Safety Helmet Wearing Detection System Based on a Two-Stage Network Model

Yu Ci Chen, Wen June Wang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this study, we proposed a safety helmet-wearing detection system to identify whether workers in hazardous environments such as factories or construction sites wear safety helmets. To reduce the classification loss and maintain the availability of streaming helmet detection, we presented a two-stage network model containing YOLOv5-Small and ResNet-18. The network YOLO is used to detect and crop the regions of the images with heads; then, the cropped images will be sent to ResNet to classify. By taking advantage of the individual strengths of these two models, experimental results show that the detection system indeed provides higher precision results compared to the YOLOv5-Small-only system, especially for the cases of wearing hats but not helmets. Furthermore, we designed an additional alert mechanism for real-world applications to reduce the incidence rate of false alerts and increase the flexibility of wide deployment.

Original languageEnglish
Title of host publication2023 5th International Conference on Computer Communication and the Internet, ICCCI 2023
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages122-126
Number of pages5
ISBN (Electronic)9798350326956
DOIs
StatePublished - 2023
Event5th International Conference on Computer Communication and the Internet, ICCCI 2023 - Fujisawa, Japan
Duration: 23 Jun 202325 Jun 2023

Publication series

Name2023 5th International Conference on Computer Communication and the Internet, ICCCI 2023

Conference

Conference5th International Conference on Computer Communication and the Internet, ICCCI 2023
Country/TerritoryJapan
CityFujisawa
Period23/06/2325/06/23

Keywords

  • computer vision
  • deep learning
  • safety helmet
  • two-stage network model
  • worker safety

Fingerprint

Dive into the research topics of 'Safety Helmet Wearing Detection System Based on a Two-Stage Network Model'. Together they form a unique fingerprint.

Cite this