• Nu S-Au Găsit Rezultate

View of Creature Face Recognition Using Neural Networks

N/A
N/A
Protected

Academic year: 2022

Share "View of Creature Face Recognition Using Neural Networks"

Copied!
12
0
0

Text complet

(1)

Creature Face Recognition Using Neural Networks

Rishab Mathur,

Computer Science and Engineering, SRM Institute of Science and Technology, Kattankulathur, [email protected]

PriyalRaizada,

Computer Science and Engineering, SRM Institute of Science and Technology, Kattankulathur, [email protected]

Dr. K Sree Kumar,

Asst. professor, Computer Science and Engineering, SRM Institute of Science and Technology, Kattankulathur

[email protected]

Mr. SibiAmaran

Asst. professor, Computer Science and Engineering, SRM Institute of Science and Technology, Kattankulathur,

[email protected]

ABSTRACT

A problem that developed areas are facing today are death and injuries due to road accidents.

Collision between animals and the vehicle on the drive way is one such big issue apart from other issues such as vehicle over- speeding, drunk driving and abrupt lane changes and others which leads to such road accidents. Neural networks (NN) have developed dramatically successful methods to solve prediction problems like, object recognition which often surpasses accuracy of human level. We will work on an algorithm which automatically extract features from images and use them in training process. The dataset used consists of different images, where 70% images will be used for training and 30% images for testing. We successfully received a training set accuracy of 0.9 and test set accuracy of 0.88.

Keywords

Vectorization, Logistic Regression Cost Function, Gradient Descent, Image processing, Neural Networks, Forward Propagation,Backward Propagation.

Introduction

Today, there is no single method that can provide reliable and effective solutions for all problems, and animal detection and identification systems are still a challenge. Cutting down of trees and limited source of natural prey and loss of habitat makes the wild animals to

(2)

maintain close contact with prey in urban settlements. Cows and other animals attack humans to obtain food. Compared with other tigers, the occurrence of elephants is a major form of conflict and is vital to human life in India. Owing to conflicts between humans and animals, population increase, the rapid development of industries in forest lands, people began to cut down forests. Consequently, animals began to invade nearby villages, losing their livelihoods and drought. Crazy, pretending to feed on crops, livestock, and a lot of times on farmland and people. Nowadays, farmers started to use electric fences to protect the fields from wild animals, so as not to cause seizures due to electric current. Make it behave abnormally. The prime concern is the safety of animals and humans, equally. To tackle this hinderance, a smart surveillance system is highly required, which will precisely track and detect incoming animal images and alert people.

Many methods include communication devices that use IoT for animal intrusion detection, detection equipment, take preparatory actions, distract animals, and send alerts to land owners or nearby forest facilities. Numerous methods and algorithms have been tested and deployed to improve protection against animal intrusion. The purpose of this project is to design an image recognition system using NN to prevent unauthorized breach of animals in restricted area.

Literature Review

Literature research is one of the main components of any research work. In Internet of Things (IoT) applications based on wired and wireless sensors, different methods are used to track, monitor and detect animals in different situations. Saieshwarproposed an animal intrusion detection system based on machine learning and image processing. Used a pool algorithm to segment the animal image in order to highlight multiple objects in the image and check whether a threatening animal is found in the segmentation. If the marked area encounters a different mark, the obstacle is only the outline. When extracting a series of text’s to detect facial expressions of different frequencies, Gabor filters are often used. Linear support vector machine is a supervised learning algorithm which is used to train data sets and classify the text and hypertext. The average value of this method of detecting animal invasion is about 54.32%.

Xiaoyuanproposed an automatic species identification system, which uses the local feature known as local binary pattern (LBP) constructed in the cell and dense global scale feature

(3)

transformation invariant (SIFT descriptor) for feature extraction and improvisation creation, sparse coding, spatial pyramid mapping to extract dense SIFT and LBP descriptors with cell structure as a local object. This global feature uses a multi-scale heap to produce the largest combination and weighted sparse coding. In complicated situations. Usha proposed an animal intrusion detection system based on the Internet of Things. Passive Infrared Sensor (PIR) identifies the movements and activates the camera to take snapshots of animals. After the animal detects the sensor, that signal is transmitted to the camera using the Arduino Uno micro controller. That specific image is classified along with the sample. The images are stored in the database. While identifying an animal such as a giraffe, the bright light emitted will be used, and when identifying a tiger, a loud sound will be used. As a result, forest officials were warned through text messages and were also sent to and owners through the GSM module.

Fig.1 Architecture diagram of methodology used

Proposed System

Machine learning is the study of algorithms that improve over time. Formally speaking, the task has improved in terms of performance and experience. This is a sub-theme of artificial intelligence. When AI participates in intelligent tasks performed by non-human agents, machine learning will make decisions based on the data it receives. Machine learning is a very broad field of computing. Machine learning can be supervised or unsupervised.

(4)

Fig.2 Proposed System

The models that have been shortlisted to be worked upon are:

3.1 Vectorization

It is the art of getting rid of explicit for loops in your algorithm while using arrays. Vectorizing your loops into arrays also help in optimizing Space Complexity.

Example:

Dot product used in our algorithm z=0

for i in range(n):

z = z + w[i]**[i]

z = z + b

After vectorization:

z = np.dot(w,x) + b

Dot product of vectors is known as scalar products because the result is a single output.

3.2 Logistic Regression Cost Function

Logistic Regression is a learning algorithm that is used when the output labels(Y) in a supervised learning algorithm are 1 or 0. Loss Function is applied to a single training example Cost Function is known as the cost of your parameters, which mans that is minimizes the overall cost function, it also lets us know that how well are we doing in our training set.

(5)

3.3 Gradient Descent

Gradient descent is an optimization algorithm which helps us find the local minima of a differentiable function by taking repeated steps in opposite direction to the gradient of the function at the current point

Gradient Descent algorithm:

Repeat until convergence {

Oj := Oj – x(d/dOj) J(Oo,O1) }

for j=0 and j=1

If the learning rate of the Gradient descent algorithm is very large then we would get a very aggressive descent procedure and it might even jump or overshoot the local optima. If the learning rate is too small then it may even fail to converge due to very small descent steps.

Fig.3 Reshaped Image Vector 3.4 Neural Networks

Neural Networks are a series of algorithms, Neural Networks is an essential AI learning algorithm that tries to mimic the human brain by recognizing underlying patterns and relations in a set of data, it tries to function similar to the human brain. Neural Networks are a system of Neurons either organic or Artificial in nature. Neural Networks can adapt to changing input so the network generates the best possible result without needing to redesign the output criteria.

Two main functions would take place in our models Neural Network:

(6)

1.Forward Propagation 2.Backward Propagation

Fig.4 Structure of Neutral Networks

3.4.1. Forward Propagation

The input is forwarded through the network, and each of the hidden layers receives the input, processes it according to the trigger function, and then goes to the next level. The output of the current layer is accepted as in input of the next layer, here we are going to use certain activation functions:

1.Sigmoid Activation Function:

The sigmoid activation function, also known as the logistic function, it is a very trending and desired activation function when it comes to neural networks. The output of this function is transformed into a value between 0.0 and 1.0.

(7)

2.Tanh Activation Function

Tanh is also sigmoidal, The advantage is that the negative inputs will be mapped strongly negative and the zero inputs will be mapped near zero in the tanh graph.

3.ReluL Activation Function

The rectified linear activation function or ReluL for short is a piecewise linear function that will output the input directly if it is positive, otherwise, it will output zero.

Fig.5 Activation Function Graphs

Fig.6 Activation Functions

3.4.2 Backward Propagation

Backpropagation is a monitored learning algorithm used to monitor multilayers (artificial neural networks. In a neural network we initialize some random weights at the beginning of the algorithm, but just in case those weight values do not fit our model and the output is not

(8)

what we want it to be. In order to reduce the error occurred we need to help our model change those initial parameters and weight values in order to minimize the error. This way to train our model is known as Backward propagation

Implementation

We first take the dataset of images and split it into training and test sets ith class labels as 1 and 0 for cats and not cats respectively. We then break the images into image vectors RGB of shape (255,255,255) and then combine all of them into a single image vector. The single image vector is fed as input to the 1st neural network layer the output of which passes through a activation function (ReluL/tanh), the output of the 1st neural layer becomes the input to the 2nd layer and so on, this process is known as Forward Propagation. We also use the outputs of Forward propagation to calculate our Cost Function

During forward Propagation we store all of the cache of Forward Propagation and Cost Function values into variables we created in the functions. In a neural network we initialize some random weights at the beginning of the algorithm, but just in case those weight values do not fit our model and the output is not what we want it to be. In order to reduce the error occurred we need to help our model change those initial parameters and weight values in order to minimize the error

This way to train our model is known as Backward propagation

We do this by backtracking the values we stored as cache in variables during Forward propagation and then optimize the values. We combine all of these processes into a single and run it through 100s of iterations with a suitable learning rate.

(9)

Fig.7 Implementation

Results

We successfully received a training set accuracy of 0.98 and test set accuracy of 0.88.

Discussions

This was the best result found after using various variations in the number of iterations that varied from 2000-2500-3000 with combinations of different learning rates 0.0060, 0.0065, 0.0070, 0.0075, 0.0080, 0.0085

By Observations we noticed that the algorithm proves to be most optimised with 2500 iterations and a learning rate of 0.0075

(10)

Conclusion

Therefore, the project uses NN (Neural Network) algorithm to identify wild animals. The algorithm can effectively classify animals with high precision, and can also display images of recognized animals for better results, so that they can be used for other purposes, such as recognition. Wild animals invade human habitats and it can be used prevent poaching and even human conflicts.

When an animal is found to the nearest forest office, this work can be extended by sending a warning message. It can also be used to reduce wildlife conflicts and accidents between humans and animals.

References

1. Yu, Xiaoyuan, et al. "Automated identification of animal species in camera trap images." EURASIP Journal on Image and Video Processing 2013.1 (2013): 1-10.

2. Radhakrishnan, Saieshwar, and R. Ramanathan. "A support vector machine with gabor features for animal intrusion detection in agriculture fields." Procedia computer science 143 (2018): 493-501.

3. Gupta, Swati, and Ritika Singhal. "International Journal on Recent and Innovation Trends in Computing and Communication Fundamentals and Characteristics of an Expert system." Int.

J. Recent Innov. Trends Comput. Commun 1.3 (2013): 110-113.

4. SANTHOSHI, KJAI, and S. BHAVANA. "Intruder recognition in a farm through wireless sensor network." International Journal of Advance Research, Ideas and Innovations in Technology 4.3 (2018): 667-.669

5. Smabhaji, SahanePradnya, Salunke Nikita Sanjiv, and Shukla Shreyas Sanjay. "Early Warning System for Detection of Harmful Animals using IOT." International Journal of Advance Research and Innovative Ideas in Education 5.3 (2019): 2395-4396.

6. Sheela, S., et al. "Low cost alert system for monitoring the wildlife from entering the human populated areas using IOT devices." International Journal of Innovative Research in Science, Engineering and Technology 5.10 (2016): 128-132.

7. Andavarapu, Nagaraju, and Valli Kumari Vatsavayi. "Wild-animal recognition in agriculture farms using W-COHOG for agro-security." International Journal of Computational Intelligence Research 13.9 (2017): 2247-2257.Trnovszky, Tibor, et al. "Animal recognition

(11)

system based on convolutional neural network." Advances in Electrical and Electronic Engineering 15.3 (2017): 517-525.

8. Xue, Wenling, Ting Jiang, and Jiong Shi. "Animal intrusion detection based on convolutional neural network." 2017 17th International Symposium on Communications and Information Technologies (ISCIT). IEEE, 2017.Upadrashta, Raviteja, et al. "An animation-and-chirplet based approach to intruder classification using PIR sensing." 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).

IEEE, 2015.Roy, Sanku Kumar, et al. "AID: A prototype for agricultural intrusion detection using wireless sensor network." 2015 IEEE International Conference on Communications (ICC). IEEE, 2015.

9. Roomi, S. Md Mansoor, et al. "A Line Model based approach for monkey intrusion detection." 2010 International Conference on Signal Processing and Communications (SPCOM). IEEE, 2010.

10. Noviyanto, A., Arymurthy, A.M., “Automatic cattle identification based on muzzle photo using speed-up robust features approach”, Proceedings of the 3rd European Conference of Computer Science, ECCS, 110:114, (2012).

11. Kohl, H.S., Burkhart, T., “Animal biometrics: quantifying and detecting phenotypic Appearance”, Trends Ecol. Evol., 28 (7): 432–441, (2013).

12. Duyck, J., Finn, C., Hutcheon, A., Vera, P., Salas, J., Ravela, S., “Sloop: a pattern retrieval engine for individual animal identification”, Pattern Recogn., 48 (4): 1059–1073, (2015).

13. Nasirahmadi, A., Richter, U., Hensel, O., Edwards, S., Sturm, B., “Using machine vision for 14. investigation of changes in pig group lying patterns”, Computers and Electronics in

Agriculture, (119): 184-190, (2015).

15. Wang, Z., Fu, Z., Chen, W., Hu, J., “A rfid-based traceability system for cattle breeding in china”, in: Proceedings of 2010 IEEE International Conference on Computer Application and System Modeling (ICCASM), (2): V2–567, (2010).

16. Krizhevsky, A., Sutskever, I., Hinton, G., “ImageNet classification with deep convolutional neural networks”, In Advances in Neural Information Processing Systems, 1097–1105, (2012).

17. Incetas, M. O., Demirci, R., Yavuzcan, H. G., “Automatic Color Edge Detection with Similarity Transformation”, Gazi University Journal of Science, 32(2): 458-469, (2019).

18. Sun, Y., Wang, X., Tang, X., “Deep convolutional network cascade for facial point detection”, Proc. IEEE Conf. Comput. Vis. Pattern Recognit, 3476–3483, (2013).

(12)

19. Kumar, S., Singh, S.K., “Visual animal biometrics: survey”, IET Biometrics, 6 (3): 139–156, (2016).

20. Barron, U.G., Butler, F., McDonnell, K., Ward, S., “The end of the identity crisis? Advances in biometric markers for animal identification”, Irish Veterinary J., 62 (3): 204-208, (2009).

21. Reiter, S., Sattlecker, G., Lidauer, L., Kickinger, F., Öhlschuster, M., Auer, W., ..., Iwersen, M., “Evaluation of an ear-tag-based accelerometer for monitoring rumination in dairy cows”, Journal of Dairy Science, 101(4): 3398-3411, (2018).

22. Seijas, C., Montilla, G., Frassato, L., “Identification of Rodent Species Using Deep Learning”, Computación y Sistemas, 23(1): 257, (2019).

23. Hansen, M.F., Smith, M.L., Smith, L.N., Salter, M.G., Baxter, E.M., Farish, M., Grieve, B.,

“Towards on-farm pig face recognition using convolutional neural networks”, Computers in Industry, 98: 145-152, (2018).

24. Kumar, S., Singh, S.K., “Cattle Recognition: A New Frontier in Visual Animal Biometrics 25. Research”, Proceedings of the National Academy of Sciences, India Section A: Physical

Sciences 1-20, (2019).

26. Norouzzadeh, M.S., Nguyen, A., Kosmala, M., Swanson, A., Palmer, M.S., Packer, C., Clune, J.,

27. “Automatically identifying, counting, and describing wild animals in camera-trap images with deep learning”, Proceedings of the National Academy of Sciences, 115(25): E5716- E5725, (2018).

28. Zin T.T., Phyo, C.N., Tin, P., Hama, H., Kobayashi, I., “Image technology based cow identification system using deep learning”, Proceedings of the International MultiConference of Engineers and Computer Scientists 1, (2018).

Referințe

DOCUMENTE SIMILARE

Stability Analysis of Complex- Valued Memristive Neural Networks with Delay- Dependent Discrete-Time

Keywords: Particle Swarm Optimization (PSO), Convolutional Neural Networks (CNN), Image classification, Pooling

The gradient descent training rule used by the linear unit is guaranteed to converge to a hypothesis with minimum squared error.. • given a sufficiently small learning

Data augmentation techniques help deep artificial neural networks improve their general- ization performance. Traditional image augmentation approaches are biased towards using

3.3 Implementation 29 Keep in mind that the purpose of this experiment was to test if Collaborative Artificial Neural Network, Simple Collaboration Networks to be exact, can be used

Machine Learning, Logistic Regression, Toxic, Threat, Severe Toxic, Obscene, Insults and Identity-Based Hatred, Convolutional Neural

The program mynw.m is trained to the given training numerical image and it returns the network.The required amount block obtained from the proceed.m is accessed by

Keywords:Artificial neural networks, Data mining techniques, Meteorological data, Rainfall prediction, Support Vector