SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 458
CAR DAMAGE DETECTION AND PRICE PREDICTION USING DEEP
LEARNING
Prof. Reshma Totare1, Varad Bhalsing2, Mayur Lende3, Tejas Maramwar4, Chirag Naikwadi5
Dept. of Information Technology, AISSMS’s Institute of Information Technology, Pune-1, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Auto insurance processing using images is a
critical industry with a lot of room for automation. In this
study, we will look at the topic of car damage detection.
Vehicle damage detection. Using pictures taken at thescene of
an accident can save time and money when filing insurance
claims, as well as provide more convenience to drivers.
Artificial intelligence (AI) in the senseofmachinelearning and
deep learning algorithms can help solve problems. A transfer
learning-based vehicle damage detection technique and a
regional convolutional neural network(MaskRCNN)mask are
used to quickly solve accident compensation problems.
Algorithms identify the damaged part of the car, determine its
location, and then estimate the severity of the damage. Very
satisfactory results were obtained using transfer learning
using available models that were trained for the moregeneral
challenge of object identification.
Key Words: Car Damage Detection, Machine learning,
Prediction, VGG16, Transfer Learning, Deep Learning,
Price Prediction
1. INTRODUCTION
Today, one of the first businesses to invest in innovation,
cutting-edge technology, and artificial intelligence(AI)isthe
insurance industry. Car insurance companiesspendmillions
of dollars each year due to evasion of insurance claims in
today's society where the number of car accidents is on the
rise.. In the insurance industry, Artificial intelligence (AI)
based on machine learning and deep learningcanassistwith
challenges including data analysis and processing, fraud
detection, risk reduction, and claim automation. As a result,
insurance companies have sought to reduce the timeittakes
to analyze damage and settle claims. However, developing
current applications to solve these problems remains
difficult, especially when using deep learning to assess car
damage. Deep learning is an effective method for tackling
complicated problems,butitnecessitatesmore resources for
model building, i.e., deep learning demands a large dataset
and takes longer to compute. There are no publicly available
datasets for automobile damaged photos because car
damage assessment is a specializedtopic.Thehardestpartof
training a model is doing it with a small data set.However, in
this instance we use a dataset format called COCO format.
Using a Mask RCNN algorithm on a small COCO dataset has
also shown precise results. Detectron2 which is one of the
open-source python library from Facebook provide pre-
trained model has been used. The Mask RCNN method is
used in the paper to detect and segment damaged areas of
cars. It has a lot of research value and a lot of application
scenarios in the transportation area. Due to the complexity
of automatic damage detection and segmentation, issues
such as reduced segmentation and lower detection speed
exist. The Mask RCNN is applied to the field of this research,
and a model for detecting and segmenting a vehicle's
damaged region in an accident is proposed. Insurance
companies can also use this model to quickly process
insurance claims.
Risk Analysis:
Image size - The security of the application depends upon
the size of the image. If we use images of small size then the
options for selecting the pixels is less, this reduces the time
required to decipher the key from the image. The number of
pixels in an image with height h and width w is w*h. The
intruder or attacker has to check all the combinations of
choosing the pixels from the image to decipher the key from
the image. By increasing the size of the image, we can
increase the security of the application.
2. LITERATURE REVIEW
A previous study [1] has used pre-trained deep learning
models, MobileNet and YOLO, and have been applied on a
customized vehicle damage dataset. YOLO algorithm is used
for detection but YOLO’s full utilization is in classifying
multiple objects. In this case, only a single object i.e. car is to
be detected where VGG-16 can be used.
Another study by Umer Waqas, Nimra Akram, Soohwa Kim,
Donghun Lee, Jihoon Jeon [2] uses algorithm to classifies
three types of vehicle damage categories which include
medium damage, huge damageor nodamage.Also,metadata
analysis and moiré effect detection is used to verify the
authenticity of the images uploaded by users.
In [3], an insight to further more improvement is suggested.
Robust Mask RCNN algorithm is utilized which improves on
previous work yet is still lacking in few areas. For example,
the detection accuracy is very high, but the mask instance
segmentation cannot be completely correct, and some areas
in which the damage is not obvious cannot be segmented.
Another paper [4] proposes a deep learning-based solution
for car damage classification. Since there was no publicly
available dataset, they created a new dataset by collecting
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 459
images from web and manually annotating them.
Experimented with multiple deeplearning-basedtechniques
such as training CNNs from random initialization,
Convolution Autoencoder based pre-training followed by
supervised fine tuning and transfer learning.
3. PROPOSED SYSTEM ARCHITECTURE
The different steps which will be carried out in order to
create and use different classifiers and get most probable
results. Out of the different results and accuracies produced
by different Machine Learning models, we will utilize the
best model with the best accuracy for Car damage detection
and price prediction. System Architecture will give us an
overview of the working of the system.
5.1. System Architecture
Fig. 1: Car Damage Detection Architecture
Web App:
Here users can upload images of the damaged car or any
random images which will be processed by our algorithm
using the GUI which is created using HTML, CSS, Bootstrap
and integrated by flask.
Module-1:
In this module, VGG-16 is used to detect whether the
uploaded image is a car or not..
Module-2:
Here, car damage is detected using VGG-16, VGG-19 and
ResNet-50. The model that gives us the most accuracy is
considered..
Module-3:
The side of the vehicle where the damaged is incurred i.e. In
the rear part, front part or side part is identified using this
module.
Module-4:
The damage level is further decided in this module.Thelevel
of damage is decided by data visualization using heat maps.
A heatmap is a two-dimensional visual representation of
data where values are color-coded, providing a convenient
and insightful view of information.
Module-5:
Depending on the damage, the location of the damage and
the model of the car, the cost of repairing the damage will be
predicted.
4. PROJECT DESIGN
The below figure 2, represents the Data Flow Diagram of
proposed system. The customer/user uploads the image of
car. Then that image is processed and the report of damage
is generated and it is sent back to the user.
Fig- 2: Data Flow Diagram
Here, the first module detectswhethertheuploadedimageis
of car or not. If the car is not detected then it returns back to
the initial stage. And if car is detected then further modules
take place. The next module detects whether the uploaded
image of car has damage or not. If the damageisnotdetected
then it returns back to initial stage. Once the damage is
detected, further modules detects location(front,side,back)
and severity (minor, moderate, major). Above modules will
help in predicting the price.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 460
5. GUI AND EXPERIMENTAL RESULTS
User Interface has been developed.
Also the first module which detects the car has been
integrated using flask.
Fig- 3: Home Page
Home page provides basic interface withtheoptionshowing
Upload Image.
Fig- 4: Interface to upload image
After clicking on Upload Image on Home Page, option is
given to upload image and predict that image is of car or not.
Here, the data of the first module which detects whether the
uploaded image is of car or not is integrated.
The first module is trained using VGG-16.
Fig-5: Car Detected
Fig 5 shows that the uploaded image is of car.
Once the car is detected, it will direct user to next step i.e.
Damage Evaluation.
Fig- 6: Car not detected
Above fig 6 shows when the uploaded image is not of car.
If the car is not detected then user is recommendedtoretake
photo and then upload again.
6. IMPORTANT LIBRARIES /PACKAGE
KERAS: A Python interface for artificial neural networks is
provided by the open-source software package known as
Keras. The TensorFlow library interface is provided by
Keras.
TensorFlow: TensorFlow is an open-source, free machine
learning and artificial intelligencesoftwarelibrary. Although
deep neural network training and inference are given
specific attention, it can be used for a variety of tasks.
VGG-16 and VGG-19: VGG stands for Visual Geometry
Group; it is a standard deep Convolutional Neural Network
(CNN) architecture withmultiplelayers.VGG-16andVGG-19
consisting of 16 and 19 convolutional layers respectively.
ResNet-50: It is a Convolutional Neural Network (CNN)that
is 50 layers deep. Here, we can load a pretrained version of
the network trained on more than a million images from the
ImageNet database
7. CONCLUSION
To deal with the compensating problem of damaged autos,
the model proposed here employs, a deep learning-based
detection technique for vehicle-damage identification. The
suggested approach of transfer learning-based damage
detection of the vehicle is generic after testing, and can also
better adapt to the diverse elements of damaged car images.
Despite the model's training on a very short dataset,
successful outcomes were obtained. Data extension can be
done in the future to raise the dataset's size, gather
additional automobiledamageimagesundervariousdegrees
of illumination and weather conditions, enrich the data, the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 461
edge contour enhancement of images can be improved and
the damaged parts of the car canbemaskedmoreaccurately.
Also, the model can be further enhancedto predicttherepair
price of the damaged area by extracting the predicted part
details like the segmented mask area.
REFERENCES
[1] “Automated Detection of Multi-class Vehicle Exterior
Damages using Deep Learning” | Maleika Heenaye-
Mamode Khan, Mohammad Zafir Hussein Sk Heerah,
Zuhairah Basgeeth | IEEE 2021 |
DOI:10.1109/ICECCME52200.2021.9590927
[2] “Vehicle Damage Classification and Fraudulent Image
Detection Including Moiré Effect Using Deep Learning”|
Umer Waqas, Nimra Akram, Soohwa Kim, Donghun Lee,
Jihoon Jeon | 2020 IEEE Canadian Conference on
Electrical and Computer Engineering (CCECE)
[3] “Vehicle-Damage-Detection Segmentation Algorithm
Based on Improved Mask RCNN” | Qinghui Zhang,
Xianing Chang, and Shanfeng Bian | IEEE Access | DOI:
10.1109/ACCESS.2020.2964055
[4] “Deep Learning Based Car Damage Classification” |
Kalpesh Patil, Mandar Kulkarniy, Anand Sriramany and
Shirish Karande
[5] R. S. Gaykar, V. Khanaa and S. D. Joshi, "Detection of
Faulty Nodes in DistributedEnvironmentusingMachine
Learning," 2021 3rd International Conference on
Advances in Computing, Communication Control and
Networking (ICAC3N), 2021, pp. 228-232, DOI:
10.1109/ICAC3N53548.2021.9725478.
[6] R. S. Gaykar, C. Nalini and S. D. Joshi, "Identification of
Straggler Node in Distributed Environment Using Soft
Computing Algorithms," 2021 International Conference
on Emerging Smart Computing and Informatics (ESCI),
2021, pp. 1-5, DOI: 10.1109/ESCI50559.2021.9396825.
BIOGRAPHIES
Mrs. Reshma Totare
Assistant Professor Dept.
of Information
Technology AISSMS IOIT,
Pune
Varad Bhalsing
BE-IT
AISSMS IOIT, Pune
Mayur Lende
BE-IT
AISSMS IOIT, Pune
Tejas Maramwar
BE-IT
AISSMS IOIT, Pune
Chirag Naikwadi
BE-IT
AISSMS IOIT, Pune

More Related Content

What's hot

Intelligence Artificielle et cybersécurité
Intelligence Artificielle et cybersécuritéIntelligence Artificielle et cybersécurité
Intelligence Artificielle et cybersécuritéOPcyberland
 
rapport-projet-de-fin-detudes
 rapport-projet-de-fin-detudes rapport-projet-de-fin-detudes
rapport-projet-de-fin-detudesAchraf Mokhtari
 
Rapport PFE: Gestion de Parc Informatique
Rapport PFE: Gestion de Parc InformatiqueRapport PFE: Gestion de Parc Informatique
Rapport PFE: Gestion de Parc InformatiqueEric Maxime
 
Presentation arduino
Presentation arduinoPresentation arduino
Presentation arduinoSinGuy
 
Présentation E-Learning
Présentation   E-LearningPrésentation   E-Learning
Présentation E-LearningGhribi Achref
 
srep_cours_01.pdf
srep_cours_01.pdfsrep_cours_01.pdf
srep_cours_01.pdfSamirAwad14
 
Installation et Configuration ee JDK et de Tomcat
Installation et Configuration ee JDK et de TomcatInstallation et Configuration ee JDK et de Tomcat
Installation et Configuration ee JDK et de TomcatMohamed Ben Bouzid
 
Reconnaissance faciale (1)
Reconnaissance faciale (1)Reconnaissance faciale (1)
Reconnaissance faciale (1)laurence allard
 
Cyber&digital forensics report
Cyber&digital forensics reportCyber&digital forensics report
Cyber&digital forensics reportyash sawarkar
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its roleSudeshna Basak
 
ETUDE ET MISE EN PLACE D'UNE SOLUTION DE CLOUD COMPUTING PRIVÉ BASÉE SUR UN ...
ETUDE ET MISE EN PLACE D'UNE SOLUTION DE CLOUD COMPUTING  PRIVÉ BASÉE SUR UN ...ETUDE ET MISE EN PLACE D'UNE SOLUTION DE CLOUD COMPUTING  PRIVÉ BASÉE SUR UN ...
ETUDE ET MISE EN PLACE D'UNE SOLUTION DE CLOUD COMPUTING PRIVÉ BASÉE SUR UN ...Borel NZOGANG
 
Asi gestionnaire de parc informatique (admissibilité) qcm bap e 2009
Asi gestionnaire de parc informatique (admissibilité) qcm bap e 2009Asi gestionnaire de parc informatique (admissibilité) qcm bap e 2009
Asi gestionnaire de parc informatique (admissibilité) qcm bap e 2009Soufien Zarrouki
 
Systèmes d'Exploitation - chp1-introduction
Systèmes d'Exploitation - chp1-introductionSystèmes d'Exploitation - chp1-introduction
Systèmes d'Exploitation - chp1-introductionLilia Sfaxi
 
Rapport de projet de fin d'étude licence informatique et multimédia
Rapport de projet de fin d'étude licence informatique et multimédiaRapport de projet de fin d'étude licence informatique et multimédia
Rapport de projet de fin d'étude licence informatique et multimédiaNazih Heni
 
Reconnaissance faciale
Reconnaissance facialeReconnaissance faciale
Reconnaissance facialebgdu49xxx
 
Étude et réalisation d’une application de contrôle d’un PC à distance en JAVA...
Étude et réalisation d’une application de contrôle d’un PC à distance en JAVA...Étude et réalisation d’une application de contrôle d’un PC à distance en JAVA...
Étude et réalisation d’une application de contrôle d’un PC à distance en JAVA...Bachir Benyammi
 
projet interface LabView avec conception prototype machine de tri
projet interface LabView avec conception prototype machine de tri projet interface LabView avec conception prototype machine de tri
projet interface LabView avec conception prototype machine de tri Moatez Amairi
 

What's hot (20)

Intelligence Artificielle et cybersécurité
Intelligence Artificielle et cybersécuritéIntelligence Artificielle et cybersécurité
Intelligence Artificielle et cybersécurité
 
rapport-projet-de-fin-detudes
 rapport-projet-de-fin-detudes rapport-projet-de-fin-detudes
rapport-projet-de-fin-detudes
 
Rapport PFE: Gestion de Parc Informatique
Rapport PFE: Gestion de Parc InformatiqueRapport PFE: Gestion de Parc Informatique
Rapport PFE: Gestion de Parc Informatique
 
Presentation arduino
Presentation arduinoPresentation arduino
Presentation arduino
 
Présentation E-Learning
Présentation   E-LearningPrésentation   E-Learning
Présentation E-Learning
 
srep_cours_01.pdf
srep_cours_01.pdfsrep_cours_01.pdf
srep_cours_01.pdf
 
Installation et Configuration ee JDK et de Tomcat
Installation et Configuration ee JDK et de TomcatInstallation et Configuration ee JDK et de Tomcat
Installation et Configuration ee JDK et de Tomcat
 
Reconnaissance faciale (1)
Reconnaissance faciale (1)Reconnaissance faciale (1)
Reconnaissance faciale (1)
 
Cyber&digital forensics report
Cyber&digital forensics reportCyber&digital forensics report
Cyber&digital forensics report
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its role
 
Tests de performances
Tests de performancesTests de performances
Tests de performances
 
ETUDE ET MISE EN PLACE D'UNE SOLUTION DE CLOUD COMPUTING PRIVÉ BASÉE SUR UN ...
ETUDE ET MISE EN PLACE D'UNE SOLUTION DE CLOUD COMPUTING  PRIVÉ BASÉE SUR UN ...ETUDE ET MISE EN PLACE D'UNE SOLUTION DE CLOUD COMPUTING  PRIVÉ BASÉE SUR UN ...
ETUDE ET MISE EN PLACE D'UNE SOLUTION DE CLOUD COMPUTING PRIVÉ BASÉE SUR UN ...
 
Asi gestionnaire de parc informatique (admissibilité) qcm bap e 2009
Asi gestionnaire de parc informatique (admissibilité) qcm bap e 2009Asi gestionnaire de parc informatique (admissibilité) qcm bap e 2009
Asi gestionnaire de parc informatique (admissibilité) qcm bap e 2009
 
Systèmes d'Exploitation - chp1-introduction
Systèmes d'Exploitation - chp1-introductionSystèmes d'Exploitation - chp1-introduction
Systèmes d'Exploitation - chp1-introduction
 
Atelier Informatique
Atelier InformatiqueAtelier Informatique
Atelier Informatique
 
MEMOIRE DE STAGE
MEMOIRE DE STAGEMEMOIRE DE STAGE
MEMOIRE DE STAGE
 
Rapport de projet de fin d'étude licence informatique et multimédia
Rapport de projet de fin d'étude licence informatique et multimédiaRapport de projet de fin d'étude licence informatique et multimédia
Rapport de projet de fin d'étude licence informatique et multimédia
 
Reconnaissance faciale
Reconnaissance facialeReconnaissance faciale
Reconnaissance faciale
 
Étude et réalisation d’une application de contrôle d’un PC à distance en JAVA...
Étude et réalisation d’une application de contrôle d’un PC à distance en JAVA...Étude et réalisation d’une application de contrôle d’un PC à distance en JAVA...
Étude et réalisation d’une application de contrôle d’un PC à distance en JAVA...
 
projet interface LabView avec conception prototype machine de tri
projet interface LabView avec conception prototype machine de tri projet interface LabView avec conception prototype machine de tri
projet interface LabView avec conception prototype machine de tri
 

Similar to CAR DAMAGE DETECTION AND PRICE PREDICTION USING DEEP LEARNING

IRJET- Damage Assessment for Car Insurance
IRJET-  	  Damage Assessment for Car InsuranceIRJET-  	  Damage Assessment for Car Insurance
IRJET- Damage Assessment for Car InsuranceIRJET Journal
 
IRJET - Automatic Car Insurance using Image Analysis
IRJET -  	  Automatic Car Insurance using Image AnalysisIRJET -  	  Automatic Car Insurance using Image Analysis
IRJET - Automatic Car Insurance using Image AnalysisIRJET Journal
 
Car Damage Assessment to Automate Insurance Claim
Car Damage Assessment to Automate Insurance ClaimCar Damage Assessment to Automate Insurance Claim
Car Damage Assessment to Automate Insurance ClaimIRJET Journal
 
Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...
Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...
Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...IRJET Journal
 
AUTONOMOUS SELF DRIVING CARS
AUTONOMOUS SELF DRIVING CARSAUTONOMOUS SELF DRIVING CARS
AUTONOMOUS SELF DRIVING CARSIRJET Journal
 
Vigilance: Vehicle Detector and Tracker
Vigilance: Vehicle Detector and TrackerVigilance: Vehicle Detector and Tracker
Vigilance: Vehicle Detector and TrackerIRJET Journal
 
IRJET- Number Plate Extraction from Vehicle Front View Image using Image ...
IRJET-  	  Number Plate Extraction from Vehicle Front View Image using Image ...IRJET-  	  Number Plate Extraction from Vehicle Front View Image using Image ...
IRJET- Number Plate Extraction from Vehicle Front View Image using Image ...IRJET Journal
 
CAR DAMAGE DETECTION USING DEEP LEARNING
CAR DAMAGE DETECTION USING DEEP LEARNINGCAR DAMAGE DETECTION USING DEEP LEARNING
CAR DAMAGE DETECTION USING DEEP LEARNINGIRJET Journal
 
IRJET- Review on Vehicle Detection and Tracking for High Sensitive Area and E...
IRJET- Review on Vehicle Detection and Tracking for High Sensitive Area and E...IRJET- Review on Vehicle Detection and Tracking for High Sensitive Area and E...
IRJET- Review on Vehicle Detection and Tracking for High Sensitive Area and E...IRJET Journal
 
Helmet Detection using Machine Learning
Helmet Detection using Machine LearningHelmet Detection using Machine Learning
Helmet Detection using Machine LearningIRJET Journal
 
Vision-Based Motorcycle Crash Detection and Reporting Using Deep Learning
Vision-Based Motorcycle Crash Detection and Reporting Using Deep LearningVision-Based Motorcycle Crash Detection and Reporting Using Deep Learning
Vision-Based Motorcycle Crash Detection and Reporting Using Deep LearningIRJET Journal
 
Object Detection for Autonomous Driving
Object Detection for Autonomous DrivingObject Detection for Autonomous Driving
Object Detection for Autonomous DrivingIRJET Journal
 
IRJET- A Deep Learning based Approach for Automatic Detection of Bike Rid...
IRJET-  	  A Deep Learning based Approach for Automatic Detection of Bike Rid...IRJET-  	  A Deep Learning based Approach for Automatic Detection of Bike Rid...
IRJET- A Deep Learning based Approach for Automatic Detection of Bike Rid...IRJET Journal
 
IRJET- Reckoning the Vehicle using MATLAB
IRJET- Reckoning the Vehicle using MATLABIRJET- Reckoning the Vehicle using MATLAB
IRJET- Reckoning the Vehicle using MATLABIRJET Journal
 
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...IRJET Journal
 
Smart Parking Solution using Camera Networks and Real-time Computer Vision
Smart Parking Solution using Camera Networks and Real-time Computer VisionSmart Parking Solution using Camera Networks and Real-time Computer Vision
Smart Parking Solution using Camera Networks and Real-time Computer VisionIRJET Journal
 
Next generation engine immobiliser
Next generation engine immobiliserNext generation engine immobiliser
Next generation engine immobilisereSAT Journals
 
DROWSINESS DETECTION MODEL USING PYTHON
DROWSINESS DETECTION MODEL USING PYTHONDROWSINESS DETECTION MODEL USING PYTHON
DROWSINESS DETECTION MODEL USING PYTHONIRJET Journal
 

Similar to CAR DAMAGE DETECTION AND PRICE PREDICTION USING DEEP LEARNING (20)

IRJET- Damage Assessment for Car Insurance
IRJET-  	  Damage Assessment for Car InsuranceIRJET-  	  Damage Assessment for Car Insurance
IRJET- Damage Assessment for Car Insurance
 
IRJET - Automatic Car Insurance using Image Analysis
IRJET -  	  Automatic Car Insurance using Image AnalysisIRJET -  	  Automatic Car Insurance using Image Analysis
IRJET - Automatic Car Insurance using Image Analysis
 
Car Damage Assessment to Automate Insurance Claim
Car Damage Assessment to Automate Insurance ClaimCar Damage Assessment to Automate Insurance Claim
Car Damage Assessment to Automate Insurance Claim
 
Self Driving Car
Self Driving CarSelf Driving Car
Self Driving Car
 
Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...
Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...
Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...
 
AUTONOMOUS SELF DRIVING CARS
AUTONOMOUS SELF DRIVING CARSAUTONOMOUS SELF DRIVING CARS
AUTONOMOUS SELF DRIVING CARS
 
Vigilance: Vehicle Detector and Tracker
Vigilance: Vehicle Detector and TrackerVigilance: Vehicle Detector and Tracker
Vigilance: Vehicle Detector and Tracker
 
IRJET- Number Plate Extraction from Vehicle Front View Image using Image ...
IRJET-  	  Number Plate Extraction from Vehicle Front View Image using Image ...IRJET-  	  Number Plate Extraction from Vehicle Front View Image using Image ...
IRJET- Number Plate Extraction from Vehicle Front View Image using Image ...
 
CAR DAMAGE DETECTION USING DEEP LEARNING
CAR DAMAGE DETECTION USING DEEP LEARNINGCAR DAMAGE DETECTION USING DEEP LEARNING
CAR DAMAGE DETECTION USING DEEP LEARNING
 
IRJET- Review on Vehicle Detection and Tracking for High Sensitive Area and E...
IRJET- Review on Vehicle Detection and Tracking for High Sensitive Area and E...IRJET- Review on Vehicle Detection and Tracking for High Sensitive Area and E...
IRJET- Review on Vehicle Detection and Tracking for High Sensitive Area and E...
 
Helmet Detection using Machine Learning
Helmet Detection using Machine LearningHelmet Detection using Machine Learning
Helmet Detection using Machine Learning
 
Vision-Based Motorcycle Crash Detection and Reporting Using Deep Learning
Vision-Based Motorcycle Crash Detection and Reporting Using Deep LearningVision-Based Motorcycle Crash Detection and Reporting Using Deep Learning
Vision-Based Motorcycle Crash Detection and Reporting Using Deep Learning
 
Object Detection for Autonomous Driving
Object Detection for Autonomous DrivingObject Detection for Autonomous Driving
Object Detection for Autonomous Driving
 
IRJET- A Deep Learning based Approach for Automatic Detection of Bike Rid...
IRJET-  	  A Deep Learning based Approach for Automatic Detection of Bike Rid...IRJET-  	  A Deep Learning based Approach for Automatic Detection of Bike Rid...
IRJET- A Deep Learning based Approach for Automatic Detection of Bike Rid...
 
IRJET- Reckoning the Vehicle using MATLAB
IRJET- Reckoning the Vehicle using MATLABIRJET- Reckoning the Vehicle using MATLAB
IRJET- Reckoning the Vehicle using MATLAB
 
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
 
Smart Parking Solution using Camera Networks and Real-time Computer Vision
Smart Parking Solution using Camera Networks and Real-time Computer VisionSmart Parking Solution using Camera Networks and Real-time Computer Vision
Smart Parking Solution using Camera Networks and Real-time Computer Vision
 
Next generation engine immobiliser
Next generation engine immobiliserNext generation engine immobiliser
Next generation engine immobiliser
 
Next generation engine immobiliser
Next generation engine immobiliserNext generation engine immobiliser
Next generation engine immobiliser
 
DROWSINESS DETECTION MODEL USING PYTHON
DROWSINESS DETECTION MODEL USING PYTHONDROWSINESS DETECTION MODEL USING PYTHON
DROWSINESS DETECTION MODEL USING PYTHON
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
DM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in projectDM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in projectssuserb6619e
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptNarmatha D
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadaditya806802
 
Cooling Tower SERD pH drop issue (11 April 2024) .pptx
Cooling Tower SERD pH drop issue (11 April 2024) .pptxCooling Tower SERD pH drop issue (11 April 2024) .pptx
Cooling Tower SERD pH drop issue (11 April 2024) .pptxmamansuratman0253
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 

Recently uploaded (20)

Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
DM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in projectDM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in project
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.ppt
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
 
Cooling Tower SERD pH drop issue (11 April 2024) .pptx
Cooling Tower SERD pH drop issue (11 April 2024) .pptxCooling Tower SERD pH drop issue (11 April 2024) .pptx
Cooling Tower SERD pH drop issue (11 April 2024) .pptx
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 

CAR DAMAGE DETECTION AND PRICE PREDICTION USING DEEP LEARNING

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 458 CAR DAMAGE DETECTION AND PRICE PREDICTION USING DEEP LEARNING Prof. Reshma Totare1, Varad Bhalsing2, Mayur Lende3, Tejas Maramwar4, Chirag Naikwadi5 Dept. of Information Technology, AISSMS’s Institute of Information Technology, Pune-1, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Auto insurance processing using images is a critical industry with a lot of room for automation. In this study, we will look at the topic of car damage detection. Vehicle damage detection. Using pictures taken at thescene of an accident can save time and money when filing insurance claims, as well as provide more convenience to drivers. Artificial intelligence (AI) in the senseofmachinelearning and deep learning algorithms can help solve problems. A transfer learning-based vehicle damage detection technique and a regional convolutional neural network(MaskRCNN)mask are used to quickly solve accident compensation problems. Algorithms identify the damaged part of the car, determine its location, and then estimate the severity of the damage. Very satisfactory results were obtained using transfer learning using available models that were trained for the moregeneral challenge of object identification. Key Words: Car Damage Detection, Machine learning, Prediction, VGG16, Transfer Learning, Deep Learning, Price Prediction 1. INTRODUCTION Today, one of the first businesses to invest in innovation, cutting-edge technology, and artificial intelligence(AI)isthe insurance industry. Car insurance companiesspendmillions of dollars each year due to evasion of insurance claims in today's society where the number of car accidents is on the rise.. In the insurance industry, Artificial intelligence (AI) based on machine learning and deep learningcanassistwith challenges including data analysis and processing, fraud detection, risk reduction, and claim automation. As a result, insurance companies have sought to reduce the timeittakes to analyze damage and settle claims. However, developing current applications to solve these problems remains difficult, especially when using deep learning to assess car damage. Deep learning is an effective method for tackling complicated problems,butitnecessitatesmore resources for model building, i.e., deep learning demands a large dataset and takes longer to compute. There are no publicly available datasets for automobile damaged photos because car damage assessment is a specializedtopic.Thehardestpartof training a model is doing it with a small data set.However, in this instance we use a dataset format called COCO format. Using a Mask RCNN algorithm on a small COCO dataset has also shown precise results. Detectron2 which is one of the open-source python library from Facebook provide pre- trained model has been used. The Mask RCNN method is used in the paper to detect and segment damaged areas of cars. It has a lot of research value and a lot of application scenarios in the transportation area. Due to the complexity of automatic damage detection and segmentation, issues such as reduced segmentation and lower detection speed exist. The Mask RCNN is applied to the field of this research, and a model for detecting and segmenting a vehicle's damaged region in an accident is proposed. Insurance companies can also use this model to quickly process insurance claims. Risk Analysis: Image size - The security of the application depends upon the size of the image. If we use images of small size then the options for selecting the pixels is less, this reduces the time required to decipher the key from the image. The number of pixels in an image with height h and width w is w*h. The intruder or attacker has to check all the combinations of choosing the pixels from the image to decipher the key from the image. By increasing the size of the image, we can increase the security of the application. 2. LITERATURE REVIEW A previous study [1] has used pre-trained deep learning models, MobileNet and YOLO, and have been applied on a customized vehicle damage dataset. YOLO algorithm is used for detection but YOLO’s full utilization is in classifying multiple objects. In this case, only a single object i.e. car is to be detected where VGG-16 can be used. Another study by Umer Waqas, Nimra Akram, Soohwa Kim, Donghun Lee, Jihoon Jeon [2] uses algorithm to classifies three types of vehicle damage categories which include medium damage, huge damageor nodamage.Also,metadata analysis and moiré effect detection is used to verify the authenticity of the images uploaded by users. In [3], an insight to further more improvement is suggested. Robust Mask RCNN algorithm is utilized which improves on previous work yet is still lacking in few areas. For example, the detection accuracy is very high, but the mask instance segmentation cannot be completely correct, and some areas in which the damage is not obvious cannot be segmented. Another paper [4] proposes a deep learning-based solution for car damage classification. Since there was no publicly available dataset, they created a new dataset by collecting
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 459 images from web and manually annotating them. Experimented with multiple deeplearning-basedtechniques such as training CNNs from random initialization, Convolution Autoencoder based pre-training followed by supervised fine tuning and transfer learning. 3. PROPOSED SYSTEM ARCHITECTURE The different steps which will be carried out in order to create and use different classifiers and get most probable results. Out of the different results and accuracies produced by different Machine Learning models, we will utilize the best model with the best accuracy for Car damage detection and price prediction. System Architecture will give us an overview of the working of the system. 5.1. System Architecture Fig. 1: Car Damage Detection Architecture Web App: Here users can upload images of the damaged car or any random images which will be processed by our algorithm using the GUI which is created using HTML, CSS, Bootstrap and integrated by flask. Module-1: In this module, VGG-16 is used to detect whether the uploaded image is a car or not.. Module-2: Here, car damage is detected using VGG-16, VGG-19 and ResNet-50. The model that gives us the most accuracy is considered.. Module-3: The side of the vehicle where the damaged is incurred i.e. In the rear part, front part or side part is identified using this module. Module-4: The damage level is further decided in this module.Thelevel of damage is decided by data visualization using heat maps. A heatmap is a two-dimensional visual representation of data where values are color-coded, providing a convenient and insightful view of information. Module-5: Depending on the damage, the location of the damage and the model of the car, the cost of repairing the damage will be predicted. 4. PROJECT DESIGN The below figure 2, represents the Data Flow Diagram of proposed system. The customer/user uploads the image of car. Then that image is processed and the report of damage is generated and it is sent back to the user. Fig- 2: Data Flow Diagram Here, the first module detectswhethertheuploadedimageis of car or not. If the car is not detected then it returns back to the initial stage. And if car is detected then further modules take place. The next module detects whether the uploaded image of car has damage or not. If the damageisnotdetected then it returns back to initial stage. Once the damage is detected, further modules detects location(front,side,back) and severity (minor, moderate, major). Above modules will help in predicting the price.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 460 5. GUI AND EXPERIMENTAL RESULTS User Interface has been developed. Also the first module which detects the car has been integrated using flask. Fig- 3: Home Page Home page provides basic interface withtheoptionshowing Upload Image. Fig- 4: Interface to upload image After clicking on Upload Image on Home Page, option is given to upload image and predict that image is of car or not. Here, the data of the first module which detects whether the uploaded image is of car or not is integrated. The first module is trained using VGG-16. Fig-5: Car Detected Fig 5 shows that the uploaded image is of car. Once the car is detected, it will direct user to next step i.e. Damage Evaluation. Fig- 6: Car not detected Above fig 6 shows when the uploaded image is not of car. If the car is not detected then user is recommendedtoretake photo and then upload again. 6. IMPORTANT LIBRARIES /PACKAGE KERAS: A Python interface for artificial neural networks is provided by the open-source software package known as Keras. The TensorFlow library interface is provided by Keras. TensorFlow: TensorFlow is an open-source, free machine learning and artificial intelligencesoftwarelibrary. Although deep neural network training and inference are given specific attention, it can be used for a variety of tasks. VGG-16 and VGG-19: VGG stands for Visual Geometry Group; it is a standard deep Convolutional Neural Network (CNN) architecture withmultiplelayers.VGG-16andVGG-19 consisting of 16 and 19 convolutional layers respectively. ResNet-50: It is a Convolutional Neural Network (CNN)that is 50 layers deep. Here, we can load a pretrained version of the network trained on more than a million images from the ImageNet database 7. CONCLUSION To deal with the compensating problem of damaged autos, the model proposed here employs, a deep learning-based detection technique for vehicle-damage identification. The suggested approach of transfer learning-based damage detection of the vehicle is generic after testing, and can also better adapt to the diverse elements of damaged car images. Despite the model's training on a very short dataset, successful outcomes were obtained. Data extension can be done in the future to raise the dataset's size, gather additional automobiledamageimagesundervariousdegrees of illumination and weather conditions, enrich the data, the
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 461 edge contour enhancement of images can be improved and the damaged parts of the car canbemaskedmoreaccurately. Also, the model can be further enhancedto predicttherepair price of the damaged area by extracting the predicted part details like the segmented mask area. REFERENCES [1] “Automated Detection of Multi-class Vehicle Exterior Damages using Deep Learning” | Maleika Heenaye- Mamode Khan, Mohammad Zafir Hussein Sk Heerah, Zuhairah Basgeeth | IEEE 2021 | DOI:10.1109/ICECCME52200.2021.9590927 [2] “Vehicle Damage Classification and Fraudulent Image Detection Including Moiré Effect Using Deep Learning”| Umer Waqas, Nimra Akram, Soohwa Kim, Donghun Lee, Jihoon Jeon | 2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE) [3] “Vehicle-Damage-Detection Segmentation Algorithm Based on Improved Mask RCNN” | Qinghui Zhang, Xianing Chang, and Shanfeng Bian | IEEE Access | DOI: 10.1109/ACCESS.2020.2964055 [4] “Deep Learning Based Car Damage Classification” | Kalpesh Patil, Mandar Kulkarniy, Anand Sriramany and Shirish Karande [5] R. S. Gaykar, V. Khanaa and S. D. Joshi, "Detection of Faulty Nodes in DistributedEnvironmentusingMachine Learning," 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), 2021, pp. 228-232, DOI: 10.1109/ICAC3N53548.2021.9725478. [6] R. S. Gaykar, C. Nalini and S. D. Joshi, "Identification of Straggler Node in Distributed Environment Using Soft Computing Algorithms," 2021 International Conference on Emerging Smart Computing and Informatics (ESCI), 2021, pp. 1-5, DOI: 10.1109/ESCI50559.2021.9396825. BIOGRAPHIES Mrs. Reshma Totare Assistant Professor Dept. of Information Technology AISSMS IOIT, Pune Varad Bhalsing BE-IT AISSMS IOIT, Pune Mayur Lende BE-IT AISSMS IOIT, Pune Tejas Maramwar BE-IT AISSMS IOIT, Pune Chirag Naikwadi BE-IT AISSMS IOIT, Pune