Yolo Deep Learning Model Based Algorithm for Object Detection
Research Paper | Journal Paper
Vol.8 , Issue.1 , pp.174-178, Jan-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i1.174178
Abstract
With the growth of deep learning and digital image processing, it is require knowing about the facts of deep learning. Deep learning is major factor of object detection. In existing research R-CNN algorithm used for detect the objects from an image while in this proposed research method we are using YOLO ( you only look once)algorithm to detect the different objects in a single image. This is less time consuming because we only recognize a image once and we detect the whole objects in an image.
Key-Words / Index Term
Digital image processing, image recognition, Accuracy, time complexity, histogram , K-MEANS,YOLO
References
[1] Yali Amit and Pedro Felzenszwalb, University of Chicago
[2] Ross, Girshick (2014). "Rich feature hierarchies for accurate object detection and semantic segmentation" (PDF). Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. IEEE. doi:10.1109/CVPR.2014.81
[3] "ETHZ - Computer Vision Lab: Publications". Vision.ee.ethz.ch. Retrieved 2013-10-09.
[4] Jussi Jokela “PERSON COUNTER USING REAL-TIME OBJECT DETECTION AND A SMALL NEURAL NETWORK” TURKU UNIVERSITY OF APPLIED SCIENCES
[5] http://cs231n.github.io/convolutional-networks/
[6] ImageNet Classification with Deep Convolutional Neural Networks by Alex Krizhevsky University of Toronto kriz@cs.utoronto.ca Ilya Sutskever University of Toronto ilya@cs.utoronto.ca
[7] Wenqing Chu, Deng Cai “ Deep feature based contextual model for object detection” Neurocomputing 275, 1035–1042, 2018
[8] S. Gidaris , N. Komodakis , Locnet: improving localization accuracy for object de- tection, in: Proceedings of the IEEE Conference on Computer Vision and Pat- tern Recognition, pp. 789–798, 2016.
[9] Gemma Roig_1;2 Xavier Boix_1;2 Horesh Ben Shitrit2 Pascal Fua2 “Conditional Random Fields for Multi-Camera Object Detection”1ETHZ, Zurich (Switzerland) 2EPFL, Lausanne (Switzerland)
[10] Navneet Dalal, Bill Triggs. Histograms of Oriented Gradients for Human Detection. Cordelia Schmid and Stefano Soatto and Carlo Tomasi. International Conference on Computer Vision.
[11] Ren, S., He, K., Girshick, R., Sun, J.: Faster R-CNN: Towards real-time object detection with region proposal networks. In: NIPS, 2015.
[12] Wei Liu1, Dragomir Anguelov2, Dumitru Erhan “SSD: Single Shot MultiBox Detector” UNC Chapel Hill 2Zoox Inc. 3Google Inc. 4University of Michigan, Ann-Arbor 1wliu@cs.unc.edu, 2drago@zoox.com.
[13] Joseph Redmon University of Washington pjreddie@cs.washington.edu Santosh Divvala Allen Institute for Artificial Intelligence” You Only Look Once: Unified, Real-Time Object Detection”
[14] Albert Soto i Serrano” YOLO Object Detector for Onboard Driving Images” , ESCOLA D’ENGINYERIA (EE), UNIVERSITAT AUTONOMA DE BARCELONA (UAB)
[15] Z. Shen and X. Xue. Do more dropouts in pool5 feature maps for better object detection. arXiv preprint arXiv:1409.6911, 2014.
[16] R. B. Girshick. Fast R-CNN. CoRR, abs/1504.08083, 2015.
[17] Geethapriya. S, N. Duraimurugan, S.P. Chokkalingam, International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-8, Issue-3S, February 2019.
Citation
Amandeep Kaur, Deepinder Kaur, "Yolo Deep Learning Model Based Algorithm for Object Detection," International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.174-178, 2020.
The role of Block-Chain in Cloud-based IoT solutions to build end-to-end automated and secured solutions
Research Paper | Journal Paper
Vol.8 , Issue.1 , pp.179-186, Jan-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i1.179186
Abstract
Block-Chain is referred as the list of transactions stored in multiple participating servers rather than on a central transaction server. Each and every participant in the Block-Chain network is granted access to an up-to-date copy of this encrypted catalog so they can read, write, and validate transactions. Block-Chains have recently gained a lot of attention in IoT solutions even though they are used mostly in the financial domain. Block-Chain can relatively support in accomplishing the vision of distributed IoT, facilitating transactions and coordination among interacting devices. The two technologies Block-Chain and IoT are used to build end to end automated and secured solutions. Internets of things (IoT) solutions are being effectively implemented in many different sectors, such as healthcare, warehousing, transportation, and logistics. Current unified, Cloud-based IoT solutions may not gauge and meet the network security defies faced by large-scale enterprises. The use of Block-Chain as a distributed catalog of transactions and peer-to-peer communication among contributing nodes can unravel such problems. This paper gives an idea of Block-Chain-enabled IoT solutions and shows how to use the Block-Chain platform for an IoT application in a multi partner environment.
Key-Words / Index Term
Cloud-based IoT; Network security; Block-Chain Services; Application Programming Interface; Messaging Protocol
References
[1] A. Ukil, S. Bandyopadhyay and A. Pal, "IoT-Privacy: To be private or not to be private," in Computer Communications Workshops (INFOCOM WKSHPS)”, IEEE Conference on, Toronto, 2014.
[2] Almutairi, A., Sarfraz, M., Basalamah, S., Aref, W., & Ghafoor, A.”A distributed access control architecture for cloud computing. IEEE Software”, vol:29, PP.36–44, 2012.
[3] Atzoria, L., Ierab, A., &Morabitoc, G.”The internet of things: A survey. Computer Networks”, vol:54, 2787–2805, 2010.
[4] Chen, M., Gonzalez, S., Zhang, Y., & Leung, V. “Multi-agent Itinerary planning in wireless sensor networks”. In ICST QShine,Spain, November 23–25, 2009.
[5] Chen, M., Wan, J., & Li, F. “Machine-to-machine communications: architectures, standards, and applications”. KSII Transactions on Internet and Information Systems, vol.6, PP-480–497, 2011.
[6] Chen, Z., Xia, F., Huang, T., Bu, F., & Wang, H. “A localization method for the internet of things. Journal of Supercomputing”, vol.633, issue.3, PP.657–674, 2011.
[7] COMSafety technical conference report: D4.6 “Report on Results of EU-US Cooperation Seventh Framework Programme Directorate-General for Communications Networks Content and Technology Smart Cities and Sustainability”, 2014.
[8] Corcoran, P. M. “ Cloud computing and consumer electronics: A perfect match or a hidden storm?”, IEEE Consumer Electronics Magazine, vol.1, PP-14–19.
[9] Das, ManikLal, "Privacy and Security Challenges in Internet of Things," Distributed Computing and Internet Technology, “11th International Conference, ICDCIT” PP. 33-48, 2015.
[10] Filipponi, L., Vitaletti, A., Landi, G., Memeo, V., Laura, G., &Pucci, P. “Smart city: An event driven architecture for monitoring public spaces with heterogeneous sensors. In Proceedings of 2010 Fourth International Conference on Sensor Technologies and Applications”, Venice, Italy, PP. 281–286, 2010.
[11] Ge, X., Huang, K., Wang, C.-X., Hong, X., & Yang, X. “Capacity analysis of a multi-cell multi-antenna cooperative cellular network with co-channel interference”. IEEE Transactions on Wireless Communications, vol.10, PP.3298–3309, 2011.
[12] Ge, Y., Lamont, L., &Villasenor, L.. Hierarchical OLSR-A scalable proactive routing protocol for heterogeneous Ad Hoc networks. In Proceedings of IEEE WiMob’05, Aug pp. 17–23, 2005.
[13] Gurumurthi, S. “Architecting storage for the cloud computing era”. IEEE Micro, vol.29, PP.68–71, 2009.
[14] H. Gross; M. Holbl, D. Slamanig, and R. Spreitzer, "Privacy-Aware Authentication in the Internet of Things, Cryptology and Network Security”. Springer International Publishing, 14th International Conference on Cryptology and Network Security, PP. 32-39, Morocco, 2015.
[15] Ho, G., Leung, D., Mishra, P., Hosseini, A., Song, D. and Wagner, D."Smart locks: Lessons for securing commodity internet of things devices," in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. PP.461–472, 2016
[16] Isaac, J. T., Zeadally, S., & Sierra, J. C. “A lightweight secure mobile payment protocol for vehicular ad-hoc networks(VANETs)”. Electronic Commerce Research, vol.12, issue.1, PP.97–123, 2012.
[17] J. Buchmann, "Introduction to cryptography.," Springer Science & Business Media, 2013.
[18] J. Gubbi, "Internet of Things (loT): A Vision Architectural Elements and Future Directions", Future Generation Computer Systems, vol. 29, issue. 7, pp. 1645-60, 2013.
[19] J. Zhou, R. Qingyang, Y. Qian, "A Scalable Vehicular Network Architecture for Traffic Information Sharing", IEEE JSAC., vol. 31, issue. 9, pp. 85-93, 2013.
[20] K. Mershad, H. Artail, "Finding a Star in a Vehicular Cloud", IEEE Intell. Trenso. Syst. Maa., vol. 5, no. 2, pp. 55-68, 2013.
[21] Karagiannis, G., Altintas, O., Ekici, E., Heijenk, G., Jarupan, B., Lin, K., et al. (2011). Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Communications Surveys and Tutorials, 13, 584–616.
[22] Kato, S., Sugawa, S., Tokuda, K., Matsui, T., &Fujii, H. “Vehicle control algorithms for cooperative driving with automated vehicles and inter vehicle communications”. IEEE Transactions on Intelligent Transportation Systems, vol.3, PP.155–161, 2002.
[23] M. Abuelela, S. Olariu, "Taking VANET to the Cloud", Proc. ACM MoMM vol.10, pp. 6-13, 2010.
[24] M. Amoozadeh et al.,, "Security vulnerabilities of connected vehicle streams and their impact on cooperative driving," IEEE Communications Magazine, vol. 53, issue. 6, pp. 126-132, 2015.
[25] Pallis, G. “Cloud computing: The new frontier of internet computing”. IEEE Internet Computing ‘14, PP.70–73,2010.
[26] S. Bitam, A. Merlouk, "ITS-Cloud: Cloud Computing for Intelligent Transportation System", Proc. IEEE Global Communications Conference. (GLOBECOM), pp.2054-59, 2012.
[27] S. Ziegler, C. Crettaz, "loT6 Project in a Nutshell the Future of Internet", Lecture Notes in Computer Science, vol. 7858, pp. 353-55, 2013.
[28] Sheth, A., &Ranabahu, A. “Semantic modeling for cloud computing”. IEEE Internet Computing, 14, pp.81–83, 2010.
[29] Skarmeta, AntonioF., JoseL. Hernandez-Ramos, and M. Moreno., "A decentralized approach for security and privacy challenges in the internet of things," internet of Things, IEEE World Forum on, 2014.
[30] Suo, H., Wan, J., Huang, L., &Zou, C. (2012). “Issues and challenges of wireless sensor networks localization in emerging applications”. Proceedings of 2012 International Conference on Computer Science and Electronic Engineering, pp. 447–451, Hangzhou, China, 2012.
[31] Takabi, H., Joshi, J. B. D., &Ahn, G. “Security and privacy challenges in cloud computing environments”. IEEE Security & Privacy, vol.8, pp.24–31, 2010.
[32] Wan, J., Zhang, D., Sun, Y., Lin, K., Zou, C., &Cai, “VCMIA: A novel architecture for integrating vehicular cyber-physical systems and mobile cloud computing”. ACM/SpringerMobile Networks and Applications, vol.19, issue.2, pp.153–160, 2015
[33] Y. Qian, N. Moayeri, "Desiqn of Secure and Application-Oriented VANETs", Proc. IEEE Vehicular Technology Coni., pp. 2794-99, 2008.
[34] Zhang, D., Wan, J., Liang, X., Guan, X., Liu, Q., &Ji, G. “Taxonomy of agent technologies for ubiquitous computing environments”. KSII Transactions on Internet and Information Systems, vol.6, issue.2, pp.547–565, 2012.
[35] B.Mukunthan, N.Nagaveni. “Identification of unique repeated patterns, location of mutation in DNA finger printing using artificial intelligence technique”. IJBRA, vol.10, issue.2, pp:157-176, 2014.
[36] B.Mukunthan, N.Nagaveni. “Automating Identification of Unique Patterns, Mutation in Human DNA using Artificial Intelligence Technique”. IJCA: vol.25, issue.2, pp:26-34, 2011.
[37] L.Jaya Singh Dhas , B.Mukunthan (2019). Kleinberg’s Hyper-Richness Based Fuzzy Partition Clustering for Efficient Bi-Temporal Data. IJITEE: 8(10):2422-2430
[38] K.G.Krishnakumar,B.Mukunthan(2016). Cross Layer Based Adaptive Routing Approach for VANET. IJCTA: 9(28):1-9.
[39] Macha Shanker, “Use Case: Smart Contract for Lease Agreements using Blockchain Technology”, Vol.7 , Issue.6 , pp.1-9, 2019.
[40] Lubdha M. Bendale, Roshani. Jain,Gayatri D. Patil “Study of Various Routing Protocols in Mobile Ad-Hoc Networks”, Vol.06, Special Issue.01, pp.1-5, 2018.
[41] B.Mukunthan, “Efficient Synergetic Filtering in Big Dataset Using Neural Network Technique”, International Journal of Recent Technology and Engineering”, Vol.8, Issue.5, 2020.
Citation
B. Mukunthan, S. Govindaraju, S.K. Komagal Yallini, S. VibinChander, C. RanjithKumar, "The role of Block-Chain in Cloud-based IoT solutions to build end-to-end automated and secured solutions," International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.179-186, 2020.
Deep Learning Approach for Pole like Road object Detection Using LiDAR–Orthophoto Fusion
Research Paper | Journal Paper
Vol.8 , Issue.1 , pp.187-190, Jan-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i1.187190
Abstract
With the growth of computer vision, digital image processing is necessary to provide a clear image to the user. In existing research detection of pole side objects with the help of an LiDar which only detect the object but not with clear transparency in proposed research we are try to give the clear vision of the pole side object with the help of fusion of LiDar and orthophoto and also improve the accuracy of an image.
Key-Words / Index Term
Digital image processing, image recognition, SVM, Accuracy, image enhancement, Machine learning, Histogram
References
[1] Li Yan et.al “Detection and classification of pole-like road objects from mobile LiDAR data in motorway environment”
[2] A. Jaakkola, J. Hyyppä, H. Hyyppä, A. Kukko, Retrieval algorithms for roadsurface modelling using laser-based mobile mapping, SENSORS-BASEL 8, 5238–524, 2008.
[3] Y. Yu, J. Li, H. Guan, C. Wang, Automated extraction of urban road facilities using mobile laser scanning data, IEEE Trans. Intell. Transp. 16, 2167 2181, 2015.
[4] Deep Learning Approach for Building Detection Using Orthophoto Journal of Sensors Volume 2018, Article ID 7212307.
[5] Bisheng Yang, Zhen Dong, Gang Zhao, Wenxia Dai ierarchical extraction of urban objects from mobile laser scanning data sISPRS Journal of Photogrammetry and Remote Sensing, Volume 99, pp. 45-57, 2015.
[6] Sheng Xu, Shanshan Xu, Ning Ye, Fa Zhu”Automatic extraction of street trees’ nonphotosynthetic components from MLS data”International Journal of Applied Earth Observation and Geoinformation, Volume 69, pp. 64-77, 2018.
[7] Haiyan Guan, Member, IEEE, Yongtao Yu, Jonathan Li, Senior Member, IEEE, and Pengfei Liu” Pole-Like Road Object Detection in Mobile LiDAR Data via Supervoxel and Bag-of-Contextual-Visual-Words Representation”
[8] Tee-Ann Teo, Chi-Min Chiu” Pole-Like Road Object Detection From Mobile Lidar System Using a Coarse-to-Fine Approach”IEEE Journal of Selected Topics in Applied Earth DOI:10.1109/JSTARS.2015.2467160, 2015.
[9] Zhizhong Kang ; Juntao Yang “Voxel-Based Extraction and Classification of 3-D Pole-Like Objects From Mobile LiDAR Point Cloud Data” IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, Volume: 11, Issue: 11 , Nov. 2018.
[10] Yongtao Yu” Automated Detection of Urban Road Manhole Covers Using Mobile Laser Scanning Data” IEEE Transactions on Intelligent Transportation Systems 16(6):1-12 • DOI: 10.1109/TITS.2015.2413812, April 2015.
[11] JaromírLanda” Detection of Pole-like Objects from LIDAR Data” Procedia - Social and Behavioral Sciences 220, 226 – 235, 2016.
[12] Celestino Ordóñez “Automatic Detection and Classification of Pole-Like Objects for Urban Cartography Using Mobile Laser Scanning Data” Sensors, 17, 1465; doi:10.3390/s17071465, 2017.
[13] F. Li a,b *, M. Lehtomäki b, S. Oude Elberink a , G. Vosselman a , E. Puttonen b, A. Kukko b , J. Hyyppä b” POLE-LIKE ROAD FURNITURE DETECTION IN SPARSE AND UNEVENLY DISTRIBUTED MOBILE LASER SCANNING DATA” ISPRS Annals of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Volume IV-2, 2018
[14] M. Neubert a, *, R. Hecht a, C. Gedrange a, M. Trommler b, H. Herold a, T. Krüger a, F. Brimmer c” EXTRACTION OF RAILROAD OBJECTS FROM VERY HIGH RESOLUTION HELICOPTER-BORNE LIDAR AND ORTHO-IMAGE DATA”
[15] https://articles.extension.org/pages/40026/what-is-an-orthophoto
[16] https://www.photomapping.com.au/digital-orthophoto
[17] https://www.elprocus.com/lidar-light-detection-and-ranging-working-application/
Citation
Payal, Rasneet Kaur, "Deep Learning Approach for Pole like Road object Detection Using LiDAR–Orthophoto Fusion," International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.187-190, 2020.
Drought Forecasting, using Artificial Neural Network (ANN) and Predict Values of Drought Condition Derived using NDVI Data
Research Paper | Journal Paper
Vol.8 , Issue.1 , pp.191-193, Jan-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i1.191193
Abstract
This paper focuses on drought forecasting, using Artificial Neural Network (ANN) and predicts the values of drought condition derived using Remote Sensing data of Indore (M.P). We have used the NDVI data as input data of ANN model for drought forecasting, and determine Standard Vegetation Index (SNDVI). Artificial Neural networks operate on the principle of learning from a training set. There is a large variety of neural network models and learning procedures. Two classes of neural networks that are usually used for prediction applications are feed-forward networks and recurrent networks. They often train both of these networks using back-propagation algorithm.
Key-Words / Index Term
Data Source, Artificial Neural Network.
References
[1]. Bankert, R. L.: Cloud classification of AVHRR Imagery in maritime regions using a probabilistic neural network, J. Appl. Meteorol., 33, pp.909 – 918, 1994.
[2]. Crippen, Robert E.: Calculates the vegetation index faster. Remote Sensing of Environment, Vol.34, Issue.1, pp.71 – 73, 1990.
[3]. Marzban, C. and Stumpf, G. J.: A neural network for tornado prediction based on Doppler radar-derived attributes. J. Appl. Meteor., Vol.35, pp.617–626, 1996.
[4]. Mu¨ller, B., and Reinhardt, J.: Neural Networks: An Introduction, the Physics of Neural Networks Series, Springer-Verlag, 2, pp.266, 1991.
[5]. Sellers, P. J.: Canopy reflectance, photosynthesis and transpiration, International Journal of Remote Sensing, 6: 8, pp.1335-1372, 1985.
Citation
Rajesh Kumar Sharma, Mayank Rajput, Rahul Sharma, "Drought Forecasting, using Artificial Neural Network (ANN) and Predict Values of Drought Condition Derived using NDVI Data," International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.191-193, 2020.