Computer Science ›› 2022, Vol. 49 ›› Issue (4): 233-238.doi: 10.11896/jsjkx.210300251

• Computer Graphics & Multimedia • Previous Articles     Next Articles

Human Abnormal Behavior Detection Method Based on Improved YOLOv3 Network Model

ZHANG Hong-min1, LI Ping-ping1, FANG Xiao-bing1, LIU Hong2   

  1. 1 College of Electrical and Electronic Engineering, Chongqing University of Technology, Chongqing 400054, China;
    2 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100080, China
  • Received:2021-03-22 Revised:2021-06-10 Published:2022-04-01
  • About author:ZHANG Hong-min,born in 1970,Ph.D,professor,is a member of China Computer Federation and ACM.His main research interests include image processing and pattern recognition.
  • Supported by:
    This work was supported by the Natural Science Foundation of Chongqing,China(cstc2021jcyj-msxmX0525).

Abstract: The data of traditional video surveillance is very large and complex, and cannot detect the abnormal behaviors of human in a timely and effective manner.In response to these problems, this paper presents an improved YOLOv3 algorithm (YOLOv3-MSSE) for the detection of human abnormal behavior.This algorithm can improve the detection accuracy of large targets for it is based on the traditional YOLOv3 network model, and a multi-scale feature extraction network is constructed by the residual mo-dules.At the same time, by incorporating the attention mechanism into different positions of the network structure, and the importance of the features in each channel of the feature map can be weighted, which effectively improves the detection performance of the model for abnormal human behavior.Experimental results show that compared with the traditional YOLOv3 algorithm, the mAP of YOLOv3-MSSE is increased by 20.8%, and F1-scores is increased by 11.3%.The proposed algorithm can not only detect the specific abnormal behavior of the human in the monitoring scene effectively, but also can balance the relationship between the detection accuracy rate and the recall rate well.In addition, It is more suitable for the detection of human abnormal behavior in actual monitoring scenarios than similar methods.

Key words: Abnormal behavior, Attention mechanism, Multiscale, Neural networks, Resnet

CLC Number: 

  • TP391
[1] LENTZAS A,VRAKAS D.Non-intrusive human activity recognition and abnormal behavior detection on elderly people:a review[J].Artificial Intelligence Review,2020,53(3):1975-2021.
[2] XU T,TIAN C Y,LIU C H.Deep Learning for AbnormalCrowd Behavior Detection:A Review[J].Computer Science,2021,48(9):125-134.
[3] FAN Z,YIN J,SONG Y,et al.Real-time and accurate abnormal behavior detection in videos[J].Machine Vision and Applications,2020,31(7):1-13.
[4] WANG Y N,LUO J J,WANG D W.An abnormal behavior detection algorithm based on key frame and amplitude histogram entropy[J].Computer and Digital Engineering,2019,47(9):2281-2285.
[5] SATYBALDINA D Z,GLAZYRINA N S,KALYMOVA K A,et al.Development of an algorithm for abnormal human behavior detection in intelligent video surveillance system[J].IOP Conference Series:Materials Science and Engineering,2021,1069(1):12046-12054.
[6] WU C F,CHENG Z X,JIANG Y Z.A Novel Detection Framework for Detecting Abnormal Human Behavior[J].Mathema-tical Problems in Engineering,2020,2020(1):1-9.
[7] ZHENG H,LIU J F,LIAO M Y.Detection and recognition of abnormal human behavior based on hybrid algorithm under indoor video surveillance[J].Computer Applications and Software,2019,36(7):224-230,241.
[8] LI X Q,SUN S L.Research on abnormal behavior detection based YOLO network[J].Electronic Design Engineering,2018,26(20):160-164,170.
[9] LUO F B,WANG P,LIANG S Y,et al.Recognition of abnormal crowd behavior based on deep learning and sparse optical flow[J].Computer Engineering,2020,46(4):287-293,300.
[10] MA Y D,LUO Z J,NI Z F,et al.Improved SSD algorithm for multi-target detection[J].Computer Engineering and Applications,2020,966(23):29-36.
[11] HE K M,ZHANG X Y,REN S Q,et al.Deep Residual Learning for Image Recognition[C]//2016 IEEE Conference on Compu-ter Vision and Pattern Recognition (CVPR).Las Vegas,USA:IEEE Xplore,2016:770-778.
[12] HU J,SHEN L,ALBANIE S,et al.Squeeze and Excitation Networks[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2020,42(8):2011-2023.
[13] KANG Y,CUI G R,LI H,et al.Software requirement clustering algorithm integrating self-attention mechanism and multi-pyramid convolution[J].Computer Science,2020,47(3):48-53.
[14] WANG S Y,WANG J J.Research on real time detection method of high density crowd target based on improved yolov3 algorithm[J].Safety and Environmental Engineering,2019,26(5):194-200.
[15] REDMON J,FARHADI A.YOLOv3:An Incremental Improvement[C]//2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).Salt Lake City,USA:IEEE Xplore,2018:1086-1091.
[16] ZOU Z W,QIN C.Method of dynamically constructing spatial topic R-tree based on k-means++[J].Journal of Computer Applications,2021,41(3):733-737.
[17] ZHANG F K,YANG F,LI C.Fastvehicle detection methodbased on improved YOLOv3[J].Computer Engineering and Application,2019,55(2):12-20.
[1] ZHOU Fang-quan, CHENG Wei-qing. Sequence Recommendation Based on Global Enhanced Graph Neural Network [J]. Computer Science, 2022, 49(9): 55-63.
[2] DAI Yu, XU Lin-feng. Cross-image Text Reading Method Based on Text Line Matching [J]. Computer Science, 2022, 49(9): 139-145.
[3] ZHOU Le-yuan, ZHANG Jian-hua, YUAN Tian-tian, CHEN Sheng-yong. Sequence-to-Sequence Chinese Continuous Sign Language Recognition and Translation with Multi- layer Attention Mechanism Fusion [J]. Computer Science, 2022, 49(9): 155-161.
[4] XIONG Li-qin, CAO Lei, LAI Jun, CHEN Xi-liang. Overview of Multi-agent Deep Reinforcement Learning Based on Value Factorization [J]. Computer Science, 2022, 49(9): 172-182.
[5] RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207.
[6] NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296.
[7] WANG Ming, PENG Jian, HUANG Fei-hu. Multi-time Scale Spatial-Temporal Graph Neural Network for Traffic Flow Prediction [J]. Computer Science, 2022, 49(8): 40-48.
[8] HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329.
[9] JIANG Meng-han, LI Shao-mei, ZHENG Hong-hao, ZHANG Jian-peng. Rumor Detection Model Based on Improved Position Embedding [J]. Computer Science, 2022, 49(8): 330-335.
[10] ZHU Cheng-zhang, HUANG Jia-er, XIAO Ya-long, WANG Han, ZOU Bei-ji. Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism [J]. Computer Science, 2022, 49(8): 113-119.
[11] SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177.
[12] YAN Jia-dan, JIA Cai-yan. Text Classification Method Based on Information Fusion of Dual-graph Neural Network [J]. Computer Science, 2022, 49(8): 230-236.
[13] JIN Fang-yan, WANG Xiu-li. Implicit Causality Extraction of Financial Events Integrating RACNN and BiLSTM [J]. Computer Science, 2022, 49(7): 179-186.
[14] XIONG Luo-geng, ZHENG Shang, ZOU Hai-tao, YU Hua-long, GAO Shang. Software Self-admitted Technical Debt Identification with Bidirectional Gate Recurrent Unit and Attention Mechanism [J]. Computer Science, 2022, 49(7): 212-219.
[15] PENG Shuang, WU Jiang-jiang, CHEN Hao, DU Chun, LI Jun. Satellite Onboard Observation Task Planning Based on Attention Neural Network [J]. Computer Science, 2022, 49(7): 242-247.
Full text



No Suggested Reading articles found!