Pub Date : 2023-04-11DOI: 10.1109/ICOEI56765.2023.10125693
B. Masram, Aakansha Nimje, Arpita Raut, Neha Mehatre, Sayli Humane
In India, due to the negligence of the legal systems, transporters loaded the goods vehicles with weights far above the permissible limit. Overloaded vehicles cause extensive road damage and enormous economic losses to society, seriously threatening road safety. Due to overloading, many people lose their lives in accidents, and vehicle fuel consumption increases, resulting in environmental pollution. To create a workable, effective system for the Regional Transport Office department and to generate, and manipulate fines. The proposed system has given the count of incoming and departing passengers which has become a feasible, efficient technique in any Regional Transport Office department. The IOT system has used the Node MCU model in proposed system for the efficient work of the system
{"title":"IoT based Overload Detection System in Public Transportation Vehicles","authors":"B. Masram, Aakansha Nimje, Arpita Raut, Neha Mehatre, Sayli Humane","doi":"10.1109/ICOEI56765.2023.10125693","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125693","url":null,"abstract":"In India, due to the negligence of the legal systems, transporters loaded the goods vehicles with weights far above the permissible limit. Overloaded vehicles cause extensive road damage and enormous economic losses to society, seriously threatening road safety. Due to overloading, many people lose their lives in accidents, and vehicle fuel consumption increases, resulting in environmental pollution. To create a workable, effective system for the Regional Transport Office department and to generate, and manipulate fines. The proposed system has given the count of incoming and departing passengers which has become a feasible, efficient technique in any Regional Transport Office department. The IOT system has used the Node MCU model in proposed system for the efficient work of the system","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127190235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-11DOI: 10.1109/ICOEI56765.2023.10125610
M. Sohaib, V. Aarthi, M. N. Laxmi, G. G. Shivaji, T. A. Kumar, M. Ramesh
In this work, RFID (Radio Frequency Identification Device) labels are used to create electronic transportation tickets for the public transportation system. Transport systems with cutting-edge innovations like RFID, IoT, and GPS will eventually gain popularity due to their advantages of greater comfort and higher ethical standards as compared to traditional transport systems or paper ticketing systems. In the proposed approach, the passenger is automatically identified by using their RFID card, and the fare according to the distance travelled by the passenger is automatically subtracted from the RFID card. GPS and RFID tags are used to increase the precision of fare calculation and passenger identification. The RFID system can replace conventional paper-based tickets since they are better because they are reusable and offer improved accuracy. This eliminates the outdated paper-based bus booking system and guards against money laundering and corruption. RFID tags are used as reusable tickets that calculate the fee based on the user's GPS-measured distance travelled. By using this system, human errors and effort are reduced.
{"title":"IoT-based Web Application for Passenger Travel Tracking System","authors":"M. Sohaib, V. Aarthi, M. N. Laxmi, G. G. Shivaji, T. A. Kumar, M. Ramesh","doi":"10.1109/ICOEI56765.2023.10125610","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125610","url":null,"abstract":"In this work, RFID (Radio Frequency Identification Device) labels are used to create electronic transportation tickets for the public transportation system. Transport systems with cutting-edge innovations like RFID, IoT, and GPS will eventually gain popularity due to their advantages of greater comfort and higher ethical standards as compared to traditional transport systems or paper ticketing systems. In the proposed approach, the passenger is automatically identified by using their RFID card, and the fare according to the distance travelled by the passenger is automatically subtracted from the RFID card. GPS and RFID tags are used to increase the precision of fare calculation and passenger identification. The RFID system can replace conventional paper-based tickets since they are better because they are reusable and offer improved accuracy. This eliminates the outdated paper-based bus booking system and guards against money laundering and corruption. RFID tags are used as reusable tickets that calculate the fee based on the user's GPS-measured distance travelled. By using this system, human errors and effort are reduced.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129195996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-11DOI: 10.1109/ICOEI56765.2023.10125901
K. R. Ramkumar, Taniya Hasija, Bhupendra Singh, Amanpreet Kaur, S. Mittal
Every organization's primary concern is security. A cryptography method will remain safe in the system if the key is not cracked by a hacker through any kind of attacks. A conventional cryptography algorithm's strength relies on the key size and structure. Cryptography algorithms can be susceptible to brute force attacks since their keys have fixed lengths. The advantage of having a variable length key is leveraged to mitigate key-Size based attacks by using polynomials. This article outlines an algorithm for generating and maintaining the keys based on the polynomials and interpolation.
{"title":"Key Generation using Curve Fitting for Polynomial based Cryptography","authors":"K. R. Ramkumar, Taniya Hasija, Bhupendra Singh, Amanpreet Kaur, S. Mittal","doi":"10.1109/ICOEI56765.2023.10125901","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125901","url":null,"abstract":"Every organization's primary concern is security. A cryptography method will remain safe in the system if the key is not cracked by a hacker through any kind of attacks. A conventional cryptography algorithm's strength relies on the key size and structure. Cryptography algorithms can be susceptible to brute force attacks since their keys have fixed lengths. The advantage of having a variable length key is leveraged to mitigate key-Size based attacks by using polynomials. This article outlines an algorithm for generating and maintaining the keys based on the polynomials and interpolation.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131337440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-11DOI: 10.1109/ICOEI56765.2023.10125963
Josephine Selle Jeyanathan, B. Veerasamy, B. Medha, G. V. Sai, R.Bharath Kumar, Varsha Sahu
Agriculture is one of the key drivers of Indian economy. The primary problem now confronting Indian farmers is that farmers don't choose the right crop based on their land requirements. A significant decline in production is seen as a result. Precision agriculture will provide the farmers with a solution to this problem. To suggest the optimal crop to farmers based on site-specific criteria, precision agriculture uses research data on soil types, features, and crop yields. With the help of an intelligent system, this study aims to help Indian farmers increase crop productivity by selecting the right type of soil. The proposed prototype considers soil characteristics, such as pH value, soil temperature, and soil moisture, as well as environmental factors, such as humidity, as inputs to the machine learning algorithm for decision-making. The output is integrated with the web program known as proteus. The entire prototype is designed using STM32 ARM Processor and simulated using proteus, and the same is implemented using the Nucleo board by integrating the humidity, pH, and temperature sensors for collecting the input data. The result of the prototype is also displayed in the Blynk app as well as the LCD display, where the system recommends the appropriate crop.
{"title":"Design of Crop Recommender System using Machine Learning and IoT","authors":"Josephine Selle Jeyanathan, B. Veerasamy, B. Medha, G. V. Sai, R.Bharath Kumar, Varsha Sahu","doi":"10.1109/ICOEI56765.2023.10125963","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125963","url":null,"abstract":"Agriculture is one of the key drivers of Indian economy. The primary problem now confronting Indian farmers is that farmers don't choose the right crop based on their land requirements. A significant decline in production is seen as a result. Precision agriculture will provide the farmers with a solution to this problem. To suggest the optimal crop to farmers based on site-specific criteria, precision agriculture uses research data on soil types, features, and crop yields. With the help of an intelligent system, this study aims to help Indian farmers increase crop productivity by selecting the right type of soil. The proposed prototype considers soil characteristics, such as pH value, soil temperature, and soil moisture, as well as environmental factors, such as humidity, as inputs to the machine learning algorithm for decision-making. The output is integrated with the web program known as proteus. The entire prototype is designed using STM32 ARM Processor and simulated using proteus, and the same is implemented using the Nucleo board by integrating the humidity, pH, and temperature sensors for collecting the input data. The result of the prototype is also displayed in the Blynk app as well as the LCD display, where the system recommends the appropriate crop.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":" 13","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113950616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-11DOI: 10.1109/ICOEI56765.2023.10125873
V. Rafi, Sharief Nadendla, V. Nayak, K.Venkata Naga Sai Reddy, G.UmeshSai Kumar, A. Maniteja
In this research work.the formulation and reorganization of RDN is detailed using loop matrix. The analytical method of determining optimal reorganization consumes more computation time. The computation time increases with number of buses inthe system. So, an optimization algorithm is needed for finding the optimal reorganization of the radial distribution system. The major objective of the optimal reorganization is the minimizing the losses of the network. The optimization algorithms which are used in this article are Genetic Algorithm, Particle Swarm Optimization. In this article, the metaheuristic method is used for optimal reorganization. The organic optimization technique like PSOalgorithm is used for reorganization. The reorganisation issue is explored and examined in the presence and absence of the optimisation approach in a conventional large-scale 119 node network in different circumstances. The acquired findings are then compared.
{"title":"Minimization of Losses in 119 Bus Radial Distribution Network using PSO Algorithm","authors":"V. Rafi, Sharief Nadendla, V. Nayak, K.Venkata Naga Sai Reddy, G.UmeshSai Kumar, A. Maniteja","doi":"10.1109/ICOEI56765.2023.10125873","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125873","url":null,"abstract":"In this research work.the formulation and reorganization of RDN is detailed using loop matrix. The analytical method of determining optimal reorganization consumes more computation time. The computation time increases with number of buses inthe system. So, an optimization algorithm is needed for finding the optimal reorganization of the radial distribution system. The major objective of the optimal reorganization is the minimizing the losses of the network. The optimization algorithms which are used in this article are Genetic Algorithm, Particle Swarm Optimization. In this article, the metaheuristic method is used for optimal reorganization. The organic optimization technique like PSOalgorithm is used for reorganization. The reorganisation issue is explored and examined in the presence and absence of the optimisation approach in a conventional large-scale 119 node network in different circumstances. The acquired findings are then compared.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"49 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114027907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-11DOI: 10.1109/ICOEI56765.2023.10125744
V. Praveena, A. S., Anu Sankari S, Girija K, Kirthivarsini M
Automated teller machines (ATMs) are utilizedby almost everyone today. Due to the inconvenience of carrying an ATM card everywhere, people might forget to bring their card or PIN code. The ATM card could be broken, whichwould restrict the user from having access to theirmoney. An actual security solution is offered in this proposal. Technologies like Face recognition and Mobile app confirmation to increase the security of accounts and the privacy of users are included. When a user attempts to make a transaction after having their face recorded and stored in the bank's database, the system performs face detection using the A TM’ s camera and performs user face verification. If the invalid user needs to continue the transaction process, the OTP authentication should be made by the valid user in the Mobile application, so that the unauthorized person would continue the transaction.
{"title":"Face Detection based Secured ATM System with Two Step Verification using Fisher Face Method","authors":"V. Praveena, A. S., Anu Sankari S, Girija K, Kirthivarsini M","doi":"10.1109/ICOEI56765.2023.10125744","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125744","url":null,"abstract":"Automated teller machines (ATMs) are utilizedby almost everyone today. Due to the inconvenience of carrying an ATM card everywhere, people might forget to bring their card or PIN code. The ATM card could be broken, whichwould restrict the user from having access to theirmoney. An actual security solution is offered in this proposal. Technologies like Face recognition and Mobile app confirmation to increase the security of accounts and the privacy of users are included. When a user attempts to make a transaction after having their face recorded and stored in the bank's database, the system performs face detection using the A TM’ s camera and performs user face verification. If the invalid user needs to continue the transaction process, the OTP authentication should be made by the valid user in the Mobile application, so that the unauthorized person would continue the transaction.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124023633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
One of the way to think of railway signalling systems is as a collection of intricate systems that work together to control, supervise and safeguard railway operations. When there is a problem with the railway signalling system other safety measures are put in a place to keep the train running like slowing down, with the driver being responsible for keeping the train safe. In a nutshell, issues with the railway's capacity and safety result from malfunctions in the signalling system. A railway signalling system can be considered a group of complex systems that work together to provide control, supervision and protection of railway operations. The principles upon which railway signalling systems operate are extremely intricate. A railway scheduling algorithm can be used to optimize the train schedule, to minimize delays and traffic. The performance of the system is improved by optimizing the code running on the Arduino UNO. This minimizes memory usage, simplifying code and optimizing data processing methods.
{"title":"Railway Signalling System using Encoder and Decoder","authors":"M. Ghute, Ajinkya Barhate, Swejal Dhengle, Yachana Bakal, Sharwari Kawale, Devichand Rathod","doi":"10.1109/ICOEI56765.2023.10125937","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125937","url":null,"abstract":"One of the way to think of railway signalling systems is as a collection of intricate systems that work together to control, supervise and safeguard railway operations. When there is a problem with the railway signalling system other safety measures are put in a place to keep the train running like slowing down, with the driver being responsible for keeping the train safe. In a nutshell, issues with the railway's capacity and safety result from malfunctions in the signalling system. A railway signalling system can be considered a group of complex systems that work together to provide control, supervision and protection of railway operations. The principles upon which railway signalling systems operate are extremely intricate. A railway scheduling algorithm can be used to optimize the train schedule, to minimize delays and traffic. The performance of the system is improved by optimizing the code running on the Arduino UNO. This minimizes memory usage, simplifying code and optimizing data processing methods.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"70 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128002528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-11DOI: 10.1109/ICOEI56765.2023.10125931
U. R. Babu, Tarun Gehlot, S. Thenmozhi, S. Chandre, A. Ravitheja, A. Gopi
Cracks in concrete allow aggressive chemicals to enter the reinforcement and cause corrosion, affecting reinforced concrete longevity. Crack identification is crucial to damage assessment. Visual examination is the most common concrete infrastructure monitoring method. Inspectors visually estimate flaws using skill, engineering judgment, and experience. However, this process is subjective, time-consuming, and requires access to numerous challenging structures. One progress hinges on improving or combining conventional digital image processing methods. Deep learning (DL) methods like CNN can now overcome image processing's crack detection limitations. This study introduces the Real-Time Building Crack Visual Measurement System utilizing Metaheuristics with Deep Learning (RBCVMS-MDL) model. RBCVMS-MDL detects construction cracks using DL principles. Three main steps are involved in RBCVMS-MDL. First, ResNet is used to build feature vectors. Salp Swarm Algorithm (SSA) also tunes ResNet method hyperparameters Finally, Radial Basis Function (RBF) can detect and classify cracks. RBCVMS-MDL outperforms other methods in crack image dataset performance validation.
{"title":"Real Time Building Crack Visual Measurement System using Metaheuristics with Deep Learning Model","authors":"U. R. Babu, Tarun Gehlot, S. Thenmozhi, S. Chandre, A. Ravitheja, A. Gopi","doi":"10.1109/ICOEI56765.2023.10125931","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125931","url":null,"abstract":"Cracks in concrete allow aggressive chemicals to enter the reinforcement and cause corrosion, affecting reinforced concrete longevity. Crack identification is crucial to damage assessment. Visual examination is the most common concrete infrastructure monitoring method. Inspectors visually estimate flaws using skill, engineering judgment, and experience. However, this process is subjective, time-consuming, and requires access to numerous challenging structures. One progress hinges on improving or combining conventional digital image processing methods. Deep learning (DL) methods like CNN can now overcome image processing's crack detection limitations. This study introduces the Real-Time Building Crack Visual Measurement System utilizing Metaheuristics with Deep Learning (RBCVMS-MDL) model. RBCVMS-MDL detects construction cracks using DL principles. Three main steps are involved in RBCVMS-MDL. First, ResNet is used to build feature vectors. Salp Swarm Algorithm (SSA) also tunes ResNet method hyperparameters Finally, Radial Basis Function (RBF) can detect and classify cracks. RBCVMS-MDL outperforms other methods in crack image dataset performance validation.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116903594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-11DOI: 10.1109/ICOEI56765.2023.10125700
S. S, Sarang Dileep, Rahan Manoj, Adarsh M, Sandhya Harikumar
In this study, we compare various data visualization methods for exploring a complicated network dataset containing details on illnesses, symptoms, and safety measures. The dataset was obtained from Kaggle and split into train and test subsets at a 4:1 ratio. It has 269 nodes and 483 edges. To evaluate the network data, we used Neo4j and Gephi, two data visualization tools. The dataset was queried and visually analyzed using Neo4j, and graphical representations of the network were produced using Gephi. We tested the potency of different visualization methods for finding patterns and correlations in the data, including force-directed layouts, node-link diagrams, and matrix views. Moreover, Neo4j's querying capabilities allowed us to analyze sub-networks and their connections in greater detail. Overall, our study shows the value of using a variety of visualization methods to have a deeper understanding of complicated network data. Researchers, medical experts, and public health officials attempting to comprehend and manage illness linkages will find the findings of this study to be quite insightful.
{"title":"Comparing the Effectiveness of Data Visualization Techniques for Discovering Disease Relationships in a Complex Network Dataset","authors":"S. S, Sarang Dileep, Rahan Manoj, Adarsh M, Sandhya Harikumar","doi":"10.1109/ICOEI56765.2023.10125700","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125700","url":null,"abstract":"In this study, we compare various data visualization methods for exploring a complicated network dataset containing details on illnesses, symptoms, and safety measures. The dataset was obtained from Kaggle and split into train and test subsets at a 4:1 ratio. It has 269 nodes and 483 edges. To evaluate the network data, we used Neo4j and Gephi, two data visualization tools. The dataset was queried and visually analyzed using Neo4j, and graphical representations of the network were produced using Gephi. We tested the potency of different visualization methods for finding patterns and correlations in the data, including force-directed layouts, node-link diagrams, and matrix views. Moreover, Neo4j's querying capabilities allowed us to analyze sub-networks and their connections in greater detail. Overall, our study shows the value of using a variety of visualization methods to have a deeper understanding of complicated network data. Researchers, medical experts, and public health officials attempting to comprehend and manage illness linkages will find the findings of this study to be quite insightful.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114658125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-11DOI: 10.1109/ICOEI56765.2023.10125764
Sonia Setia, A. Shukla, Amartya Raj, Abhimanyu Rathore
Nowadays., object detection has become very crucial in the area of computer vision. Many day-to-day activities require the use of technology that can help in vigilance such as traffic rules violations., road safety., etc. The detection techniques work on the images or videos and act as a model that provide the required area of interest from that input media. To solve these existing problems., different algorithms are available to perform object detection. This study focuses on reviewing the available algorithms to assist in the detection of object based on time and accuracy. The end result will help to identify the best available algorithm that can achieve faster object detection. The algorithms taken for the review process are CNN (Convolutional Neural Networks)., RCNN., Fast CNN., Faster RCNN., Single shot., YOLO (You Only Look Once).
{"title":"A Detailed Review on Object Detection Algorithms","authors":"Sonia Setia, A. Shukla, Amartya Raj, Abhimanyu Rathore","doi":"10.1109/ICOEI56765.2023.10125764","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125764","url":null,"abstract":"Nowadays., object detection has become very crucial in the area of computer vision. Many day-to-day activities require the use of technology that can help in vigilance such as traffic rules violations., road safety., etc. The detection techniques work on the images or videos and act as a model that provide the required area of interest from that input media. To solve these existing problems., different algorithms are available to perform object detection. This study focuses on reviewing the available algorithms to assist in the detection of object based on time and accuracy. The end result will help to identify the best available algorithm that can achieve faster object detection. The algorithms taken for the review process are CNN (Convolutional Neural Networks)., RCNN., Fast CNN., Faster RCNN., Single shot., YOLO (You Only Look Once).","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125262452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}