Detecting Harmful Activity in Hajj Plagiarism Using Deep Learning
DOI:
https://doi.org/10.56705/ijodas.v4i1.59Keywords:
Artificial Intelegence, Computer Vision, Classification, Real-time, Object RecognationAbstract
CCTV surveillance is the most extensively used intelligent latest innovation. The use of surveillance cameras has risen dramatically because of the convenience of monitoring from anywhere and the reduction of crime rates in public areas. In this paper, we introduce the idea of bad vibe activity detection from live videos to enhance the security and safety of pilgrims. The proposed bad vibes activity recognition model is intended to be addressed in the most efficient manner possible using cutting-edge technologies such as TensorFlow and Keras. TensorFlow was chosen because the project could be deployed to a mobile environment in the future with the possibility of extension of other areas such as airport security, bus stain, and public areas that may deserve special attention for security checks. We choose MediaPipe Holistic for employee bad vibe recognition in the model.
Downloads
References
Holy Quran (3:97)
R. K. Tripathi, A. S. Jalal, and S. C. Agrawal, "Suspicious human activity recognition: a review," Artificial Intelligence Review, vol. 50, pp. 283-339, 2018
A. Tapus, A. Bandera, R. Vazquez-Martin, and L. V. Calderita, "Perceiving the person and their interactions with the others for social robotics–a review," Pattern Recognition
Letters, vol. 118, pp. 3-13, 2019.
A. Ilidrissi and J. K. Tan, "A deep unified framework for suspicious action recognition," Artificial Life and Robotics, vol. 24, pp. 219-224, 2019.
Konstantinidis, D., Dimitropoulos, K., & Daras, P. (2018). Sıgn Language Recognıtıon Based On Hand And Body Skeletal Data. 2018- 3DTV-Conference: The True Vision - apture, Transmission and Display of 3D Video (3DTVCON).
S. J. Elias, S. M. Hatim, N. A. Hassan, L. M. A. Latif, R. B. Ahmad, M. Y. Darus, and A. Z. Shahuddin, "Face Recognition Attendance System Using Local Binary Pattern (LBP)," Bulletin of Electrical Engineering and Informatics, vol. 8, 2019.
A. Krizhevsky, I. Sutskever, and G. E. Hinton, "Imagenet classification with deep convolutional neural networks," Advances in neural information processing systems, vol. 25, pp. 1097-1105, 2012
Genemo, M. D. (2022). Suspicious activity recognition for monitoring cheating in exams. Proceedings of the Indian National Science Academy, 1-10.
C. A. Devine and E. D. Chin, "Integrity in nursing students: A concept analysis," Nurse education today, vol. 60, pp. 133-138, 2018.
H. M. Abdulghani, S. Haque, Y. A. Almusalam, S. L. Alanezi, Y. A. Alsulaiman, M. Irshad, et al., "Self-reported cheating among medical students: An alarming finding in a cross-sectional study from Saudi Arabia," PloS one, vol. 13, p. e0194963, 2018.
M. A. Lewis and C. Neighbors, "An examination of college student activities and attentiveness during a web-delivered personalized normative feedback intervention," Psychology of Addictive Behaviors, vol. 29, p. 162, 2015.RWTH-PHOENIX-2014-T veri seti, https://wwwi6.informatik.rwth-aachen.de/~koller/RWTH-PHOENIX-
-T/
S. Balocco, M. González, R. Ñanculef, P. Radeva, and G. Thomas, "Calcified plaque detection in IVUS sequences: Preliminary results using convolutional nets," in International Workshop on Artificial Intelligence and Pattern Recognition, 2018, pp. 34-42
Y. Liu, X. Wang, L. Wang, and D. Liu, "A modified leaky ReLU scheme (MLRS) for topology optimization with multiple materials," Applied Mathematics and Computation, vol. 352, pp. 188-204, 2019
J. Bouvrie, "Notes on convolutional neural networks," Neural Nets, MIT CBCL Tech Report, pp. 47-60, 2006.
Y. Li, Z. Hao, and H. Lei, "Survey of convolutional neural network," Journal of Computer Applications, vol. 36, pp. 2508- 2515, 2016.
A. Divakaran, Q. Yu, A. Tamrakar, H. S. Sawhney, J. Zhu, O. Javed, et al., "Real-time object detection, tracking and occlusion reasoning," ed: Google Patents, 2018.
A. Booranawong, N. Jindapetch, and H. Saito, "A system for detection and tracking of human movements using RSSI signals," IEEE Sensors Journal, vol. 18, pp. 2531-2544, 2018.
A. B. Mabrouk and E. Zagrouba, "Abnormal behavior recognition for intelligent video surveillance systems: A review," Expert Systems with Applications, vol. 91, pp. 480-491, 2018.
Krizhevsky and G. Hinton, "Learning multiple layers of features from tiny images (Technical Report)," University of Toronto, 2009
D. K. Vishwakarma, "A two-fold transformation model for human action recognition using decisive pose," Cognitive Systems Research, vol. 61, pp. 1-13, 2020.
M. A. Khan, Y.-D. Zhang, S. A. Khan, M. Attique, A. Rehman, and S. Seo, "A resource conscious human action recognition framework using 26-layered deep convolutional neural network," Multimedia Tools and Applications, pp. 1-23, 2020.
F. Afza, M. A. Khan, M. Sharif, S. Kadry, G. Manogaran, T. Saba, I. Ashraf, and R. Damaševičius, "A framework of human action recognition using length control features fusion and weighted entropy-variances based feature selection," Image and Vision Computing, vol. 106, p. 104090, 2021.
A. Nadeem, A. Jalal, and K. Kim, "Human actions tracking and recognition based on body parts detection via Artificial neural network," in 2020 3rd International Conference on Advancements in Computational Sciences (ICACS), 2020, pp. 1-6.
A. Abdelbaky and S. Aly, "Human action recognition using three orthogonal planes with unsupervised deep convolutional neural network," Multimedia Tools and Applications, pp. 1-25, 2021.
Published
Issue
Section
License
Authors retain copyright and full publishing rights to their articles. Upon acceptance, authors grant Indonesian Journal of Data and Science a non-exclusive license to publish the work and to identify itself as the original publisher.
Self-archiving. Authors may deposit the submitted version, accepted manuscript, and version of record in institutional or subject repositories, with citation to the published article and a link to the version of record on the journal website.
Commercial permissions. Uses intended for commercial advantage or monetary compensation are not permitted under CC BY-NC 4.0. For permissions, contact the editorial office at ijodas.journal@gmail.com.
Legacy notice. Some earlier PDFs may display “Copyright © [Journal Name]” or only a CC BY-NC logo without the full license text. To ensure clarity, the authors maintain copyright, and all articles are distributed under CC BY-NC 4.0. Where any discrepancy exists, this policy and the article landing-page license statement prevail.










