IMPLEMENTATION OF A VIOLATION BEHAVIOR IDENTIFICATION AND EARLY WARNING SYSTEM FOR INDUSTRIAL WORKSHOPS

Authors

  • ZiRui Wu School of Artificial Intelligence, Wenzhou Polytechnic, Wenzhou 325035, Zhejiang, China.
  • XinYin Lan School of Artificial Intelligence, Wenzhou Polytechnic, Wenzhou 325035, Zhejiang, China.
  • FanHao Ye School of Artificial Intelligence, Wenzhou Polytechnic, Wenzhou 325035, Zhejiang, China.
  • ZhenNan Zhang School of Artificial Intelligence, Wenzhou Polytechnic, Wenzhou 325035, Zhejiang, China.
  • MuCong Chi (Corresponding Author) School of Artificial Intelligence, Wenzhou Polytechnic, Wenzhou 325035, Zhejiang, China.

Keywords:

Industrial workshop, Violation identification, Edge computing, YOLO, TensorRT quantization

Abstract

Aiming at the pain points in industrial workshops, such as the low efficiency of manual monitoring, poor computing power adaptability of existing vision-based systems, and the lack of a closed-loop alarm mechanism, this paper designs and implements a violation behavior identification and early warning system. First, based on the YOLOv8n model developed by the Ultralytics team, the system incorporates depthwise separable convolutions and attention mechanisms for lightweight optimization. Combined with TensorRT quantization and compression, this ensures low-latency deployment on edge devices. Second, a four-layer architecture is constructed, comprising the Perception Layer, Edge Computing Layer, Intelligent Decision Layer, and Application Layer. The introduction of an intelligent decision mechanism enables an end-to-end automated closed-loop of identification-alarm-archiving. The system is integrated with DingTalk/WeCom and MES (Manufacturing Execution System) to facilitate real-time alarm notifications and data logging. Finally, the system's performance was validated through experiments in real-world industrial workshop scenarios. The results indicate that the average inference latency at the edge is 39 ms, the identification accuracy for violations reaches 92.3%, and the false alarm rate is reduced to 3.2%. All metrics meet the real-time monitoring requirements of industrial sites.

References

[1] Jha S. Computer Vision for Surveillance and Monitoring. 2025 5th International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT), MANDYA, India, 2025: 1-5. DOI: 10.1109/ICERECT65215.2025.11376098.

[2] Jocher G, Chaurasia A, Qiu J. Ultralytics YOLO (Version 8.0) [Software], 2023, Accessed: May 2026. https://github.com/ultralytics/ultralytics.

[3] Zhai H, Du J, Ai Y, et al. Edge deployment of deep networks for visual detection: a review. IEEE Sensors Journal, 2024, 25(11): 18662-18683.

[4] NVIDIA Corporation. NVIDIA TensorRT: Programmable Deep Learning Accelerator. [Technical Documentation], 2023, Accessed: May 2026. https://developer.nvidia.com/tensorrt.

[5] Bayar A, Şener U, Kayabay K, et al. Edge computing applications in industrial IoT: A literature review. International Conference on the Economics of Grids, Clouds, Systems, and Services, GECON 2022. Lecture Notes in Computer Science, 2023: 124-131. DOI: 10.1007/978-3-031-29315-3_11.

[6] Savaglio C, Mazzei P, Fortino G. Edge intelligence for industrial IoT: Opportunities and limitations. Procedia Computer Science, 2024, 232, 397-405.

[7] Abou Ali M, Dornaika F, Charafeddine J. Agentic AI: a comprehensive survey of architectures, applications, and future directions. Artificial Intelligence Review, 2025, 59(1): 11.

[8] Jaggavarapu MKR. The evolution of agentic AI: architecture and workflows for autonomous systems. Journal Of Multidisciplinary, 2025, 5(7): 418-427.

[9] Zhang Y, Liao X. Asymmetric Training and Symmetric Fusion for Image Denoising in Edge Computing. Symmetry, 2025, 17(3): 424.

[10] Wang J, Yang F, Chen T, et al. An overview of industrial alarm systems: Main causes for alarm overloading, research status, and open problems. IEEE Transactions on Automation Science and Engineering, 2015, 13(2): 1045-1061.

[11] Howard AG, Zhu M, Chen B, et al. MobileNets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint, 2017. DOI: 10.48550/arXiv.1704.04861.

[12] Woo S, Park J, Lee JY, et al. CBAM: Convolutional block attention module. Proceedings of the European Conference on Computer Vision (ECCV), 2018, 11211, 3-19. DOI: 10.1007/978-3-030-01234-2_1.

[13] Wu Y, Guo H, Chakraborty C, et al. Edge computing driven low-light image dynamic enhancement for object detection. IEEE Transactions on Network Science and Engineering, 2022, 10(5): 3086-3098.

[14] Alginahi YM, Sabri O, Said W. Reinforcement Learning for Industrial Automation: A Comprehensive Review of Adaptive Control and Decision-Making in Smart Factories. Machines, 2025, 13(12): 1140.

Downloads

Published

2026-05-21

Issue

Section

Research Article

DOI:

How to Cite

ZiRui Wu, XinYin Lan, FanHao Ye, ZhenNan Zhang, MuCong Chi. Implementation Of A Violation Behavior Identification And Early Warning System For Industrial Workshops. Multidisciplinary Journal of Engineering and Technology. 2026, 3(2): 1-6. DOI: https://doi.org/10.61784/mjet3038.