECS
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEOIRJET Journal
 
Real-time Anomaly Detection and Alert System for Video Surveillance
Real-time Anomaly Detection and Alert System for Video SurveillanceReal-time Anomaly Detection and Alert System for Video Surveillance
Real-time Anomaly Detection and Alert System for Video SurveillanceIRJET Journal
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMIRJET Journal
 
Review of Pose Recognition Systems
Review of Pose Recognition SystemsReview of Pose Recognition Systems
Review of Pose Recognition Systemsvivatechijri
 
Human Activity Recognition Using Neural Network
Human Activity Recognition Using Neural NetworkHuman Activity Recognition Using Neural Network
Human Activity Recognition Using Neural NetworkIRJET Journal
 
Intrusion Detection System Using Machine Learning: An Overview
Intrusion Detection System Using Machine Learning: An OverviewIntrusion Detection System Using Machine Learning: An Overview
Intrusion Detection System Using Machine Learning: An OverviewIRJET Journal
 
Social distance and face mask detector system exploiting transfer learning
Social distance and face mask detector system exploiting  transfer learningSocial distance and face mask detector system exploiting  transfer learning
Social distance and face mask detector system exploiting transfer learningIJECEIAES
 

Similar to Real Time Crime Detection using Deep Learning (20)

Novel framework for optimized digital forensic for mitigating complex image ...
Novel framework for optimized digital forensic  for mitigating complex image ...Novel framework for optimized digital forensic  for mitigating complex image ...
Novel framework for optimized digital forensic for mitigating complex image ...
 
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEMDEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
 
People Monitoring and Mask Detection using Real-time video analyzing
People Monitoring and Mask Detection using Real-time video analyzingPeople Monitoring and Mask Detection using Real-time video analyzing
People Monitoring and Mask Detection using Real-time video analyzing
 
IRJET- Comparative Study of Different Techniques for Text as Well as Object D...
IRJET- Comparative Study of Different Techniques for Text as Well as Object D...IRJET- Comparative Study of Different Techniques for Text as Well as Object D...
IRJET- Comparative Study of Different Techniques for Text as Well as Object D...
 
APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...
APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...
APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine Learning
 
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIERATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
 
Attack Detection Availing Feature Discretion using Random Forest Classifier
Attack Detection Availing Feature Discretion using Random Forest ClassifierAttack Detection Availing Feature Discretion using Random Forest Classifier
Attack Detection Availing Feature Discretion using Random Forest Classifier
 
Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...
 
Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...
Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...
Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...
 
Enhancements in the world of digital forensics
Enhancements in the world of digital forensicsEnhancements in the world of digital forensics
Enhancements in the world of digital forensics
 
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCECRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
 
4. paper 10 nov 10, 2017 edit sat
4. paper 10 nov 10, 2017 edit sat4. paper 10 nov 10, 2017 edit sat
4. paper 10 nov 10, 2017 edit sat
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
 
Real-time Anomaly Detection and Alert System for Video Surveillance
Real-time Anomaly Detection and Alert System for Video SurveillanceReal-time Anomaly Detection and Alert System for Video Surveillance
Real-time Anomaly Detection and Alert System for Video Surveillance
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
 
Review of Pose Recognition Systems
Review of Pose Recognition SystemsReview of Pose Recognition Systems
Review of Pose Recognition Systems
 
Human Activity Recognition Using Neural Network
Human Activity Recognition Using Neural NetworkHuman Activity Recognition Using Neural Network
Human Activity Recognition Using Neural Network
 
Intrusion Detection System Using Machine Learning: An Overview
Intrusion Detection System Using Machine Learning: An OverviewIntrusion Detection System Using Machine Learning: An Overview
Intrusion Detection System Using Machine Learning: An Overview
 
Social distance and face mask detector system exploiting transfer learning
Social distance and face mask detector system exploiting  transfer learningSocial distance and face mask detector system exploiting  transfer learning
Social distance and face mask detector system exploiting transfer learning
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfJNTUA
 
Geometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfGeometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfJNTUA
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfSkNahidulIslamShrabo
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptjigup7320
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxMustafa Ahmed
 
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...mikehavy0
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelDrAjayKumarYadav4
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisDr.Costas Sachpazis
 
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样A
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
 
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxSLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxCHAIRMAN M
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Studentskannan348865
 
DBMS-Report on Student management system.pptx
DBMS-Report on Student management system.pptxDBMS-Report on Student management system.pptx
DBMS-Report on Student management system.pptxrajjais1221
 
Presentation on Slab, Beam, Column, and Foundation/Footing
Presentation on Slab,  Beam, Column, and Foundation/FootingPresentation on Slab,  Beam, Column, and Foundation/Footing
Presentation on Slab, Beam, Column, and Foundation/FootingEr. Suman Jyoti
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfKira Dess
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptamrabdallah9
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxMustafa Ahmed
 
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...Christo Ananth
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024EMMANUELLEFRANCEHELI
 

Recently uploaded (20)

Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
Geometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfGeometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdf
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdf
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) ppt
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptx
 
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
 
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxSLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Students
 
DBMS-Report on Student management system.pptx
DBMS-Report on Student management system.pptxDBMS-Report on Student management system.pptx
DBMS-Report on Student management system.pptx
 
Presentation on Slab, Beam, Column, and Foundation/Footing
Presentation on Slab,  Beam, Column, and Foundation/FootingPresentation on Slab,  Beam, Column, and Foundation/Footing
Presentation on Slab, Beam, Column, and Foundation/Footing
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdf
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.ppt
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
 

Real Time Crime Detection using Deep Learning

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 12 | Dec 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 174 Real Time Crime Detection using Deep Learning Kowshik, Shoeb, Dr.Y.Rama Devi Abstract - Crime detection and prevention have always been critical concerns for society. With the rapid advancements in technology, particularly in the field of deep learning and artificial intelligence, new opportunities have emerged to enhance real-time crime detection capabilities. Deep learning techniques have demonstrated remarkable potential in analysing various types of data sources, such as surveillance footage, sensor data, and social media feeds, to identify criminal activities, predict incidents, and aid law enforcement agencies in proactive responses. This survey paper seeks to provide a thorough overview of the application of deep learning in real-time crime detection. This paper digs into the various deep learning architectures and methodologies employed for this purpose, explore the challenges and limitations associated with these techniques, and discuss ethical and legal considerations. Key Words: crime detection, crime datasets, deep learning, CNN, LSTM. 1. INTRODUCTION The number of recorded criminal incidents is increasing, including robbery, vandalism, assault, murder, and kidnapping. However, the conventional methods of criminal investigation and prevention are often labor-intensive and inefficient. To address this challenge, a novel deep learning- based system named "Spot Crime" has been proposed. Spot Crime is a web application designed to enhance public safety and support law enforcement efforts by automating the monitoring of liveCCTVfootageandalertingpoliceofficialsto suspicious activities. This innovativesystememployscustom convolutional neural networks(CNNs)andadvancedmodels for behaviour classification, allowing it to analyze human activity in real-time video frames. The selection of the best- performing model is based on validation accuracy, and its purpose is to aid in the early detection of criminal incidents. In light of the increasing crime rates in India, especially during lockdowns, the need for such a system has become paramount. Spot Crime offers a solution to the challenges posed by manual surveillance, providing a more effective means of crime prevention and promoting public safety by promptly notifying authorities of potential criminal activity and its location [1]. YOLO,standsoutasaneffectiveobjectdetectionalgorithm using a single convolutional neural network to predict bounding boxes and probabilities. It relies on a sizable training dataset for optimal performance. Google Collaboratory with an integrated Tesla K80 GPU is preferred forefficient GPUutilization.ThetrainedYOLOmodelexcelsin detecting numerous objects even in complex scenes, striving to improve Mean Average Precision and minimize average loss for accurate object recognition. [2] The YOLOv5 architecturehas emerged asa promising choice forreal-time facial recognition. In this research paper, a comparative analysis was conducted, pitting YOLOv5 against its predecessors (v3 and v4) for real-time facial recognition systems. The experiments revealed an 87% accuracy ratefor YOLOv5 on the FDDB dataset and an impressive 94% accuracy on a custom real-time face recognition dataset, significantly outperforming its predecessors. This underscores the potential of deep learning in the realm of facial recognition,suggestingthatwiththerightdirectionand approach, deep learning and AI have much more to offer in the future. [3]. Public information resources areimportantin crime prediction. As a result, they gathered historical data using information resources such as news websites. They gathered information about occurrences that occurred around the country at a specific time and used classification to forecast future crimes. In the process, classification methods such as Support Vector Machine (SVM), Decision Tree, Random Forest, and logistic regression are used. Furthermore, the system uses all of the collected data to predict crime activity and visually displays regions with a higher risk of crimeoccurrenceonamap.Theseforecastscan be used to improve emergency response by allocating resources depending on demand, as well as to prevent crime [4]. The present algorithms successfully detect items in certain annotated photographs, but they require locations, classes, andbackgrounddistributions.Whentheobjectswere manually annotated, however, the assignment process became onerous and time-consuming. The former sliding window object identification approach's handcrafted characteristics had limitations that made it impossible to reliably recognise the items. [9] Furthermore, CNN outperformed the traditional technique in object detection. However, due to challenging situations such as object occlusion, increased variation in object scale, and weak lighting, the CNN detector was unable to achieve acceptable accuracy. [5] [8] Deep Learning pre-trained models are built models that assist users in learning about algorithms or Kowshik & Student,Dept of AI&ML,Chaitanya Bharathi Institute of Technology, Hyderabad, Telanagana Shoeb & Student,Dept of AI&ML,Chaitanya Bharathi Institute of Technology, Hyderabad, Telanagana ---------------------------------------------------------------------***--------------------------------------------------------------------- Dr. Y. Rama Devi& Professor,Dept of AI&ML,Chaitanya Bharathi Institute of Technology, Hyderabad, Telanagana
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 12 | Dec 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 175 experimenting with existingframeworksforbetteroutcomes without explicitly developing. In addition, deep learning neural networks have five layers, which include input and output layers with Convolution, Max-Pooling, and Fully connected layers. Because of limited time, memory, and resources such as CPUs and Processors, many people prefer Deep Learning pre-trained concepts. And,whencomparedto machine learning, which requires us to construct explicitly, these pre-trained models will provide the best and most accurate outcomes. There is a significant amount of human interaction required to detectfirearmsinsurveillancevideos, which is prone to human error. It is required to design an automaticsurveillance system thatdetectsfirearmswithless computing time in order to limit crime incidence.[10] 2. Literature Survey Samundeswari S[1] рrороsed Real-time fingerprint and criminal facial detection. Since the creation of CNN, real-time object identificationhassignificantlyadvanced,leadingtothe development of other object detection techniques, including YOLO, SSD, and others. CNN performs a rather good job of detecting guns and criminalactivity. The fastest performeris NN, taking 44 milliseconds to complete one image. During training, the accuracy of the model was 90.7 percent, and the loss was 23.88 percent. Validation accuracy for the model is 76.05 percent, and validation loss is 66.80 percent. Adam is the optimizer that's been used to make the model better. The model's epoch value is thirty. P. Sivakumar[2] proposed the following system which make use of detecting crime scene objects like weapons. Based on that it will classify frames as suspicious or not. F. Majeed[3] predicted crimes using a combination of deep learning and machinelearning.Regressionanalysiswas employed to model the correlation among weather, demographic, and theftcrimedata.Toestimatethelikelihood of stealing offences in urban populations, the regression model uses two deep learning models: a Spatio-Temporal Graph Convolutional Network (ST-GCN) and a Long Short- Term Memory (LSTM) network. C. Rajapakshe[4] used LSTM to encode the temporal features as RNN’s are ideal solution for encoding the sequential data in videos. Fig.2. Sigmoid Function Fig.3. Architecture Theyusedsigmoidfunctionforbuildingsuspicioushuman identification model. Nandhini T J[5] proposed CNN architecture as displayed in below figure. Trained the model with 146 images and predicted the type of tool used for crime.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 12 | Dec 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 176 CNN NETWORK ARCHITECTURE VARUN MANDALAPU[6] applied machine learning and deep learning algorithms to forecast crime. They modelled the associationbetweenstolencrimedata,demographicdata, and weather data using regression. To estimate the risk of theft offences in urban populations, the regression model employs two deep learning models: a Long Short-Term Memory (LSTM) network and a Spatio-Temporal Graph Convolutional Network (ST-GCN). WAJIHA SAFAT[7] presented a crime prediction and analysis system that predicts crime in a given location using machine learning techniques. To convert the data into a format appropriate for analysis and detection, the authors adopted a pre-processing procedure. They concentrated on predicting the type of crime that may occur based on the location. Sharmila Chackravarthy[8] introduced Intelligent Crime Anomaly Detection, which employs CNN, RNN, and Hybrid deep learning algorithms to extract high-performance characteristicsineachframe.Afacialrecognitionsystemwith a high accuracy rating is built in phases. Using the object tracking method, abnormal behaviours are discovered using the DCNN and RNN networks. Using the HDL method, DCNN retrieves the higher performance attributes fromtheframes. Uma. N[9] proposed Deep Convolutional Generative Adversarial Networks for Crime Scene Object Detection. The author used two-stage architectureforemployingPerceptual GANs to detect Crime objects, consisting of Generator, Discriminator, Feature Pyramid Network (FPN), Attention Mechanisms. Umadevi V Navalgund[10] proposed Crime Intention Detection Fig.5. Architecture for Crime Classification 3. Methodology The primary aim is to select best algorithm for the model building. On studying about features and implications of various we chosen 3-4 models. And the Evaluation Metrics defined in different papers are also carefully studied and examined and consider it for the evaluation for our model. 3.1 Data Collection For this task we have chosen Kaggle UCF crime dataset of violent and non-violentsituationdatasetandUCFcrimes.The first dataset consists of 1000 non-violence dataset and 1000 violence datasets. The second dataset consists of 14 types of crime each folder consists of 50 videos for each crime. 3.2 Preprocessing  Clean and preprocess the data to remove noise and inconsistencies. This step might involve data augmentation, normalization, andothertechniquesto make the data suitable for deep learning models.  Data Augmentation can also be implemented  The input will be multiplied by a factor known as "rescale" before any further processing is performed. The RGB values of our original images range from 0 to 255, but at a typical learning rate, these values would be too high forour models to comprehend. To achieve values between 0 and 1, we scale our original photographs by a factor of 1/255.  Shearing transformations can be applied at random with shear range
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 12 | Dec 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 177 3.3 Training Model using Deep Learning Techniques 1) Customized CNN: CNN (Convolution Neural Network) is a well-known algorithm for crime detection. It takes a picture as input and distinguishes distinct components and objects in the image by assigning different weights and biases to them. There are 32 filters in use. The spatial dimensions of the outputvolume are then minimised via max pooling. Then 64 filters are applied. Max pooling is utilised once again to reduce the spatial dimensions. Finally, there are 128 filters. The customised NN model with optimisedparametersperformed well in training and adequately in the test dataset. 2) R-CNN: The Faster R-CNN approach is employed in a real-time crimescene evidenceprocessingsystemthatcandetectitems in an interior setting. The proposed system employs the Region Proposal Network and the VGG-16networkforobject detection. Seven Convolution layers with Max-pooling, one Flatten, and the SoftMax activation function comprise the following architecture. The first convolution layer has 32 filters, while the next six hidden layers include 100 filters, each measuring 3 x 3. Max-pooling is also performed at each layer on a 2 x 2 scale. The convolutional layers are then flattened and normalised using the SoftMax step. The activation function "ReLu" is used by all layers, and the output range ranges from 0 to infinity. The shear and stride values are both 1. 3) VGGNET19 based on Fast RCNN & RCNN: R-CNN(Region-basedConvolutionalNeuralNetwork)and Fast R-CNN are two pivotal advancements in the field of computer vision, specifically designed for object detection tasks. They both address the challenge of identifying and localizing objects within images, but they differ in terms of their architectureand efficiency.R-CNNalgorithmisadopted to detect multiple objects relevant to crime in real time videos and images. The Fast R-CNN architecture can be utilized to extract features from the proposed regions. These features can represent various aspects of the scene, such as objects, people, or vehicles. Crime detection often involves recognizing patterns and anomalies over time. R-CNN and Fast R-CNN can be applied to analyse video frames sequentially, allowing for the detection of events like break- ins, thefts, or altercations 4) ResNet50+LSTM (for Classification) Residual Network, often known as ResNet, is a 152-layer deep neural network. It goes 8* deeper than VGG nets of lower complexity. It has been demonstrated to be more accurate than VGG and GoogLeNet. The picture input size is set to 224 x 224*3. RNNs are extended by LSTMs. It employs a hybrid of two forms of memory: long-term memory and short-term memory. This model is most effective at predicting crime in real time. In terms of feature extraction time, each video took roughly 8 seconds on average. To optimise the process, Transfer Learning methods were applied. Models were trained on the retrieved featuresfor30 epochs with a batchsize of 16. Each epoch tookan average of 66 seconds. Before eachepoch,trainingdatawasrandomised in batch-size chunks. Models were trained and evaluated using the same dataset and training circumstances. 5) YOLOv5: YOLOv5 (You Only Look Once) is now regarded the benchmark for object detection and face recognition. It has four versions: YOLOv5s, YOLOv5m, YOLOv5l, and YOLOv5xl. It is divided into three phases. The first step is the backbone network, which is a convolutional neural network that focuses on learning high-level features from input pictures. The neck is the second level of the network, and it is focused with learning characteristics at multiple scales in order to learn the samepicturewith variedsizes.Incomparisontothe backbone network, it has more layers. Finally, there is the head network, which is primarily responsible for identifying bounding boxes around objects and delivering final annotated pictures. 6) Simple YOLO The You Only Look Once algorithm's primary goal is item recognition and categorization. The YOLO algorithmhasfour variations, each of which improves the model'sperformance. In comparison toRCNN,theYOLOalgorithmemploysawhole picture feature rather than a portion of the collected image. The YOLO method conducts bounding box and class prediction concurrently, which distinguishes it from other standard systems. Instead of a standard region proposal and classification, YOLO addresses the object detection problem as a regression problem. This allows YOLO to run more effectively in real-time while sacrificing some accuracy.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 12 | Dec 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 178 7) MobileNet MobileNet is a cutting-edge deep learning architecture designed for efficient and real-time object detection tasks, making it an ideal candidate for enhancing crime detection capabilities. Leveraging the power of MobileNet, law enforcement agencies and security systems can efficiently process live video streams and images from surveillance cameras, smartphones, and drones to identify and classify criminal activities in real-time. Its lightweight and computationally efficient design allow for rapid analysis of diverse visual data, enabling swift response to incidents like theft, vandalism, or unauthorized intrusions. MobileNet's versatility makes itavaluabletoolforenhancingpublicsafety by providing accurate and timely alerts to law enforcement personnel, helping to mitigate potential threats and ensure the security of communities. 8)Xception Xception, a state-of-the-art deep learning architecture, offers advanced capabilities for real-time crime detection applications. Its intricate design, characterized by a depth- wise separable convolutional network, enables highly accurate and efficient object recognition in surveillance videos and images. Xception's exceptional accuracy and speed make ita formidable toolforlawenforcementagencies and security systems. By harnessing Xception's capabilities, authorities can swiftly analyse live video feeds, identify criminal activities, andrespondpromptlytoincidentssuchas break-ins, suspicious behaviour, or vehicle theft. Its abilityto process visual data with precision and efficiency empowers public safety efforts by delivering timely notifications to law enforcement, thereby enhancing overall security and crime prevention in communities. 9)InseptionV3+LSTM InceptionV3 is astate-of-the-art CNNarchitectureknown for its exceptional performance in image recognitiontasks.It efficiently extracts hierarchical features from images, enabling accurate object detection and classification. InceptionV3 can process video frames to identify potential objects, individuals, or activities associated with criminal behaviour. LSTM can analyse sequential data from video frames to detect patterns of suspicious activities, such as loitering, trespassing, or violent actions. LSTM can analyze historical crime data alongside real-time video feeds to predict potential crime hotspots or times, aiding in resource allocation and proactive policing. 10) VGG16+LSTM VGG16 is a well-known deep CNN architecturerenowned for its simplicity and strong performance in image classification tasks. It is characterized by its deep and uniform architecture with 16 weight layers. LSTM can identify anomalies in video sequences, such as sudden changes in behaviour or the presence of unexpected objects or individuals. VGG16 can locateand track objectsorpersons of interest within a video feed, providing real-time information on their movements. 3.4 Evaluation Metrics The models are evaluated using Precision, AccuracyLoss,etc 4.Results MODEL METRICS Customized CNN Accuracy of 90.7%, training loss of 0.4292 R-CNN Precision- 0.82 , F-score- 0.86 VGGNET19 built on Fast RCNN and RCNN. Accuracy- 85% ResNet50+LSTM Accuracy- 85%, loss- 0.0031 YOLOV5 Accuracy- 87% Simple YOLO Accuracy- 78.39% MobileNet Accuracy- 82% Xception Accuracy- 80% InseptionV3+LSTM Accuracy- 74.71%, Loss- 0.4820 VGG16+LSTM Accuracy- 67.82%, Loss- 0.5023 5. CONCLUSION This research study proposes a system to detect illegal activities in real time and warn police personnel in order to increase social security and cut crime rates. With a good training accuracy and less loss on training we are proposing а reаl-time сriminаl deteсtiоn system emрlоying the СNN аlgоrithms and variants of CNN саn suссessfully identify сriminаls even in сrоwded аreаs. With use of Web Terminology, we can develop a web application to identify suspicious activity and report to higher authorities. REFERENCES [1] S Samundeswari , Harini M, Dharshini, ”Real-timeCrime Detection Using Customized CNN”, 2022 1st International Conference on Computational Scienceand Technology [2] P. Sivakumar, and K. S, "Real Time Crime Detection Using Deep Learning Algorithm," 2021 International Conference on System, Computation, Automation and Networking (ICSCAN), 2021.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 12 | Dec 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 179 [3] F. Majeed, F. Z. Khan, M. J. Iqbal and M. Nazir, "Real-Time Surveillance System based Facial Recognition using YOLOv5," 2021 Mohammad Ali Jinnah University International Conference on Computing (MAJICC). [4] C. Rajapakshe, S. Balasooriya, H. Dayarathna, N. Ranaweera, N.Walgampaya and N. Pemadasa, "Using CNNs RNNs and Machine Learning Algorithms for Real- time Crime Prediction," 2019 International Conference on Advancements in Computing (ICAC) [5] Nandhini T J and K Thinakaran “Detection of Crime Scene Objects using Deep Learning Techniques”,2023 International Conference on Intelligent Data [6] Varun Mnadalpu , Lavanya Elluri , Piyush , AND Nirmalya Royl,” Crime Prediction Using Machine Learning and Deep Learning: A Systematic Review and Future Directions”,2023 [7] WAJIHA SAFAT, SOHAIL ASGHAR,ANDSAIRAANDLEEB GILLANI, "Empirical Analysis for Crime Prediction and Forecasting Using Machine Learning and DeepLearning Techniques", 2021. [8] Sharmila Chackravarthy, Steven Schmitt, Li Yang,” Intelligent Crime Anomaly Detection in Smart Cities using Deep Learning” 2018 IEEE 4th International Conference on Collaboration and Internet Computing. [9] Uma. N,” Deep Convolutional Generative Adversarial Networks for Crime Scene Object Detection”,2023 Second International Conference on Augmented Intelligence and Sustainable Systems. [10] Umadevi V Navalgund, Priyadharshini.K,” Crime Intention Detection System Using Deep Learning”,2018 International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET)