Robust Human Target Detection and Aquisitions


Authors : Ajay S. Chhajed; Hetakshi R. Borse; Vaishnavi S. Bongane; Shrushti P. Bodake; Aachal N. Borle; Sarthak S. Bote; Prathmesh S. Birajdar

Volume/Issue : Volume 10 - 2025, Issue 10 - October


Google Scholar : https://tinyurl.com/2p9hu356

Scribd : https://tinyurl.com/53mcsueh

DOI : https://doi.org/10.38124/ijisrt/25oct471

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.

Note : Google Scholar may take 30 to 40 days to display the article.


Abstract : In recent years, the rise of security threats in public and private spaces has emphasized the need for intelligent surveillance systems. This research presents a real-time AI-based threat detection model that identifies potential hazards such as guns, knives, and masks using a customized YOLOv8 architecture integrated with OpenCV. The system is designed to differentiate threatening and non-threatening objects across 27 classes, providing immediate alerts through a web-based dashboard and voice notifications. The application, built using Flask, JavaScript, and SQLite, offers a live camera feed and automated logging of detected threats with time and date. Achieving an accuracy of 90% and high frame-rate inference, the system demonstrates strong potential for real-world deployment in smart surveillance, ensuring rapid and automated responses to life-threatening events.

Keywords : Object Detection, Computer Vision, Real Time Surveillance, Threat Identification, Deep Learning.

References :

  1. Maireva S., Usai T. and Manhokwe S., "The Determination of Adulteration in Orange Based Fruit Juices", International Journal of Science and Technology Volume 2 No. 5, May, 2013.
  2. A. H. Kiranmayee, P. C. Panchariya, P. B. Prasad and A. L. Sharma, "Biomimetic cIassification of juices", Proceeding of 20 I 2 Sixth International Conference on Sensing Technology (ICST), pp. 551-556,2012.
  3. W.-K. Chen, Linear Networks and Systems (Book style).               Belmont, CA: Wadsworth, 1993, pp. 123–135.
  4. G. Eason, B. Noble, and I. N. Sneddon, “On certain integrals of Lipschitz-Hankel type involving products of Bessel functions,” Philosophical Transaction Royal Society London, volume A-247, pp. 529–551, April 1955.
  5. B. Smith, “An approach to graphs of linear forms (Unpublished work style),” unpublished.
  6. E. H. Miller, “A note on reflector arrays (Periodical style—Accepted for publication),” IEEE Trans. Antennas Propagat., to be published.
  7. J. Wang, “Fundamentals of erbium-doped fiber amplifiers arrays (Periodical style—Submitted for publication),” IEEE J. Quantum Electron., submitted for publication.
  8. C. J. Kaufman, Rocky Mountain Research Lab., Boulder, CO, private communication, May 1995.
  9. Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interfaces (Translation Journals style),” IEEE Transl. J. Magn.Jpn., vol. 2, Aug. 1987, pp. 740–741 [Dig. 9th Annu. Conf. Magnetics Japan, 1982, p. 301].
  10. M. Young, The Techincal Writers Handbook. Mill Valley, CA: University Science, 1989.
  11. J. U. Duncombe, “Infrared navigation—Part I: An assessment of feasibility (Periodical style),” IEEE Trans. Electron Devices, vol. ED-11, pp. 34–39, Jan. 1959.

In recent years, the rise of security threats in public and private spaces has emphasized the need for intelligent surveillance systems. This research presents a real-time AI-based threat detection model that identifies potential hazards such as guns, knives, and masks using a customized YOLOv8 architecture integrated with OpenCV. The system is designed to differentiate threatening and non-threatening objects across 27 classes, providing immediate alerts through a web-based dashboard and voice notifications. The application, built using Flask, JavaScript, and SQLite, offers a live camera feed and automated logging of detected threats with time and date. Achieving an accuracy of 90% and high frame-rate inference, the system demonstrates strong potential for real-world deployment in smart surveillance, ensuring rapid and automated responses to life-threatening events.

Keywords : Object Detection, Computer Vision, Real Time Surveillance, Threat Identification, Deep Learning.

CALL FOR PAPERS


Paper Submission Last Date
31 - December - 2025

Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe