Research on Detection Errors or Misidentifications Regarding Workers' Mobile Phone Usage Behaviors During Work
DOI:
https://doi.org/10.62051/ijcsit.v7n1.04Keywords:
Behavior detection, Behavior recognitionAbstract
In recent years, news about major accidents caused by workers using mobile phones while on the job has emerged frequently, drawing widespread attention from society. With the advancement of artificial intelligence, detection methods based on deep learning have gradually replaced manual supervision, becoming a current research hotspot. Although the technology for detecting mobile phone usage behavior is now relatively mature, it still has some flaws. For instance, mistakes or misidentifications in detecting workers' mobile phone usage behaviors still occur from time to time. This project aims to improve and refine the existing technology for detecting workers' mobile phone usage behavior, enhance detection accuracy and precision, reduce the misjudgment rate, and avoid related risks and losses caused by misjudgments. It will help enterprises accurately identify workers' mobile phone usage during work, thereby improving work efficiency and reducing safety hazards.
Downloads
References
[1] Zhao Peisen. Research on the Identification Technology of Illegal Mobile Phone Use in Industrial Safety Environments [D]. Beijing Institute of Petrochemical Technology, 2022. DOI:10.27849/d.cnki.gshyj.2022.000139.
[2] Xue Fengtao. Research and Application of Behavior Detection Based on Smartphone Sensors [D]. Southwest University, 2017.
[3] Nong Zijian. A HOI-Based Method for Detecting Mobile Phone Use in Industrial Safety Production Environments [D]. University of Electronic Science and Technology of China, 2023.
[4] Ma Jiajia. Research on Object Detection Technology Based on YOLOv3 [D]. Shenyang Ligong University, 2022.
[5] Lin, B. H., Liu, K., Zhu, Y. F., et al. Research on a Method for Detecting Workers' Mobile Phone Use Based on YOLO v5 [J]. Journal of Nanjing Institute of Technology (Natural Science Edition), 2023, 21(01): 39-44.
[6] Kunlun Digital Intelligence Technology Co., Ltd., China National Petroleum Corporation, Communication and Information Technology Center of PetroChina Southwest Oil & Gas Field Company, et al. A User Mobile Phone Answering and Calling Behavior Detection Method Based on Deep Learning Multi-Model Fusion: CN202111232852.X [P]. 2025-02-07.
[7] Howard et al. MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications. arXiv preprint arXiv:1704.04861, 2017.
[8] Wang et al. CSPNet: A New Backbone that can Enhance Learning Capability of CNN, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Seattle, WA, USA, 2020, pp.1571-1580.
[9] Redmon et al. YOLOv3: An Incremental Improvement. arXiv preprint arXiv:1804.02767, 2018.
[10] Zheng et al. Distance-IoU Loss: Faster and Better Learning for Bounding Box Regression. Proceedings of the AAAI Conference on Artificial Intelligence, 2020, 34(07):12993-13000.
[11] Hu et al. Squeeze-and-Excitation Networks. In Proceedings of the IEEE conference on computer vision and pattern recognition, 2018, pp.7132-7141.
[12] Lin, Tsung-Yi, et al. Feature pyramid networks for object detection. Proceedings of the IEEE conference on computer vision and pattern recognition, 2017, pp.2117-2125.
[13] Z. Cai and N. Vasconcelos. Cascade R-CNN: Delving Into High Quality Object Detection,2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT, USA, 2018, pp.6154-6162.
[14] H. Sakoe and S. Chiba. Dynamic programming algorithm optimization for spoken word recognition. IEEE Transactions on Acoustics, Speech, and Signal Processing, 1978, 26(1):43-49.
[15] Vaswani et al. Attention Is All You Need. Advances in Neural Information Processing Systems (NeurIPS), 2017, pp.5998-6008.
[16] Pizer et al. Adaptive Histogram Equalization and Its Variations. Computer Vision, Graphics, and Image Processing, 1987, 39(3):355-368.
[17] Donoho et al. Ideal Spatial Adaptation by Wavelet Shrinkage. Biometrika, 1994, 81(3):425-455.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Computer Science and Information Technology

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.







