skip to main content
10.1145/3551690.3551696acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicicmConference Proceedingsconference-collections
research-article

Student Physical Violence Detection using Convolutional Neural Networks

Published:14 September 2022Publication History

ABSTRACT

Physical bullying has been an evident issue in the Philippines and Global Context. Thus, it was widely recognized as a major threat in the younger generation in almost every country in the world. It includes wide variety of acts and contexts. As worst reality, physical violence happens mostly in schools. As a result, it affects a person not only physically but also mentally that even leads to death. Nowadays, numerous research in action recognition has been done through Machine Learning to provide an assistance in predicting and recognizing actions using cameras. In this paper, the researcher utilized machine learning algorithms such as Convolutional Neural Networks to train and recognize actions of physical bullying such as Kicking, Punching, and Head Hitting. The findings revealed a positive result in detecting such actions using Convolutional Neural Networks. With such, it enables the prevention of further physical bullying occurrences in the future using CCTV Cameras.

References

  1. 2017- (Azoulay, A.). writer of preface authorCorporate:UNESCO. Director-General, “UNESCO 2017,” 2018.Google ScholarGoogle Scholar
  2. M. Sanapo, “When Kids Hurt Other Kids: Bullying in Philippine Schools,” Psychology, vol. 08, pp. 2469–2484, Jan. 2017, doi: 10.4236/psych.2017.814156.Google ScholarGoogle ScholarCross RefCross Ref
  3. C. J. Ferguson, C. S. Miguel, J. C. Kilburn, and P. Sanchez, “The Effectiveness of School-Based Anti-Bullying Programs: A Meta-Analytic Review,” Crim. Justice Rev., vol. 32, no. 4, pp. 401–414, Dec. 2007, doi: 10.1177/0734016807311712.Google ScholarGoogle ScholarCross RefCross Ref
  4. L. Meyer and R. Chetty, “Violence in schools: a holistic approach to personal transformation of at-risk youth,” Acta Criminol. African J. Criminol. & Vict., vol. 30, no. 3, pp. 121–134, 2017, [Online]. Available: https://journals.co.za/content/journal/10520/EJC-bbcd4fd66Google ScholarGoogle Scholar
  5. J. Carreira and A. Zisserman, “Quo Vadis, action recognition? A new model and the kinetics dataset,” Proc. - 30th IEEE Conf. Comput. Vis. Pattern Recognition, CVPR 2017, vol. 2017-Janua, pp. 4724–4733, 2017, doi: 10.1109/CVPR.2017.502.Google ScholarGoogle ScholarCross RefCross Ref
  6. Song Cao and R. Nevatia, “Exploring deep learning based solutions in fine grained activity recognition in the wild,” in 2016 23rd International Conference on Pattern Recognition (ICPR), Dec. 2016, pp. 384–389. doi: 10.1109/ICPR.2016.7899664.Google ScholarGoogle Scholar
  7. Z. Cao, G. Hidalgo, T. Simon, S. E. Wei, and Y. Sheikh, “OpenPose: Realtime Multi-Person 2D Pose Estimation Using Part Affinity Fields,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 43, no. 1, pp. 172–186, 2021, doi: 10.1109/TPAMI.2019.2929257.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Nakai, Y. Tsunoda, H. Hayashi, and H. Murakoshi, Prediction of Basketball Free Throw Shooting by OpenPose. 2018.Google ScholarGoogle Scholar
  9. S. Suzuki, Y. Amemiya, and M. Sato, “Enhancement of gross-motor action recognition for children by CNN with OpenPose,” in IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society, Oct. 2019, vol. 1, pp. 5382–5387. doi: 10.1109/IECON.2019.8927828.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Y. Cheng, B. Yang, B. Wang, Y. Wending, and R. Tan, “Occlusion-aware networks for 3D human pose estimation in video,” Proc. IEEE Int. Conf. Comput. Vis., vol. 2019-October, pp. 723–732, 2019, doi: 10.1109/ICCV.2019.00081.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Student Physical Violence Detection using Convolutional Neural Networks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICICM '22: Proceedings of the 12th International Conference on Information Communication and Management
      July 2022
      105 pages
      ISBN:9781450396493
      DOI:10.1145/3551690

      Copyright © 2022 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 14 September 2022

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format