Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2022 Feb 1:2022:2103975.
doi: 10.1155/2022/2103975. eCollection 2022.

Mask Detection and Social Distance Identification Using Internet of Things and Faster R-CNN Algorithm

Affiliations

Mask Detection and Social Distance Identification Using Internet of Things and Faster R-CNN Algorithm

S Meivel et al. Comput Intell Neurosci. .

Abstract

The drones can be used to detect a group of people who are unmasked and do not maintain social distance. In this paper, a deep learning-enabled drone is designed for mask detection and social distance monitoring. A drone is one of the unmanned systems that can be automated. This system mainly focuses on Industrial Internet of Things (IIoT) monitoring using Raspberry Pi 4. This drone automation system sends alerts to the people via speaker for maintaining the social distance. This system captures images and detects unmasked persons using faster regions with convolutional neural network (faster R-CNN) model. When the system detects unmasked persons, it sends their details to respective authorities and the nearest police station. The built model covers the majority of face detection using different benchmark datasets. OpenCV camera utilizes 24/7 service reports on a daily basis using Raspberry Pi 4 and a faster R-CNN algorithm.

PubMed Disclaimer

Conflict of interest statement

The authors declare that there are no conflicts of interest.

Figures

Figure 1
Figure 1
Constituents of the proposed model.
Figure 2
Figure 2
Convolution theorem.
Figure 3
Figure 3
Flow process of the proposed methodology.
Figure 4
Figure 4
Pseudocode for detection of bounding box using OpenCV camera.
Figure 5
Figure 5
Count of the testing dataset in various classnames.
Figure 6
Figure 6
Variation of validation loss with training models.
Figure 7
Figure 7
Variation of validation accuracy with training models.
Figure 8
Figure 8
Mask count (pink colored) and unmask count (green colored).
Figure 9
Figure 9
Social distance maintenance and green/orange/red object detection.
Figure 10
Figure 10
Overview of the drone monitoring system components.

References

    1. Rustam F., Reshi A. A., Mehmood A., et al. COVID-19 Future Forecasting Using Supervised Machine Learning Models. IEEE Access . 2020;8 doi: 10.1109/ACCESS.2020.2997311.101489 - DOI
    1. Sindhwani N., Maurya V. P., Patel A., Yadav R. K., Krishna S., Anand R. Internet of Things and its Applications . Cham, Switzerland: Springer; 2022. Implementation of intelligent plantation system using virtual IoT; pp. 305–322. - DOI
    1. Singh D., Kumar V., Kaur M., Jabarulla M. Y., Lee H.-N. Screening of COVID-19 suspected subjects using multi-crossover genetic algorithm based dense convolutional neural network. IEEE Access . 2021;9 doi: 10.1109/ACCESS.2021.3120717.142566 - DOI
    1. Anand R., Sinha A., Bhardwaj A., Sreeraj A. Handbook of Research on Network Forensics and Analysis Techniques . Hershey, PA, USA: IGI Global; 2018. Flawed security of social network of things; pp. 65–86. - DOI
    1. Anand R., Sindhwani N., Saini A. Enabling Healthcare 4.0 for Pandemics: A Roadmap Using AI, Machine Learning, IoT and Cognitive Technologies . Beverly, MA, USA: Scrivener Publishing LLC; 2021. Emerging Technologies for COVID‐19; pp. 163–188. - DOI

LinkOut - more resources