SECURITY MONITORING USING IMPROVED MOBILENET V2 WITH FINE-TUNING TO PREVENT THEFT IN RESIDENTIAL AREAS DURING THE COVID-19 PANDEMIC

Authors

  • Ryandra Anditto President University
  • Rusdianto Roestam President University

DOI:

https://doi.org/10.31598/sintechjournal.v5i1.1023

Keywords:

Convolutional Neural Network (CNN), Deep Neural Network (DNN), Fine-Tuning, ImageNet Dataset, MobileNet V2, Security Monitoring

Abstract

In this journal, authors improved a deep learning, it was MobileNet V2 which can learn with higher speed and accuracy using the ImageNet dataset. The basic architecture of MobileNet V2 was modified using a fine-tuning technique. It did not change the entire weight of the default deep learning model, there was freezing of some layers. The modifications involved by changing the parameters on the layer. The improved model would be trained using the ImageNet dataset based on the security monitoring context. The dataset class objects selected for training were objects that usually used by suspicious people with the aim of committing crime of theft. The results of training using an improved model could increase accuracy up to 71% with a difference of 3% from the training results of the default model of MobileNet V2. Since MobileNet V2 was a lightweight deep neural network model that had few parameters compared to other neural network model parameters, this modified model could be implemented on devices with low specifications, such as mobile devices or raspberry pi in the form of real-time applications.

Downloads

Download data is not yet available.

References

“Waspada Aksi Pencurian, Ini Tips Agar Rumah Aman dari Pencuri.” https://www.allianz.co.id/explore/waspada-aksi-pencurian-ini-tips-agar-rumah-aman-dari-pencuri1.html (accessed Feb. 26, 2022).

Z. Lukman, “Faktor-Faktor Dan Upaya Penanggulangan Tindak Pidana Pencurian Sepeda Motor (Studi Kasus Polresta Banda Aceh),” J. Justisia, vol. 4, 2019.

A. Suharsoyo, “Karakter pelaku tindak pidana pencurian dalam tipologi kejahatan pencurian di wilayah sukoharjo,” Jurisprudence, vol. 5, no. 1, pp. 64–74, 2015.

L. Mamluchah, “Peningkatan Angka Kejahatan Pencurian pada Masa Pandemi dalam Tinjauan Kriminologi dan Hukum Pidana Islam,” Huk. Pidana Islam, vol. 6, no. 1, pp. 1–26, 2020, [Online]. Available: http://jurnalfsh.uinsby.ac.id/index.php/HPI/article/view/1037/763.

B. Muthusenthil and H. sung Kim, “CCTV surveillance system, attacks and design goals,” Int. J. Electr. Comput. Eng., vol. 8, no. 4, pp. 2072–2082, 2018, doi: 10.11591/ijece.v8i4.pp2072-2082.

M. P. Hosseini, A. Hosseini, and K. Ahi, “A Review on Machine Learning for EEG Signal Processing in Bioengineering,” IEEE Rev. Biomed. Eng., vol. 14, no. c, pp. 204–218, 2021, doi: 10.1109/RBME.2020.2969915.

“A guide to the types of machine learning algorithms and their applications | SAS UK.” https://www.sas.com/en_gb/insights/articles/analytics/machine-learning-algorithms.html (accessed Feb. 26, 2022).

“What Is Deep Learning? | How It Works, Techniques & Applications - MATLAB & Simulink.” https://www.mathworks.com/discovery/deep-learning.html (accessed Feb. 26, 2022).

L. Alzubaidi et al., Review of deep learning: concepts, CNN architectures, challenges, applications, future directions, vol. 8, no. 1. Springer International Publishing, 2021.

M. Sandler, A. Howard, M. Zhu, A. Zhmoginov, and L. C. Chen, “MobileNetV2: Inverted Residuals and Linear Bottlenecks,” Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit., pp. 4510–4520, 2018, doi: 10.1109/CVPR.2018.00474.

B. Dan, X. Sun, and L. Liu, “Diseases and Pests Identification of Lycium Barbarum Using SE-MobileNet V2 Algorithm,” Proc. - 2019 12th Int. Symp. Comput. Intell. Des. Isc. 2019, vol. 1, pp. 121–125, 2019, doi: 10.1109/ISCID.2019.00034.

S. Li et al., “Individual dairy cow identification based on lightweight convolutional neural network,” PLoS One, vol. 16, no. 11 November, pp. 1–13, 2021, doi: 10.1371/journal.pone.0260510.

J. Koçi, A. O. Topal, and M. Ali, “Threat Object Detection in X-ray Images Using SSD, R-FCN and Faster R-CNN,” pp. 10–15, 2020.

R. Meena Prakash, N. Thenmoezhi, and M. Gayathri, “Face Recognition with Convolutional Neural Network and Transfer Learning,” Proc. 2nd Int. Conf. Smart Syst. Inven. Technol. ICSSIT 2019, no. Icssit, pp. 861–864, 2019, doi: 10.1109/ICSSIT46314.2019.8987899.

M. Ayi and M. El-Sharkawy, “RMNv2: Reduced Mobilenet V2 for CIFAR10,” 2020 10th Annu. Comput. Commun. Work. Conf. CCWC 2020, pp. 287–292, 2020, doi: 10.1109/CCWC47524.2020.9031131.

L. Fei-Fei, J. Deng, and K. Li, “ImageNet: A Large-Scale Hierarchical Image Database,” J. Vis., vol. 9, no. 8, pp. 1037–1037, 2010, doi: 10.1167/9.8.1037.

V. Taormina, D. Cascio, L. Abbene, and G. Raso, “Performance of fine-tuning convolutional neural networks for HEP-2 image classification,” Appl. Sci., vol. 10, no. 19, pp. 1–20, 2020, doi: 10.3390/app10196940.

“Convolutional Neural Networks — A Beginner’s Guide | by Krut Patel | Towards Data Science.” https://towardsdatascience.com/convolution-neural-networks-a-beginners-guide-implementing-a-mnist-hand-written-digit-8aa60330d022 (accessed Feb. 26, 2022).

Downloads

Published

2022-04-21

How to Cite

[1]
R. Anditto and R. Roestam, “SECURITY MONITORING USING IMPROVED MOBILENET V2 WITH FINE-TUNING TO PREVENT THEFT IN RESIDENTIAL AREAS DURING THE COVID-19 PANDEMIC”, SINTECH Journal, vol. 5, no. 1, pp. 87-94, Apr. 2022.