Authors :
Ajay S. Chhajed; Hetakshi R. Borse; Vaishnavi S. Bongane; Shrushti P. Bodake; Aachal N. Borle; Sarthak S. Bote; Prathmesh S. Birajdar
Volume/Issue :
Volume 10 - 2025, Issue 10 - October
Google Scholar :
https://tinyurl.com/2p9hu356
Scribd :
https://tinyurl.com/53mcsueh
DOI :
https://doi.org/10.38124/ijisrt/25oct471
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Note : Google Scholar may take 30 to 40 days to display the article.
Abstract :
In recent years, the rise of security threats in public and private spaces has emphasized the need for intelligent
surveillance systems. This research presents a real-time AI-based threat detection model that identifies potential hazards
such as guns, knives, and masks using a customized YOLOv8 architecture integrated with OpenCV. The system is designed
to differentiate threatening and non-threatening objects across 27 classes, providing immediate alerts through a web-based
dashboard and voice notifications. The application, built using Flask, JavaScript, and SQLite, offers a live camera feed and
automated logging of detected threats with time and date. Achieving an accuracy of 90% and high frame-rate inference, the
system demonstrates strong potential for real-world deployment in smart surveillance, ensuring rapid and automated
responses to life-threatening events.
Keywords :
Object Detection, Computer Vision, Real Time Surveillance, Threat Identification, Deep Learning.
References :
- Maireva S., Usai T. and Manhokwe S., "The Determination of Adulteration in Orange Based Fruit Juices", International Journal of Science and Technology Volume 2 No. 5, May, 2013.
- A. H. Kiranmayee, P. C. Panchariya, P. B. Prasad and A. L. Sharma, "Biomimetic cIassification of juices", Proceeding of 20 I 2 Sixth International Conference on Sensing Technology (ICST), pp. 551-556,2012.
- W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA: Wadsworth, 1993, pp. 123–135.
- G. Eason, B. Noble, and I. N. Sneddon, “On certain integrals of Lipschitz-Hankel type involving products of Bessel functions,” Philosophical Transaction Royal Society London, volume A-247, pp. 529–551, April 1955.
- B. Smith, “An approach to graphs of linear forms (Unpublished work style),” unpublished.
- E. H. Miller, “A note on reflector arrays (Periodical style—Accepted for publication),” IEEE Trans. Antennas Propagat., to be published.
- J. Wang, “Fundamentals of erbium-doped fiber amplifiers arrays (Periodical style—Submitted for publication),” IEEE J. Quantum Electron., submitted for publication.
- C. J. Kaufman, Rocky Mountain Research Lab., Boulder, CO, private communication, May 1995.
- Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interfaces (Translation Journals style),” IEEE Transl. J. Magn.Jpn., vol. 2, Aug. 1987, pp. 740–741 [Dig. 9th Annu. Conf. Magnetics Japan, 1982, p. 301].
- M. Young, The Techincal Writers Handbook. Mill Valley, CA: University Science, 1989.
- J. U. Duncombe, “Infrared navigation—Part I: An assessment of feasibility (Periodical style),” IEEE Trans. Electron Devices, vol. ED-11, pp. 34–39, Jan. 1959.
In recent years, the rise of security threats in public and private spaces has emphasized the need for intelligent
surveillance systems. This research presents a real-time AI-based threat detection model that identifies potential hazards
such as guns, knives, and masks using a customized YOLOv8 architecture integrated with OpenCV. The system is designed
to differentiate threatening and non-threatening objects across 27 classes, providing immediate alerts through a web-based
dashboard and voice notifications. The application, built using Flask, JavaScript, and SQLite, offers a live camera feed and
automated logging of detected threats with time and date. Achieving an accuracy of 90% and high frame-rate inference, the
system demonstrates strong potential for real-world deployment in smart surveillance, ensuring rapid and automated
responses to life-threatening events.
Keywords :
Object Detection, Computer Vision, Real Time Surveillance, Threat Identification, Deep Learning.