Optimizing Real-Time Object Detection- A Comparison of YOLO Models
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2024, Vol 12, Issue 3
Abstract
Gun and weapon détection plays a crucial role in security, surveillance, and law enforcement. This study conducts a comprehensive comparison of all available YOLO (You Only Look Once) models for their effectiveness in weapon detection. We train YOLOv1, YOLOv2, YOLOv3, YOLOv4, YOLOv5, YOLOv6, YOLOv7, and YOLOv8 on a custom dataset of 16,000 images containing guns, knives, and heavy weapons. Each model is evaluated on a validation set of 1,400 images, with mAP (mean average precision) as the primary performance metric. This extensive comparative analysis identifies the best performing YOLO variant for gun and weapon detection, providing valuable insights into the strengths and weaknesses of each model for this specific task.
Authors and Affiliations
Pravek Sharma Dr. Rajesh Tyagi and Dr. Priyanka Dubey
Recognition of Indian Sign Languages
The focal point of this project is about developing a user interface to aid people who have hearing and speaking disabilities. This application would help in recognizing the different signs with respect to the single use...
A Comparative Study of Vehicle to Grid Application of Electric Vehicles on a Microgrid
Vehicle to Grid (V2G) technology is becoming a promising application for Electric Vehicles (EVs) in modern grids. This manuscript describes the potential benefits of V2G, its functions, the scheme of V2G and demonstrates...
Experimental Investigation of Three Phase Flow (Liquid-Gas-Solid) In Horizontal Pipe
The study of three phase flow in horizontal and vertical pipe are important phenomena in oil and gas industry due to extracting process involve liquid, solid and gas phase. The effect of the particle amount, the discharg...
A Review on Electronic Commerce
The world economy is undergoing a change. All business is becoming data as a result of internet technologies. The pace of technology development is so fast that emergent ecommerce is now influencing every facet of how bu...
A Stacked Ensemble Framework for Detecting Malicious Insiders
One of the mainstream strategies identified for detecting Malicious Insider Threat (MIT) is building stacking ensemble Machine Learning (ML) models to reveal malevolent insider activities through anomalies in user activi...