architectures, in addressing the challenges posed by
image-based anomaly detection. As industries
increasingly adopt automated systems for quality
assurance, our work contributes to the evolving
landscape of artificial intelligence applications to
enhance precision and reliability in industrial
processes.
ACKNOWLEDGEMENTS
My deepest gratitude goes out to Dr. Manoj
Hudnurkar and Dr. Suhas Ambekar from Symbiosis
Centre for Management and Human Resource
Development, (SCMHRD), Symbiosis International
(Deemed University) and to Geeta Sahu, Assistant
Professor in the Department of Information
Technology & Data Science at Vidyalankar School of
Information Technology (VSIT), Mumbai, for their
unwavering support. They continuously offered
support and direction while preparing this research
paper. I also want to thank everyone who assisted us
directly and indirectly with the study documentation.
REFERENCES
S. Dlamini, C.-Y. Kao, S.-L. Su and C.-F. J. Kuo,
“Development of a real-time machine vision system for
functional textile fabric defect detection using a deep
YOLOv4 model,” Textile Research Journal, vol. 92, no.
5-6, 6 September 2021.
L. B. Y. B. a. P. H. Y. LeCun, “Gradient-based learning
applied to document recognition,” Proceedings of the
IEEE,vol. 86, pp. 2278-2324, 1998.
I. S. a. G. E. H. A. Krizhevsky, “ImageNet Classification
with Deep Convolutional Neural Networks,”
Proceedings of the 25th International Conference on
Neural Information Processing Systems, pp. 1097-
1105, 2012.
K. He, X. Zhang, S. Ren and J. Sun, “Deep residual learning
for image recognition,” in 2016 IEEE Conference on
Computer Vision and Pattern Recognition (CVPR), Las
Vegas, NV, USA, 2016.
M. Sohan, T. SaiRam and C. V. RamiReddy, “A Review on
YOLOv8 and its Advancements,” in Data Intelligence
and Cognitive Informatics, ResearchGate, 2024, pp.
529-545.
J. Redmon, S. Divvala, R. Girshick and A. Farhadi, “You
Only Look Once:Unified, Real-Time Object
Detection,” in 2016 IEEE Conference on Computer
Vision and Pattern Recognition, 2016.
S. Ren, K. He, R. Girshick and J. Sun, “Networks, Faster
R-CNN: Towards Real-Time Object Detection with
Region Proposal,” IEEE Transactions on Pattern
Analysis and Machine Intelligence, vol. 39, no. 6, 2017.
M. Hussain, “YOLO-v1 to YOLO-v8, the Rise of YOLO
and Its Complementary Nature toward Digital
Manufacturing and Industrial Defect Detection,”
Machines, 2023.
C. D. P. T. &. A. M. Salimans T, “Ethereum Fraud
Detection using Machine Learning,” 2018.
T. B. P. Z. L.-H. Lee, “All one needs to know about
metaverse: a complete survey on technological
singularity, virtual ecosystem, and research agenda,”
Journal of Latex Class FIles, 2021.
M. ALRUWAILI, M. N. ATTA, M. H. SIDDIQI, A.
KHAN, A. KHAN, Y. ALHWAITI and S. ALANAZ,
“Deep Learning-Based YOLO Models for the
Detection of People With Disabilities,” IEEE Access,
25 December 2023.
F. M. G. B. a. E. L. D. Carrera, “Defect Detection in SEM
Images of Nanofibrous Materials,” IEEE Transactions
on Industrial Informatics, pp. 551-561, 2017.
M. F. D. S. a. C. S. P. Bergmann, “MVTec AD — A
Comprehensive Real-World Dataset for Unsupervised
Anomaly Detection,” IEEE/CVF Conference on
Computer Vision and Pattern Recognition (CVPR), pp.
9584-9592, 2019.
S. X. Z. Z. &. L. H. Wang Y, “Ethereum Fraud Detection
using Transaction Network Analysis,” 2021 IEEE
International Conference on High Performance
Computing and Communications, pp. 1920-1927,
2021.
A. K. a. G. Hinton, “Learning multiple layers of features
from tiny images,” Technical report, University of
Toronto, p. 2009.
J. A. a. S. Cho, “Variational Autoencoder based Anomaly
Detection using Reconstruction Probability,” Technical
report SNU Data Mining Center, 2015.
A. K. M. a. S. C. R. Chalapathy, “Anomaly Detection using
One-Class Neural Networks,” 2018.
R. V. N. G. L. D. S. A. S.-d. A. B. L. Ruff, “Deep One-
Class Classification,” Proceedings of the 35th
International Conference on Machine Learning volume
80 of Proceedings of Machine Learning Research,, pp.
4393-4402, 2018.
V.Buterin, “Ethereum White Paper: a next generation smart
contract & decentralized application platform,” 2013.
A. F. a. A. E. B. Saleh, “Object-Centric Anomaly Detection
by Attribute-Based Reasoning,” IEEE Conference on
Computer Vision and Pattern Recognition, pp. 787-
794, 2013.
S. M. A. E. L. V. G. C. K. I. W. J. W. a. A. Z. M.
Everingham, “The Pascal Visual Object Classes
Challenge: A Retrospective,” International Journal of
Computer Vision, pp. 98-136, 2015.
A. E. &. C. S. Karame G.O, “Identifying Ethereum Fraud
Detection using Graph Based Analysis,” In Proceeding
of the 2018 ACM SIGSAC Conference on Compute
and Communications Security, pp. 177-194, 2018.
P. G. E. H. R. M. N. a. R. S. Z. Dayan, “The Helmholtz
Machine,” Neural Computation, pp. 889-904, 1995.
D. P. K. a. M. Welling, “An Introduction to Variational
Autoencoders,” Foundations and Trends in Machine
Learning: Vol xx, No. xx, pp. 1-18, 2019.