Pengenalan Aktivitas Manusia pada Area Tambak Udang dengan Convolutional Neural Network
Recognition to Human Activities in Shrimp Pond Areas with a Convolutional Neural Network
Abstract
Thievery is a problem that can harm theft victims. Thievery usually occurs at night when there is no supervision of goods in a location. To avoid thievery and monitor conditions in a location, CCTV (Closed-Circuit Television) cameras can be used. However, the function of CCTV camera systems is only a passive monitoring systems. In this paper, a human activity recognition is designed using CCTV cameras to produce a security system. Inputs on the recognition process are videos obtained from CCTV cameras installed in the shrimp pond. Human activity recognition that is used in this study is Convolutional Neural Network. Before the human activity recognition was carried out, the program first detected humans with the YOLO (You Only Look Once) algorithm and tracking it with the SORT (Simple Online and Realtime Tracking) algorithm. The results obtained from the human activity recognition is class labels on human objects that are tracked.
Downloads
References
Badan Pusat Statistik, “Statistik Kriminal 2019,” 2019. [Online]. Available:https://www.bps.go.id/publication/2019/12/12/66c0114edb7517a33063871f/statistik-kriminal-2019.html.
W. Huang and S. Li, “Understanding human activity patterns based on space-time-semantics,” ISPRS J. Photogramm. Remote Sens., vol. 121, pp. 1–10, 2016, doi: 10.1016/j.isprsjprs.2016.08.008.
V. Gajjar, A. Gurnani, and Y. Khandhediya, “Human Detection and Tracking for Video Surveillance A Cognitive Science Approach,” arXiv1709.00726v1 [cs], pp. 2805–2809, 2017, doi: 10.1109/ICCVW.2017.330.
L. Maczyta, P. Bouthemy, and O. Le Meur, “CNN-based temporal detection of motion saliency in videos,” Pattern Recognit. Lett., vol. 128, pp. 298–305, Dec. 2019, doi: 10.1016/j.patrec.2019.09.016.
Suyanto, Machine Learning Tingkat Dasar Dan Lanjut”. Informatika Bandung, 2018.
M. Zhang, C. Gao, Q. Li, L. Wang, and J. Zhang, “Action detection based on tracklets with the two-stream CNN,” Multimed. Tools Appl., vol. 77, no. 3, pp. 3303–3316, 2018, doi: 10.1007/s11042-017-5116-9.
A. Farouk Khalifa, E. Badr, and H. N. Elmahdy, “A survey on human detection surveillance systems for Raspberry Pi,” Image Vis. Comput., vol. 85, pp. 1–13, 2019, doi: 10.1016/j.imavis.2019.02.010.
Y. Xiang, Z. He, Q. Liu, J. Chen, and Y. Liang, “Autofocus of whole slide imaging based on convolution and recurrent neural networks,” Ultramicroscopy, vol. 220, no. August 2020, p. 113146, 2021, doi: 10.1016/j.ultramic.2020.113146.
K. B. Meena and V. Tyagi, “Distinguishing computer-generated images from photographic images using two-stream convolutional neural network,” Appl. Soft Comput., vol. 100, p. 107025, 2021, doi: 10.1016/j.asoc.2020.107025.
J. Gu et al., “Recent advances in convolutional neural networks,” Pattern Recognit., vol. 77, pp. 354–377, 2017, doi: 10.1016/j.patcog.2017.10.013.
S. Masood, A. Rai, A. Aggarwal, M. N. Doja, and M. Ahmad, “Detecting distraction of drivers using Convolutional Neural Network,” Pattern Recognit. Lett., vol. 0, pp. 1–7, 2018, doi: 10.1016/j.patrec.2017.12.023.
M. Shahverdy, M. Fathy, R. Berangi, and M. Sabokrou, “Driver behavior detection and classification using deep convolutional neural networks,” Expert Syst. Appl., vol. 149, p. 113240, 2020, doi: 10.1016/j.eswa.2020.113240.
Copyright (c) 2021 Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright in each article belongs to the author
- The author acknowledges that the RESTI Journal (System Engineering and Information Technology) is the first publisher to publish with a license Creative Commons Attribution 4.0 International License.
- Authors can enter writing separately, arrange the non-exclusive distribution of manuscripts that have been published in this journal into other versions (eg sent to the author's institutional repository, publication in a book, etc.), by acknowledging that the manuscript has been published for the first time in the RESTI (Rekayasa Sistem dan Teknologi Informasi) journal ;