Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Real Time Person Detection and Classification using YOLO

View through CrossRef
A Convolutional Neural Network (CNN) is a class of deep neural network most commonly used in analyzing visual images. Various systems and applications have been built to detect and classify the objects in a faster way taking CNN as its foundation. In this paper, we introduce a model to identify and classify people wearing ID card.Our model uses an object detection system called YOLO (You Only Look Once) for detecting and classifying objects in real-time videos. In the YOLO algorithm, a single convolutional network predicts the bounding boxes and the class probabilities for these boxes. We aim to use our model for authentication, surveillance and security purposes at organizations, corporations and educational institutions to detect an unauthorized person at the premises or somebody without a valid identification document. Using the object detection and classification, we aim to build a model which would alert the respective authorities on the matter.
Title: Real Time Person Detection and Classification using YOLO
Description:
A Convolutional Neural Network (CNN) is a class of deep neural network most commonly used in analyzing visual images.
Various systems and applications have been built to detect and classify the objects in a faster way taking CNN as its foundation.
In this paper, we introduce a model to identify and classify people wearing ID card.
Our model uses an object detection system called YOLO (You Only Look Once) for detecting and classifying objects in real-time videos.
In the YOLO algorithm, a single convolutional network predicts the bounding boxes and the class probabilities for these boxes.
We aim to use our model for authentication, surveillance and security purposes at organizations, corporations and educational institutions to detect an unauthorized person at the premises or somebody without a valid identification document.
Using the object detection and classification, we aim to build a model which would alert the respective authorities on the matter.

Related Results

Temporal integration of monaural and dichotic frequency modulation
Temporal integration of monaural and dichotic frequency modulation
Frequency modulation (FM) detection at low modulation frequencies is commonly used as an index of temporal fine structure processing to demonstrate age- and hearing-related deficit...
Fusion of Machine learning for Detection of Rumor and False Information in Social Network
Fusion of Machine learning for Detection of Rumor and False Information in Social Network
In recent years, spreading social media platforms and mobile devices led to more social data, advertisements, political opinions, and celebrity news proliferating fake news. Fake n...
Classification of underwater targets from autonomous underwater vehicle sampled bistatic acoustic scattered fields
Classification of underwater targets from autonomous underwater vehicle sampled bistatic acoustic scattered fields
One of the long term goals of autonomous underwater vehicle (AUV) minehunting is to have multiple inexpensive AUVs in a harbor autonomously classify hazards. Existing acoustic meth...
Leukemia Cancer Detection Using Various Deep Learning Algorithms
Leukemia Cancer Detection Using Various Deep Learning Algorithms
Leukemia is a type of blood cancer. Leukemia is cancer that begins in the blood cells. The lymphocytes and other blood cells are created in the bone marrow. When a person has leuke...
Kernel Projection Classifiers with Suppressing Features of Other Classes
Kernel Projection Classifiers with Suppressing Features of Other Classes
We propose a new classification method based on a kernel technique called suppressed kernel sample space projection classifier (SKSP), which is extended from kernel sample space pr...
Anomaly Detection Using Puzzle-Based Data Augmentation to Overcome Data Imbalances and Deficiencies
Anomaly Detection Using Puzzle-Based Data Augmentation to Overcome Data Imbalances and Deficiencies
Machine tools are used in a wide range of applications, and they can manufacture workpieces flexibly. Furthermore, they require maintenance; the overall costs include maintenance c...
Falling stars: Acoustic influences on meteor detection
Falling stars: Acoustic influences on meteor detection
As particles enter the earth’s atmosphere they produce a burst of electromagnetic energy, including visible and radio-wave emissions. Consequently, just as meteors can be detected ...

Back to Top