International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 3 | Views: 206 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project | Computer Science & Engineering | India | Volume 12 Issue 11, November 2023 | Popularity: 5.5 / 10


     

Weapon Identification using YOLO V5 Algorithm

Divyamsh Reddy A, M Poojitha, G Puspalalitha, M Vishnu Vardhan Reddy, K Ashok Kumar, G Nithya Sree


Abstract: Rapid advancement of computer vision technologies has led to significant progress in the field of object detection, with applications ranging from surveillance to autonomous vehicles. One critical application is the identification of weapons in real-time scenarios, such as security monitoring and law enforcement. This paper presents a novel approach for weapon identification using the YOLOv5 (You Only Look Once version 5) algorithm, a state-of-the-art real-time object detection model. Traditional methods of weapon identification often rely on manual intervention or limited rule-based systems, which can be time-consuming and prone to errors. In contrast, the proposed method harnesses the power of deep learning to automate the detection process. YOLOv5, known for its speed and accuracy, is employed to detect and classify weapons in images and video streams. The dataset used for training encompasses a diverse range of weapon types, orientations, and lighting conditions to ensure robustness. The methodology involves fine-tuning the YOLOv5 architecture on the weapon dataset, optimizing hyperparameters, and leveraging data augmentation techniques to improve model generalization. The resulting trained model demonstrates remarkable proficiency in real-time weapon detection, outperforming traditional methods and achieving high precision and recall rates. Experimental results on benchmark datasets and custom video sequences showcase the effectiveness of the proposed approach. The YOLOv5-based weapon identification system exhibits the capability to swiftly and accurately detect weapons, thus holding significant promise for enhancing security measures in public spaces, transportation hubs, and high-security areas. In conclusion, this paper contributes to the domain of automated security systems by introducing a robust and efficient solution for weapon identification. The utilization of YOLOv5 demonstrates the potential of deep learning to address critical real-world challenges, paving the way for safer environments through advanced object detection techniques.


Keywords: Weapon, YOLO V5, Algorithm


Edition: Volume 12 Issue 11, November 2023


Pages: 550 - 564


DOI: https://www.doi.org/10.21275/SR23827102656



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Divyamsh Reddy A, M Poojitha, G Puspalalitha, M Vishnu Vardhan Reddy, K Ashok Kumar, G Nithya Sree, "Weapon Identification using YOLO V5 Algorithm", International Journal of Science and Research (IJSR), Volume 12 Issue 11, November 2023, pp. 550-564, URL: https://www.ijsr.net/getabstract.php?paperid=SR23827102656, DOI: https://www.doi.org/10.21275/SR23827102656



Downloads: 656 | Views: 2002 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj


Downloads: 401 | Views: 719 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science & Engineering, India, Volume 7 Issue 11, November 2018

Pages: 1951 - 1955

Hadoop Performance Improvement using Metadata and Securing with Oauth Token

Swapnali A. Salunkhe, Amol B. Rajmane


Downloads: 386 | Views: 699 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1 - 3

Comparative Study of Conventional Desktop Computer and Compute Stick

Aadarsh Sooraj, Sooraj G.


Downloads: 354 | Views: 698 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 629 - 632

Review Paper on Secure Hashing Algorithm and Its Variants

Priyanka Vadhera, Bhumika Lall


Downloads: 336 | Views: 688 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2148 - 2152

The Impact and Application of 3D Printing Technology

Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera


Top