skip to main content
10.1145/3529399.3529512acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicmltConference Proceedingsconference-collections
research-article

Personal Protective Equipment use inspection, real time surveillance with YOLO

Authors Info & Claims
Published:10 June 2022Publication History

ABSTRACT

Two situations are necessary to improve the safety and health conditions of people in industries: A proper use of Personal Protective Equipment by workers who develop their jobs into industrial areas and a continuous inspection promoted by employers. In this paper, we review the best known object detectors for prediction tasks, evaluating the features that are needed for a real-time surveillance system that can provide reliable predictions in a safety and health context. We present a tool based on Computer Vision which make predictions about if people are using their respective High Visibility Vest and Hard Hat. Additionally, the same model predicts if a person is wearing a face cover or there is an absence of this protector on the person's face. Our dataset was built by collecting images from available online datasets and we added own images. It has six classes which were defined by the combination of four instances. For detection task, we explored and evaluated different versions of You-only-look-once (YOLO). The best performance for a real time surveillance was reached by YOLO v5-nano, 125.3 FPS. On the other hand, the most important outcomes in terms of average precision were achieved by YOLO v4 and YOLO v5-small with 0.892 and 0.916 respectively.

References

  1. U. S. B. of L. Statistics, “About the construction sector,.” https://www.bls.gov/iag/tgs/iag23.htm (accessed Nov. 22, 2021).Google ScholarGoogle Scholar
  2. N. D. Nath and A. H. Behzadan, “Deep Learning Detection of Personal Protective Equipment to Maintain Safety Compliance on Construction Sites,” Constr. Res. Congr. 2020 Comput. Appl. - Sel. Pap. from Constr. Res. Congr. 2020, pp. 181–190, 2020, doi: 10.1061/9780784482865.020.Google ScholarGoogle ScholarCross RefCross Ref
  3. E. Badillo and C. Acevedo, “Actitud de los trabajadores ante el uso de Equipo de Proteccion Personal,” CuidArte, vol. 8, no. 15, pp. 56–66, 2019, doi: http://dx.doi.org/10.22201/fesi.23958979e.2019.8.15.69157.Google ScholarGoogle ScholarCross RefCross Ref
  4. N. D. Nath, A. H. Behzadan, and S. G. Paal, “Deep learning for site safety: Real-time detection of personal protective equipment,” Autom. Constr., vol. 112, no. July 2019, p. 103085, 2020, doi: 10.1016/j.autcon.2020.103085.Google ScholarGoogle ScholarCross RefCross Ref
  5. N. Filatov, N. Maltseva, and A. Bakhshiev, “Development of Hard Hat Wearing Monitoring System Using Deep Neural Networks with High Inference Speed,” in 2020 International Russian Automation Conference (RusAutoCon), Sep. 2020, pp. 459–463, doi: 10.1109/RusAutoCon49822.2020.9208155.Google ScholarGoogle ScholarCross RefCross Ref
  6. S. Khosravipour, E. Taghvaei, and N. M. Charkari, “COVID-19 personal protective equipment detection using real-time deep learning methods,” 2021, [Online]. Available: http://arxiv.org/abs/2103.14878.Google ScholarGoogle Scholar
  7. P. Soviany and R. T. Ionescu, “Optimizing the trade-off between single-stage and two-stage deep object detectors using image difficulty prediction,” Proc. - 2018 20th Int. Symp. Symb. Numer. Algorithms Sci. Comput. SYNASC 2018, pp. 209–214, 2018, doi: 10.1109/SYNASC.2018.00041.Google ScholarGoogle ScholarCross RefCross Ref
  8. M. Carranza-García, J. Torres-Mateo, P. Lara-Benítez, and J. García-Gutiérrez, “On the performance of one-stage and two-stage object detectors in autonomous vehicles using camera data,” Remote Sens., vol. 13, no. 1, pp. 1–23, 2021, doi: 10.3390/rs13010089.Google ScholarGoogle Scholar
  9. J. Redmon and A. Farhadi, “YOLO v3: An Incremental Improvement,” Tech Rep., pp. 1–6, 2018, [Online]. Available: https://pjreddie.com/media/files/papers/YOLOv3.pdf.Google ScholarGoogle Scholar
  10. A. Bochkovskiy, C.-Y. Wang, and H.-Y. M. Liao, “YOLOv4: Optimal Speed and Accuracy of Object Detection,” 2020, [Online]. Available: http://arxiv.org/abs/2004.10934.Google ScholarGoogle Scholar
  11. Z. Wang, Y. Wu, L. Yang, A. Thirunavukarasu, C. Evison, and Y. Zhao, “Fast Personal Protective Equipment Detection for Real Construction Construction Sites Using Deep Learning Approaches,” pp. 1–22, 2021.Google ScholarGoogle Scholar
  12. G. Jocher , “Ultralytics/yolov5: v3.1 - Bug Fixes and Performance Improvements,” Oct. 29, 2020. https://zenodo.org/record/4154370 (accessed Oct. 21, 2021).Google ScholarGoogle Scholar
  13. Z. Tian, C. Shen, H. Chen, and T. He, “FCOS: Fully convolutional one-stage object detection,” Proc. IEEE Int. Conf. Comput. Vis., vol. 2019-Octob, pp. 9626–9635, 2019, doi: 10.1109/ICCV.2019.00972.Google ScholarGoogle ScholarCross RefCross Ref
  14. Y. Zhang, C. Wang, X. Wang, W. Zeng, and W. Liu, “FairMOT: On the Fairness of Detection and Re-Identification in Multiple Object Tracking,” pp. 1–13, 2020, doi: 10.1007/s11263-021-01513-4.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. X. Zhou, D. Wang, and P. Krähenbühl, “Objects as Points,” 2019, [Online]. Available: http://arxiv.org/abs/1904.07850.Google ScholarGoogle Scholar
  16. H. M. Hung, L. T. Lan, and H. S. Hong, “a Deep Learning-Based Method for Real-Time Personal Protective Equipment Detection,” J. Sci. Tech. Le Quy Don Tech. Univ., vol. 199, no. 199, pp. 23–34, 2019.Google ScholarGoogle Scholar
  17. L. Biewald, “Experiment tracking with weights and biases,” 2020. https://www.wandb.com/.Google ScholarGoogle Scholar
  18. M. D. Bloice, P. M. Roth, and A. Holzinger, “Biomedical image augmentation using Augmentor,” Bioinformatics, vol. 35, no. 21, pp. 4522–4524, 2019, doi: 10.1093/bioinformatics/btz259.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Personal Protective Equipment use inspection, real time surveillance with YOLO
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ICMLT '22: Proceedings of the 2022 7th International Conference on Machine Learning Technologies
          March 2022
          291 pages
          ISBN:9781450395748
          DOI:10.1145/3529399

          Copyright © 2022 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 10 June 2022

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited
        • Article Metrics

          • Downloads (Last 12 months)43
          • Downloads (Last 6 weeks)4

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format