Submit Search
Upload
CAR DAMAGE DETECTION AND PRICE PREDICTION USING DEEP LEARNING
•
0 likes
•
256 views
IRJET Journal
Follow
https://www.irjet.net/archives/V10/i1/IRJET-V10I180.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
Étude et réalisation d’une application de contrôle d’un PC à distance en JAVA...
Étude et réalisation d’une application de contrôle d’un PC à distance en JAVA...
Bachir Benyammi
Mise en place d'une solution de détection des pirates et des malwares dans le...
Mise en place d'une solution de détection des pirates et des malwares dans le...
Mohamed Ben Bouzid
Rapport de fin de stage maintenance info
Rapport de fin de stage maintenance info
JennellyHollywood Shookou
Gestion des threads
Gestion des threads
Sana Aroussi
Mise en place d’une solution de tests de sécurité pour les passerelles réside...
Mise en place d’une solution de tests de sécurité pour les passerelles réside...
Salmen HITANA
Assembleur et binaire
Assembleur et binaire
Bruno Delb
Cours sécurité 2_asr
Cours sécurité 2_asr
TECOS
Ppt
Ppt
Guillaume Hautcoeur
Recommended
Étude et réalisation d’une application de contrôle d’un PC à distance en JAVA...
Étude et réalisation d’une application de contrôle d’un PC à distance en JAVA...
Bachir Benyammi
Mise en place d'une solution de détection des pirates et des malwares dans le...
Mise en place d'une solution de détection des pirates et des malwares dans le...
Mohamed Ben Bouzid
Rapport de fin de stage maintenance info
Rapport de fin de stage maintenance info
JennellyHollywood Shookou
Gestion des threads
Gestion des threads
Sana Aroussi
Mise en place d’une solution de tests de sécurité pour les passerelles réside...
Mise en place d’une solution de tests de sécurité pour les passerelles réside...
Salmen HITANA
Assembleur et binaire
Assembleur et binaire
Bruno Delb
Cours sécurité 2_asr
Cours sécurité 2_asr
TECOS
Ppt
Ppt
Guillaume Hautcoeur
Intelligence Artificielle et cybersécurité
Intelligence Artificielle et cybersécurité
OPcyberland
rapport-projet-de-fin-detudes
rapport-projet-de-fin-detudes
Achraf Mokhtari
Rapport PFE: Gestion de Parc Informatique
Rapport PFE: Gestion de Parc Informatique
Eric Maxime
Presentation arduino
Presentation arduino
SinGuy
Présentation E-Learning
Présentation E-Learning
Ghribi Achref
srep_cours_01.pdf
srep_cours_01.pdf
SamirAwad14
Installation et Configuration ee JDK et de Tomcat
Installation et Configuration ee JDK et de Tomcat
Mohamed Ben Bouzid
Reconnaissance faciale (1)
Reconnaissance faciale (1)
laurence allard
Cyber&digital forensics report
Cyber&digital forensics report
yash sawarkar
Computer forensics and its role
Computer forensics and its role
Sudeshna Basak
Tests de performances
Tests de performances
Damien Raude-Morvan
ETUDE ET MISE EN PLACE D'UNE SOLUTION DE CLOUD COMPUTING PRIVÉ BASÉE SUR UN ...
ETUDE ET MISE EN PLACE D'UNE SOLUTION DE CLOUD COMPUTING PRIVÉ BASÉE SUR UN ...
Borel NZOGANG
Asi gestionnaire de parc informatique (admissibilité) qcm bap e 2009
Asi gestionnaire de parc informatique (admissibilité) qcm bap e 2009
Soufien Zarrouki
Systèmes d'Exploitation - chp1-introduction
Systèmes d'Exploitation - chp1-introduction
Lilia Sfaxi
Atelier Informatique
Atelier Informatique
Aurélien-Alexandre Debord
MEMOIRE DE STAGE
MEMOIRE DE STAGE
jemmeli nejmeddine
Rapport de projet de fin d'étude licence informatique et multimédia
Rapport de projet de fin d'étude licence informatique et multimédia
Nazih Heni
Reconnaissance faciale
Reconnaissance faciale
bgdu49xxx
Étude et réalisation d’une application de contrôle d’un PC à distance en JAVA...
Étude et réalisation d’une application de contrôle d’un PC à distance en JAVA...
Bachir Benyammi
projet interface LabView avec conception prototype machine de tri
projet interface LabView avec conception prototype machine de tri
Moatez Amairi
IRJET- Damage Assessment for Car Insurance
IRJET- Damage Assessment for Car Insurance
IRJET Journal
IRJET - Automatic Car Insurance using Image Analysis
IRJET - Automatic Car Insurance using Image Analysis
IRJET Journal
More Related Content
What's hot
Intelligence Artificielle et cybersécurité
Intelligence Artificielle et cybersécurité
OPcyberland
rapport-projet-de-fin-detudes
rapport-projet-de-fin-detudes
Achraf Mokhtari
Rapport PFE: Gestion de Parc Informatique
Rapport PFE: Gestion de Parc Informatique
Eric Maxime
Presentation arduino
Presentation arduino
SinGuy
Présentation E-Learning
Présentation E-Learning
Ghribi Achref
srep_cours_01.pdf
srep_cours_01.pdf
SamirAwad14
Installation et Configuration ee JDK et de Tomcat
Installation et Configuration ee JDK et de Tomcat
Mohamed Ben Bouzid
Reconnaissance faciale (1)
Reconnaissance faciale (1)
laurence allard
Cyber&digital forensics report
Cyber&digital forensics report
yash sawarkar
Computer forensics and its role
Computer forensics and its role
Sudeshna Basak
Tests de performances
Tests de performances
Damien Raude-Morvan
ETUDE ET MISE EN PLACE D'UNE SOLUTION DE CLOUD COMPUTING PRIVÉ BASÉE SUR UN ...
ETUDE ET MISE EN PLACE D'UNE SOLUTION DE CLOUD COMPUTING PRIVÉ BASÉE SUR UN ...
Borel NZOGANG
Asi gestionnaire de parc informatique (admissibilité) qcm bap e 2009
Asi gestionnaire de parc informatique (admissibilité) qcm bap e 2009
Soufien Zarrouki
Systèmes d'Exploitation - chp1-introduction
Systèmes d'Exploitation - chp1-introduction
Lilia Sfaxi
Atelier Informatique
Atelier Informatique
Aurélien-Alexandre Debord
MEMOIRE DE STAGE
MEMOIRE DE STAGE
jemmeli nejmeddine
Rapport de projet de fin d'étude licence informatique et multimédia
Rapport de projet de fin d'étude licence informatique et multimédia
Nazih Heni
Reconnaissance faciale
Reconnaissance faciale
bgdu49xxx
Étude et réalisation d’une application de contrôle d’un PC à distance en JAVA...
Étude et réalisation d’une application de contrôle d’un PC à distance en JAVA...
Bachir Benyammi
projet interface LabView avec conception prototype machine de tri
projet interface LabView avec conception prototype machine de tri
Moatez Amairi
What's hot
(20)
Intelligence Artificielle et cybersécurité
Intelligence Artificielle et cybersécurité
rapport-projet-de-fin-detudes
rapport-projet-de-fin-detudes
Rapport PFE: Gestion de Parc Informatique
Rapport PFE: Gestion de Parc Informatique
Presentation arduino
Presentation arduino
Présentation E-Learning
Présentation E-Learning
srep_cours_01.pdf
srep_cours_01.pdf
Installation et Configuration ee JDK et de Tomcat
Installation et Configuration ee JDK et de Tomcat
Reconnaissance faciale (1)
Reconnaissance faciale (1)
Cyber&digital forensics report
Cyber&digital forensics report
Computer forensics and its role
Computer forensics and its role
Tests de performances
Tests de performances
ETUDE ET MISE EN PLACE D'UNE SOLUTION DE CLOUD COMPUTING PRIVÉ BASÉE SUR UN ...
ETUDE ET MISE EN PLACE D'UNE SOLUTION DE CLOUD COMPUTING PRIVÉ BASÉE SUR UN ...
Asi gestionnaire de parc informatique (admissibilité) qcm bap e 2009
Asi gestionnaire de parc informatique (admissibilité) qcm bap e 2009
Systèmes d'Exploitation - chp1-introduction
Systèmes d'Exploitation - chp1-introduction
Atelier Informatique
Atelier Informatique
MEMOIRE DE STAGE
MEMOIRE DE STAGE
Rapport de projet de fin d'étude licence informatique et multimédia
Rapport de projet de fin d'étude licence informatique et multimédia
Reconnaissance faciale
Reconnaissance faciale
Étude et réalisation d’une application de contrôle d’un PC à distance en JAVA...
Étude et réalisation d’une application de contrôle d’un PC à distance en JAVA...
projet interface LabView avec conception prototype machine de tri
projet interface LabView avec conception prototype machine de tri
Similar to CAR DAMAGE DETECTION AND PRICE PREDICTION USING DEEP LEARNING
IRJET- Damage Assessment for Car Insurance
IRJET- Damage Assessment for Car Insurance
IRJET Journal
IRJET - Automatic Car Insurance using Image Analysis
IRJET - Automatic Car Insurance using Image Analysis
IRJET Journal
Car Damage Assessment to Automate Insurance Claim
Car Damage Assessment to Automate Insurance Claim
IRJET Journal
Self Driving Car
Self Driving Car
IRJET Journal
Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...
Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...
IRJET Journal
AUTONOMOUS SELF DRIVING CARS
AUTONOMOUS SELF DRIVING CARS
IRJET Journal
Vigilance: Vehicle Detector and Tracker
Vigilance: Vehicle Detector and Tracker
IRJET Journal
IRJET- Number Plate Extraction from Vehicle Front View Image using Image ...
IRJET- Number Plate Extraction from Vehicle Front View Image using Image ...
IRJET Journal
CAR DAMAGE DETECTION USING DEEP LEARNING
CAR DAMAGE DETECTION USING DEEP LEARNING
IRJET Journal
IRJET- Review on Vehicle Detection and Tracking for High Sensitive Area and E...
IRJET- Review on Vehicle Detection and Tracking for High Sensitive Area and E...
IRJET Journal
Helmet Detection using Machine Learning
Helmet Detection using Machine Learning
IRJET Journal
Vision-Based Motorcycle Crash Detection and Reporting Using Deep Learning
Vision-Based Motorcycle Crash Detection and Reporting Using Deep Learning
IRJET Journal
Object Detection for Autonomous Driving
Object Detection for Autonomous Driving
IRJET Journal
IRJET- A Deep Learning based Approach for Automatic Detection of Bike Rid...
IRJET- A Deep Learning based Approach for Automatic Detection of Bike Rid...
IRJET Journal
IRJET- Reckoning the Vehicle using MATLAB
IRJET- Reckoning the Vehicle using MATLAB
IRJET Journal
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET Journal
Smart Parking Solution using Camera Networks and Real-time Computer Vision
Smart Parking Solution using Camera Networks and Real-time Computer Vision
IRJET Journal
Next generation engine immobiliser
Next generation engine immobiliser
eSAT Journals
Next generation engine immobiliser
Next generation engine immobiliser
eSAT Publishing House
DROWSINESS DETECTION MODEL USING PYTHON
DROWSINESS DETECTION MODEL USING PYTHON
IRJET Journal
Similar to CAR DAMAGE DETECTION AND PRICE PREDICTION USING DEEP LEARNING
(20)
IRJET- Damage Assessment for Car Insurance
IRJET- Damage Assessment for Car Insurance
IRJET - Automatic Car Insurance using Image Analysis
IRJET - Automatic Car Insurance using Image Analysis
Car Damage Assessment to Automate Insurance Claim
Car Damage Assessment to Automate Insurance Claim
Self Driving Car
Self Driving Car
Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...
Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...
AUTONOMOUS SELF DRIVING CARS
AUTONOMOUS SELF DRIVING CARS
Vigilance: Vehicle Detector and Tracker
Vigilance: Vehicle Detector and Tracker
IRJET- Number Plate Extraction from Vehicle Front View Image using Image ...
IRJET- Number Plate Extraction from Vehicle Front View Image using Image ...
CAR DAMAGE DETECTION USING DEEP LEARNING
CAR DAMAGE DETECTION USING DEEP LEARNING
IRJET- Review on Vehicle Detection and Tracking for High Sensitive Area and E...
IRJET- Review on Vehicle Detection and Tracking for High Sensitive Area and E...
Helmet Detection using Machine Learning
Helmet Detection using Machine Learning
Vision-Based Motorcycle Crash Detection and Reporting Using Deep Learning
Vision-Based Motorcycle Crash Detection and Reporting Using Deep Learning
Object Detection for Autonomous Driving
Object Detection for Autonomous Driving
IRJET- A Deep Learning based Approach for Automatic Detection of Bike Rid...
IRJET- A Deep Learning based Approach for Automatic Detection of Bike Rid...
IRJET- Reckoning the Vehicle using MATLAB
IRJET- Reckoning the Vehicle using MATLAB
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
Smart Parking Solution using Camera Networks and Real-time Computer Vision
Smart Parking Solution using Camera Networks and Real-time Computer Vision
Next generation engine immobiliser
Next generation engine immobiliser
Next generation engine immobiliser
Next generation engine immobiliser
DROWSINESS DETECTION MODEL USING PYTHON
DROWSINESS DETECTION MODEL USING PYTHON
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
121011101441
multiple access in wireless communication
multiple access in wireless communication
panditadesh123
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
Earthing details of Electrical Substation
Earthing details of Electrical Substation
stephanwindworld
Research Methodology for Engineering pdf
Research Methodology for Engineering pdf
CaalaaAbdulkerim
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
siddharthjain2303
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
bim.edu.pl
Virtual memory management in Operating System
Virtual memory management in Operating System
Rashmi Bhat
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Erbil Polytechnic University
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
Mebane Rash
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
Alluxio, Inc.
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
Madan Karki
DM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in project
ssuserb6619e
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
saravananr517913
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
Romil Mishra
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.ppt
Narmatha D
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
BootNeck1
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
aditya806802
Cooling Tower SERD pH drop issue (11 April 2024) .pptx
Cooling Tower SERD pH drop issue (11 April 2024) .pptx
mamansuratman0253
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
ChristianCDAM
Recently uploaded
(20)
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
multiple access in wireless communication
multiple access in wireless communication
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
Earthing details of Electrical Substation
Earthing details of Electrical Substation
Research Methodology for Engineering pdf
Research Methodology for Engineering pdf
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
Virtual memory management in Operating System
Virtual memory management in Operating System
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
DM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in project
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.ppt
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
Cooling Tower SERD pH drop issue (11 April 2024) .pptx
Cooling Tower SERD pH drop issue (11 April 2024) .pptx
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
CAR DAMAGE DETECTION AND PRICE PREDICTION USING DEEP LEARNING
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 458 CAR DAMAGE DETECTION AND PRICE PREDICTION USING DEEP LEARNING Prof. Reshma Totare1, Varad Bhalsing2, Mayur Lende3, Tejas Maramwar4, Chirag Naikwadi5 Dept. of Information Technology, AISSMS’s Institute of Information Technology, Pune-1, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Auto insurance processing using images is a critical industry with a lot of room for automation. In this study, we will look at the topic of car damage detection. Vehicle damage detection. Using pictures taken at thescene of an accident can save time and money when filing insurance claims, as well as provide more convenience to drivers. Artificial intelligence (AI) in the senseofmachinelearning and deep learning algorithms can help solve problems. A transfer learning-based vehicle damage detection technique and a regional convolutional neural network(MaskRCNN)mask are used to quickly solve accident compensation problems. Algorithms identify the damaged part of the car, determine its location, and then estimate the severity of the damage. Very satisfactory results were obtained using transfer learning using available models that were trained for the moregeneral challenge of object identification. Key Words: Car Damage Detection, Machine learning, Prediction, VGG16, Transfer Learning, Deep Learning, Price Prediction 1. INTRODUCTION Today, one of the first businesses to invest in innovation, cutting-edge technology, and artificial intelligence(AI)isthe insurance industry. Car insurance companiesspendmillions of dollars each year due to evasion of insurance claims in today's society where the number of car accidents is on the rise.. In the insurance industry, Artificial intelligence (AI) based on machine learning and deep learningcanassistwith challenges including data analysis and processing, fraud detection, risk reduction, and claim automation. As a result, insurance companies have sought to reduce the timeittakes to analyze damage and settle claims. However, developing current applications to solve these problems remains difficult, especially when using deep learning to assess car damage. Deep learning is an effective method for tackling complicated problems,butitnecessitatesmore resources for model building, i.e., deep learning demands a large dataset and takes longer to compute. There are no publicly available datasets for automobile damaged photos because car damage assessment is a specializedtopic.Thehardestpartof training a model is doing it with a small data set.However, in this instance we use a dataset format called COCO format. Using a Mask RCNN algorithm on a small COCO dataset has also shown precise results. Detectron2 which is one of the open-source python library from Facebook provide pre- trained model has been used. The Mask RCNN method is used in the paper to detect and segment damaged areas of cars. It has a lot of research value and a lot of application scenarios in the transportation area. Due to the complexity of automatic damage detection and segmentation, issues such as reduced segmentation and lower detection speed exist. The Mask RCNN is applied to the field of this research, and a model for detecting and segmenting a vehicle's damaged region in an accident is proposed. Insurance companies can also use this model to quickly process insurance claims. Risk Analysis: Image size - The security of the application depends upon the size of the image. If we use images of small size then the options for selecting the pixels is less, this reduces the time required to decipher the key from the image. The number of pixels in an image with height h and width w is w*h. The intruder or attacker has to check all the combinations of choosing the pixels from the image to decipher the key from the image. By increasing the size of the image, we can increase the security of the application. 2. LITERATURE REVIEW A previous study [1] has used pre-trained deep learning models, MobileNet and YOLO, and have been applied on a customized vehicle damage dataset. YOLO algorithm is used for detection but YOLO’s full utilization is in classifying multiple objects. In this case, only a single object i.e. car is to be detected where VGG-16 can be used. Another study by Umer Waqas, Nimra Akram, Soohwa Kim, Donghun Lee, Jihoon Jeon [2] uses algorithm to classifies three types of vehicle damage categories which include medium damage, huge damageor nodamage.Also,metadata analysis and moiré effect detection is used to verify the authenticity of the images uploaded by users. In [3], an insight to further more improvement is suggested. Robust Mask RCNN algorithm is utilized which improves on previous work yet is still lacking in few areas. For example, the detection accuracy is very high, but the mask instance segmentation cannot be completely correct, and some areas in which the damage is not obvious cannot be segmented. Another paper [4] proposes a deep learning-based solution for car damage classification. Since there was no publicly available dataset, they created a new dataset by collecting
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 459 images from web and manually annotating them. Experimented with multiple deeplearning-basedtechniques such as training CNNs from random initialization, Convolution Autoencoder based pre-training followed by supervised fine tuning and transfer learning. 3. PROPOSED SYSTEM ARCHITECTURE The different steps which will be carried out in order to create and use different classifiers and get most probable results. Out of the different results and accuracies produced by different Machine Learning models, we will utilize the best model with the best accuracy for Car damage detection and price prediction. System Architecture will give us an overview of the working of the system. 5.1. System Architecture Fig. 1: Car Damage Detection Architecture Web App: Here users can upload images of the damaged car or any random images which will be processed by our algorithm using the GUI which is created using HTML, CSS, Bootstrap and integrated by flask. Module-1: In this module, VGG-16 is used to detect whether the uploaded image is a car or not.. Module-2: Here, car damage is detected using VGG-16, VGG-19 and ResNet-50. The model that gives us the most accuracy is considered.. Module-3: The side of the vehicle where the damaged is incurred i.e. In the rear part, front part or side part is identified using this module. Module-4: The damage level is further decided in this module.Thelevel of damage is decided by data visualization using heat maps. A heatmap is a two-dimensional visual representation of data where values are color-coded, providing a convenient and insightful view of information. Module-5: Depending on the damage, the location of the damage and the model of the car, the cost of repairing the damage will be predicted. 4. PROJECT DESIGN The below figure 2, represents the Data Flow Diagram of proposed system. The customer/user uploads the image of car. Then that image is processed and the report of damage is generated and it is sent back to the user. Fig- 2: Data Flow Diagram Here, the first module detectswhethertheuploadedimageis of car or not. If the car is not detected then it returns back to the initial stage. And if car is detected then further modules take place. The next module detects whether the uploaded image of car has damage or not. If the damageisnotdetected then it returns back to initial stage. Once the damage is detected, further modules detects location(front,side,back) and severity (minor, moderate, major). Above modules will help in predicting the price.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 460 5. GUI AND EXPERIMENTAL RESULTS User Interface has been developed. Also the first module which detects the car has been integrated using flask. Fig- 3: Home Page Home page provides basic interface withtheoptionshowing Upload Image. Fig- 4: Interface to upload image After clicking on Upload Image on Home Page, option is given to upload image and predict that image is of car or not. Here, the data of the first module which detects whether the uploaded image is of car or not is integrated. The first module is trained using VGG-16. Fig-5: Car Detected Fig 5 shows that the uploaded image is of car. Once the car is detected, it will direct user to next step i.e. Damage Evaluation. Fig- 6: Car not detected Above fig 6 shows when the uploaded image is not of car. If the car is not detected then user is recommendedtoretake photo and then upload again. 6. IMPORTANT LIBRARIES /PACKAGE KERAS: A Python interface for artificial neural networks is provided by the open-source software package known as Keras. The TensorFlow library interface is provided by Keras. TensorFlow: TensorFlow is an open-source, free machine learning and artificial intelligencesoftwarelibrary. Although deep neural network training and inference are given specific attention, it can be used for a variety of tasks. VGG-16 and VGG-19: VGG stands for Visual Geometry Group; it is a standard deep Convolutional Neural Network (CNN) architecture withmultiplelayers.VGG-16andVGG-19 consisting of 16 and 19 convolutional layers respectively. ResNet-50: It is a Convolutional Neural Network (CNN)that is 50 layers deep. Here, we can load a pretrained version of the network trained on more than a million images from the ImageNet database 7. CONCLUSION To deal with the compensating problem of damaged autos, the model proposed here employs, a deep learning-based detection technique for vehicle-damage identification. The suggested approach of transfer learning-based damage detection of the vehicle is generic after testing, and can also better adapt to the diverse elements of damaged car images. Despite the model's training on a very short dataset, successful outcomes were obtained. Data extension can be done in the future to raise the dataset's size, gather additional automobiledamageimagesundervariousdegrees of illumination and weather conditions, enrich the data, the
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 461 edge contour enhancement of images can be improved and the damaged parts of the car canbemaskedmoreaccurately. Also, the model can be further enhancedto predicttherepair price of the damaged area by extracting the predicted part details like the segmented mask area. REFERENCES [1] “Automated Detection of Multi-class Vehicle Exterior Damages using Deep Learning” | Maleika Heenaye- Mamode Khan, Mohammad Zafir Hussein Sk Heerah, Zuhairah Basgeeth | IEEE 2021 | DOI:10.1109/ICECCME52200.2021.9590927 [2] “Vehicle Damage Classification and Fraudulent Image Detection Including Moiré Effect Using Deep Learning”| Umer Waqas, Nimra Akram, Soohwa Kim, Donghun Lee, Jihoon Jeon | 2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE) [3] “Vehicle-Damage-Detection Segmentation Algorithm Based on Improved Mask RCNN” | Qinghui Zhang, Xianing Chang, and Shanfeng Bian | IEEE Access | DOI: 10.1109/ACCESS.2020.2964055 [4] “Deep Learning Based Car Damage Classification” | Kalpesh Patil, Mandar Kulkarniy, Anand Sriramany and Shirish Karande [5] R. S. Gaykar, V. Khanaa and S. D. Joshi, "Detection of Faulty Nodes in DistributedEnvironmentusingMachine Learning," 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), 2021, pp. 228-232, DOI: 10.1109/ICAC3N53548.2021.9725478. [6] R. S. Gaykar, C. Nalini and S. D. Joshi, "Identification of Straggler Node in Distributed Environment Using Soft Computing Algorithms," 2021 International Conference on Emerging Smart Computing and Informatics (ESCI), 2021, pp. 1-5, DOI: 10.1109/ESCI50559.2021.9396825. BIOGRAPHIES Mrs. Reshma Totare Assistant Professor Dept. of Information Technology AISSMS IOIT, Pune Varad Bhalsing BE-IT AISSMS IOIT, Pune Mayur Lende BE-IT AISSMS IOIT, Pune Tejas Maramwar BE-IT AISSMS IOIT, Pune Chirag Naikwadi BE-IT AISSMS IOIT, Pune
Download now