IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 8 - Issue 11, November 2019 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Spider Bite Detector System Using Faster R Cnn

[Full Text]

 

AUTHOR(S)

R.Sathya,S.M.K.Shyaam,M.Karthikeyan,V.S.Vishal

 

KEYWORDS

Camera detection, Faster R CNN, Z buffer method

 

ABSTRACT

The spider will bite sometimes only. When it does the device will detect whether the spider is poisonous or not. It is much more efficient than a human eye and less time consuming. Such a device has never been done before and it could save life as approximately 7 people die each year due to the spider bite.In this most of them are small children attacked mainly by the brown reclusive spider which attracts small children. This will help the user to tell them which spider had bitten and anfirst aid remedy will be shown to prevent it for the time being. We also scan the depth of the wound to tell about the bitten area is poisonous or not.In this we have used the faster region convolutional neural network Faster R CNN algorithm.Then to get the accurate results of the bitten area. We use the Z buffer or depth buffer method. This will help to perform the required action to get the results easily. We have successfully done the required experiments to train the system and perform well. Our method of detection is done by the size of the wound.

 

REFERENCES

[1] R. Soobhany, K. P. Lam, P. Fletcher and D. Collins, "Source identification of camera phones using SVD," 2013 IEEE International Conference on Image Processing, Melbourne, VIC, 2013, pp. 4497-4501.
[2] doi: 10.1109/ICIP.2013.6738926
[3] Y. Liu, "An Improved Faster R-CNN for Object Detection," 2018 11th International Symposium on Computational Intelligence and Design (ISCID), Hangzhou, China, 2018, pp. 119-123.
[4] doi: 10.1109/ISCID.2018.10128
[5] S. M. Abbas and D. S. N. Singh, "Region-based Object Detection and Classification using Faster R-CNN," 2018 4th International Conference on Computational Intelligence & Communication Technology (CICT), Ghaziabad, 2018, pp. 1-6.
[6] doi: 10.1109/CIACT.2018.8480413
[7] Eggert, S. Brehm, A. Winschel, D. Zecha and R. Lienhart, "A closer look: Small object detection in faster R-CNN," 2017 IEEE International Conference on Multimedia and Expo (ICME), Hong Kong, 2017, pp. 421-426.
[8] doi: 10.1109/ICME.2017.8019550
[9] Li-An Tang and T. S. Huang, "An efficient hidden-line removal method based on Z-buffer algorithm," Proceedings of 1st International Conference on Image Processing, Austin, TX, 1994, pp. 657-660 vol.1.
[10] doi: 10.1109/ICIP.1994.413396
[11] Cozzolino and L. Verdoliva, "Camera-based Image Forgery Localization using Convolutional Neural Networks," 2018 26th European Signal Processing Conference (EUSIPCO), Rome, 2018, pp. 1372-1376.
[12] doi: 10.23919/EUSIPCO.2018.8553581 Tuama, F. Comby and M. Chaumont, "Camera model identification with the use of deep convolutional neural networks," 2016 IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, 2016, pp. 1-6.
[13] doi: 10.1109/WIFS.2016.7823908
[14] K. He, X. Zhang, S. Ren and J. Sun, "Deep Residual Learning for Image Recognition," 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, 2016, pp. 770-778.
[15] doi: 10.1109/CVPR.2016.90
A. Tuama, F. Comby and M. Chaumont, "Camera model identification with the use of deep convolutional neural networks," 2016 IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, 2016, pp. 1-6.
[16] doi: 10.1109/WIFS.2016.7823908
[17] S. Ren, K. He, R. Girshick and J. Sun, "Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 39, no. 6, pp. 1137-1149, 1 June 2017.
[18] doi: 10.1109/TPAMI.2016.2577031