Innovative Engineering with AI Applications by unknow
Author:unknow
Language: eng
Format: epub
Publisher: Wiley-Scrivener
Published: 2023-08-01T00:00:00+00:00
Note
*Corresponding author: [email protected]
7
Improvement of Computer Vision-Based Elephant Intrusion Detection System (EIDS) with Deep Learning Models
Jothibasu M.*, Sowmiya M., Harsha R., Naveen K. S. and Suriyaprakash T. B.
Department of ECE, PSG Institute of Technology and Applied Research, Coimbatore, India
Abstract
The expanding need of wild life behavior and partition of human-wild life strife has guided the researchers to the execution of counteraction and alleviation draws near. The division of boondocks grounds and separation of elephant populaces moves toward the essential driver of Human Elephant Collision (HEC). Human-elephant strife is a troublesome issue since which prompts to territory misfortune, destruction of agribusiness zones, environment misfortune. This demands an intelligent system which predicts and rest the conflict. In this work, Artificial Intelligent based device is developed to detect the presence of elephant into residential areas and provides a warning to the forest rangers. In this counterfeit intelligent gadget, the identification part comprises of the PIR sensor and seismic sensor. Both of the sensor yields trigger the camera module associated with the model created. The camera module catches a video for a specific span which may contain the nearness of the animal. At that point, the recordings are been coordinated to the trained AI algorithm. The AI algorithm forms the video in the succession of the casing and once if the presence of an elephant is available in the video, it triggers the cautioning system. An SSD, YOLO, and Faster RCNN algorithm has been accomplished to locate the ideal one. The model builds up a broad item to distinguish an economical arrangement.
Keywords: Deep learning, human elephant conflict, PIR sensor, YOLO, Faster RCNN
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Mikado Method by Ola Ellnestam Daniel Brolund(20974)
Hello! Python by Anthony Briggs(20252)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(18613)
Dependency Injection in .NET by Mark Seemann(18408)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(17931)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(17690)
Kotlin in Action by Dmitry Jemerov(17588)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16939)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(16508)
Grails in Action by Glen Smith Peter Ledbrook(15651)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(13464)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(11540)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10582)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(10484)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(9519)
Hit Refresh by Satya Nadella(9090)
The Kubernetes Operator Framework Book by Michael Dame(8527)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8350)
Robo-Advisor with Python by Aki Ranin(8296)