Comparison of VGG-16, VGG-19, and ResNet-101 CNN Models for the purpose of Suspicious Activity Detection

Authors

  • Dr. Madhur Jain  Assistant Professor, Department of Information Technology, Bhagwan Parshuram Institute of Technology, Guru Gobind Singh Indraprastha University, Delhi, India
  • Mayank Singh Bora  UG Student, Department of Information Technology, Bhagwan Parshuram Institute of Technology, Guru Gobind Singh Indraprastha University, Delhi, India
  • Sameer Chandnani  UG Student, Department of Information Technology, Bhagwan Parshuram Institute of Technology, Guru Gobind Singh Indraprastha University, Delhi, India
  • Sanidhay Grover  UG Student, Department of Information Technology, Bhagwan Parshuram Institute of Technology, Guru Gobind Singh Indraprastha University, Delhi, India
  • Shivank Sadwal  UG Student, Department of Information Technology, Bhagwan Parshuram Institute of Technology, Guru Gobind Singh Indraprastha University, Delhi, India

DOI:

https://doi.org/10.32628/CSEIT2390124

Keywords:

Convolutional Neural Network (CNN), Image classification, Suspicious Activity Detection, VGG-16, VGG-19, ResNet-101.

Abstract

This paper compares the performance of three popular convolutional neural network (CNN) models, VGG-16, VGG-19, and ResNet-101, for the task of suspicious activity detection. The VGG networks are known for their depth and the use of small convolutional filters, while ResNet is known for its residual connections that allow for deeper networks without the issue of vanishing gradients. The study utilizes a dataset of surveillance videos for training and testing the models. The results show that the VGG-19 model outperforms the other two in terms of accuracy, specifically for the detection of suspicious activities. Overall, this study demonstrates the effectiveness of the three different models for suspicious activity detection and highlights its potential for use in real-world surveillance systems.

References

  1. Understanding the VGG19 Architecture https://iq.opengenus.org/vgg19-architecture
  2. Martín Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, Manjunath Kudlur, Josh Levenberg, Rajat Monga, Sherry Moore, Derek G.   Murray, Benoit Steiner, Paul Tucker, Vijay Vasudevan, Pete Warden, Martin Wicke, Yuan Yu, and Xiaoqiang Zheng, Google Brain. ”TensorFlow: A system for large-scale machine learning”.12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16), USENIX Association (2016), pp. 265-283.
  3. VGG-16 | CNN model:https://wwwgee.ksforgeeks.org/vgg-16-cnn-mod el
  4. Kaiming He, Xiangyu Zhang, Shaoqing Ren, Jian Sun. “Deep Residual Learning for Image Recognition”2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).e- ISSN:1063-6919
  5. Training and Test Sets: Splitting Data: https://developers.google.com/machine-learning/ crash-course/training-and-test-sets/splitting-data
  6. Machine Learning – Training, Validation & Test Data Set: https://vitalflux.com/machine-learning-training- validation-test-data-set/
  7. What is Epoch in Machine Learning?: https://www.simplilearn.com/tutorials/machine-l earning-tutorial/what-is-epoch-in-machine-learni ng
  8. Training and Validation Loss in Deep Learning:https://www.baeldung.com/cs/training-validation-loss-deep-learning

Downloads

Published

2023-02-28

Issue

Section

Research Articles

How to Cite

[1]
Dr. Madhur Jain, Mayank Singh Bora, Sameer Chandnani, Sanidhay Grover, Shivank Sadwal, " Comparison of VGG-16, VGG-19, and ResNet-101 CNN Models for the purpose of Suspicious Activity Detection" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 9, Issue 1, pp.121-130, January-February-2023. Available at doi : https://doi.org/10.32628/CSEIT2390124