0% Complete
فارسی
Home
/
سیزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
An Improved Drone Detection Method Using Deep Learning for Augmentation Detection Speed
Authors :
Mohammad Bahrami
1
Seyyed Amir Asghari
2
Mohammadreza Binesh Marvasti
3
Sajjad Ansaria
4
1- دانشگاه شاهد
2- دانشگاه خوارزمی
3- دانشگاه خوارزمی
4- دانشگاه شاهد
Keywords :
Drone،Deep learning،Detection،Datasets
Abstract :
Abstract In recent years, remotely piloted birds(drones) have become significantly more accessible to the general public. Affordable prices economical, being equipped with advanced technologies, small sizes, easy portability and setup, create many concerns. For example, drones can be used for destructive activities, spying on private properties, monitoring vital places, carrying dangerous objects which is a big threat to the society. For this reason, the identification of drones is considered important has been in order to solve the above challenges that the university and the industry have provided several solutions in recent years. In this paper, an improved method is introduced to detect drones based on deep learning. This system is designed based on camera recognition. Based on the camera images, the system determines the location of the drone on the image by dragging the box around it. For our methods OpenCV library and YOLO algorithm are used. The simulation results show that the drone can be detected in 17 milliseconds and the detection is done with 85% accuracy.
Papers List
List of archived papers
Detection and Identification of Cyber-Attacks in Cyber-Physical Systems Based on Machine Learning Methods
Zohre Nasiri Zarandi
Classical-Quantum Multiple Access Wiretap Channel with Common Message: One-shot Rate Region
Hadi Aghaee - Dr Bahareh Akhbari
Blockchain-based Secure UAV-assisted Battlefield Operation underlying 5G
Dhruvi Pancholi - Nilesh Kumar Jadav - Sudeep Tanwar - Deepak Garg - S. Mohammadali Zanjani
شناسایی حملات فیشینگ با استفاده از الگوریتم عقاب آتشین و شبکه عصبی کانولوشن
علی کوشاری - مهدی فرتاش
Establishing security using cryptography and biometric authentication to counter cyber-attacks
Mohammed ADIL AKABR - Mehdi Hamidkhani - Mostafa Sadeghi
کشف لبه در تصاویر پزشکی با استفاده از اتوماتای سلولی سلسله مراتبی
مریم علینقی زاده - علیرضا رضوانیان
بهبود رهگیری در زنجیره تامین با استفاده از فناوری زنجیره بلوکی
سید عماد موسوی - مهرداد آشتیانی
ارائه یک سیستم توصیهگر آگاه به زمینه مبتنی بر رفتار کاربر در شبکه اجتماعی با استفاده از پیامهای برچسب شده جغرافیایی
زهرا امینی - سید علیرضا هاشمی گلپایگانی - علی میرزائی
Distributed coordination protocol for event data exchange in IoT monitoring applications
Behnam Khazael - Hadi Tabatabaee Malazi
An ESB-based Architecture for Authentication as a Service Through Enterprise Application Integration
Masoumeh Hashemi - Mehdi Sakhaei-nia - Morteza Yousef Sanati
more
Samin Hamayesh - Version 42.5.2