{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:39:38Z","timestamp":1772725178825,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T00:00:00Z","timestamp":1701475200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T00:00:00Z","timestamp":1701475200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Manipal Academy of Higher Education, Manipal"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The spotlight of our discussion here is on developing a model for detecting snakes present in the agricultural fields using cameras and machine learning algorithms. The idea is to construct a machine learning model to identify the snakes, which will be trained on a vast set of images of snakes. These images will be carefully selected to include the snake patterns, skin color of different species of snakes (extraction of the unique features). This is done to train the model properly to identify different types of snakes that the farmer encounters in the fields. Most famers are unaware and have a need for a way to detect these snakes so that they can either avoid them or get rid of them. Hence, this system can be implemented to prevent thousands of deaths and can help famers alleviate the repercussions of snake bites. Mistakes in recognizing potentially harmful animal species based only on visual cues are major contributors to the high death toll from venomous animal attacks. Since they spend so much time in the fields, where rice and wheat are cultivated, farmers are at a higher risk of being bitten by a snake than the general population. Because of their ignorance, illiterate farmers are more inclined to believe in superstitions, which can lead to their untimely deaths from snakebites despite medical intervention. Animals that would normally pose no threat to humans are responsible for the deaths of thousands of people every year because of environmental factors. However, because it is hard for humans to recognize these dangers, a new design paradigm has been developed to make it simpler. Researchers in the field of animal biology can use it to search for endangered species. Predators may enter gardens and green areas like tea and coffee plantations. There is not yet a plan in place to implement automated sorting for discovering distinctions. By applying the suggested framework to photographs of potentially dangerous animals, several factors useful for studying animal organization may be easily identified. For the classifier to run in real-time, it is suggested that YOLO be utilized for double processing within the framework. Furthermore, the YOLO technique enables quick animal recognition in a similar fashion. First, the YOLO method will be used to determine whether a snake is present in the proposed work. Here, 87 percent precision is also reached in the detection of snakes.<\/jats:p>","DOI":"10.1007\/s42979-023-02366-z","type":"journal-article","created":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T14:02:04Z","timestamp":1701525724000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A Novel Framework for Detection of Harmful Snakes Using YOLO Algorithm"],"prefix":"10.1007","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8368-836X","authenticated-orcid":false,"given":"E.","family":"Naresh","sequence":"first","affiliation":[]},{"given":"J. Ananda","family":"Babu","sequence":"additional","affiliation":[]},{"given":"S. L. Shiva","family":"Darshan","sequence":"additional","affiliation":[]},{"given":"S. V. N.","family":"Murthy","sequence":"additional","affiliation":[]},{"given":"N. N.","family":"Srinidhi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,2]]},"reference":[{"key":"2366_CR1","doi-asserted-by":"publisher","unstructured":"Dewi C, Chen R-C, Hendry, Liu Y-T. Similar music instrument detection via deep convolution YOLO-generative adversarial network. In: 2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST), Morioka, Japan, 2019, pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICAwST.2019.8923404.","DOI":"10.1109\/ICAwST.2019.8923404"},{"key":"2366_CR2","doi-asserted-by":"publisher","unstructured":"Mahendru M, Dubey SK. Real time object detection with audio feedback using yolo vs. Yolo_v3. In: 2021 11th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India, 2021, pp. 734\u2013740. https:\/\/doi.org\/10.1109\/Confluence51648.2021.9377064.","DOI":"10.1109\/Confluence51648.2021.9377064"},{"key":"2366_CR3","doi-asserted-by":"publisher","unstructured":"Heda L, Sahare P. Performance evaluation of YOLOv3, YOLOv4 and YOLOv5 for real-time human detection. In: 2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS), Nagpur, India, 2023, pp. 1\u20136. https:\/\/doi.org\/10.1109\/PCEMS58491.2023.10136081.","DOI":"10.1109\/PCEMS58491.2023.10136081"},{"key":"2366_CR4","doi-asserted-by":"publisher","unstructured":"Redmon J, Divvala S, Girshick R, Farhadi A. You Only look once: unified, real-time object detection. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA, 2016, pp. 779\u2013788. https:\/\/doi.org\/10.1109\/CVPR.2016.91.","DOI":"10.1109\/CVPR.2016.91"},{"key":"2366_CR5","doi-asserted-by":"publisher","unstructured":"Tummapudi S, Sadhu SS, Simhadri SN, Damarla SNT, Bhukya M. Deep Learning Based Weed Detection and Elimination in Agriculture. In: 2023 International Conference on Inventive Computation Technologies (ICICT), Lalitpur, Nepal, 2023, pp. 147\u2013151. https:\/\/doi.org\/10.1109\/ICICT57646.2023.10134186.","DOI":"10.1109\/ICICT57646.2023.10134186"},{"key":"2366_CR6","doi-asserted-by":"publisher","unstructured":"Shen J, et al. Ultra-fast on-chip sensing for PCR detection with machine learning-based image processing algorithm. In: 2022 China Semiconductor Technology International Conference (CSTIC), Shanghai, China, 2022, pp. 1-4. https:\/\/doi.org\/10.1109\/CSTIC55103.2022.9856872","DOI":"10.1109\/CSTIC55103.2022.9856872"},{"key":"2366_CR7","doi-asserted-by":"publisher","unstructured":"Hou Y-B, Xiao Y. Active snake algorithm on the edge detection for gallstone ultrasound images. In: 2008 9th International Conference on Signal Processing, Beijing, China, 2008, pp. 474\u2013477. https:\/\/doi.org\/10.1109\/ICOSP.2008.4697173.","DOI":"10.1109\/ICOSP.2008.4697173"},{"key":"2366_CR8","doi-asserted-by":"publisher","unstructured":"Hu JJ, Wang XH, Peng Y, Xu Y, Shi XW. Bionic snake-shaped detection robot based on millimeter wave radar. In: 2022 International Conference on Microwave and Millimeter Wave Technology (ICMMT), Harbin, China, 2022, pp. 1\u20133. https:\/\/doi.org\/10.1109\/ICMMT55580.2022.10023110.","DOI":"10.1109\/ICMMT55580.2022.10023110"},{"key":"2366_CR9","doi-asserted-by":"publisher","unstructured":"Zhao D, Wang Y, Wang X. Design of the CAN Bus Control System for the Pipeline Detection Snakelike Robot. In: 2022 34th Chinese Control and Decision Conference (CCDC), Hefei, China, 2022, pp. 1957\u20131962. https:\/\/doi.org\/10.1109\/CCDC55256.2022.10033892.","DOI":"10.1109\/CCDC55256.2022.10033892"},{"key":"2366_CR10","doi-asserted-by":"publisher","unstructured":"Harish Kumar JR, Dutta S, Sonthalia A, Pai N. Segmentation of optic nerve head using two-stage snakes in generalized gradient vector field. In: 2022 IEEE 19th India Council International Conference (INDICON), Kochi, India, 2022, pp. 1\u20134. https:\/\/doi.org\/10.1109\/INDICON56171.2022.10039761","DOI":"10.1109\/INDICON56171.2022.10039761"},{"key":"2366_CR11","doi-asserted-by":"publisher","unstructured":"Zhang D, Li J, Tao W. Path following method for a snake robot based on virtual edge guidance strategy. In: 2022 IEEE 17th International Conference on Control & Automation (ICCA), Naples, Italy, 2022, pp. 778\u2013783. https:\/\/doi.org\/10.1109\/ICCA54724.2022.9831921.","DOI":"10.1109\/ICCA54724.2022.9831921"},{"key":"2366_CR12","doi-asserted-by":"publisher","unstructured":"Dube SS, Bhuru A. Snake identification system using convolutional neural networks. In: 2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT), Harare, Zimbabwe, 2022, pp. 1\u20135. https:\/\/doi.org\/10.1109\/ZCICT55726.2022.10046005.","DOI":"10.1109\/ZCICT55726.2022.10046005"},{"key":"2366_CR13","doi-asserted-by":"publisher","unstructured":"Sarmadian A, Moghimi A, Amani M, Mahdavi S. Optimizing the snake model using honey-bee mating algorithm for road extraction from very high-resolution satellite images. In: 2022 10th International Conference on Agro-geoinformatics (Agro-Geoinformatics), Quebec City, QC, Canada, 2022, pp. 1\u20136. https:\/\/doi.org\/10.1109\/Agro-Geoinformatics55649.2022.9859090.","DOI":"10.1109\/Agro-Geoinformatics55649.2022.9859090"},{"key":"2366_CR14","doi-asserted-by":"crossref","unstructured":"Singh R, Rawat P, Shukla P. Robust medical image authentication using 2-D stationary wavelet transform and edge detection. In: 2nd IET International Conference on Biomedical Image and Signal Processing (ICBISP 2017), pp. 1\u20138. IET, 2017.","DOI":"10.1049\/cp.2017.0093"},{"issue":"12","key":"2366_CR15","doi-asserted-by":"publisher","first-page":"1851","DOI":"10.1109\/83.974570","volume":"10","author":"A Dumitras","year":"2001","unstructured":"Dumitras A, Venetsanopoulos AN. Angular map-driven snakes with application to object shape description in color images. IEEE Trans Image Process. 2001;10(12):1851\u20139.","journal-title":"IEEE Trans Image Process"},{"key":"2366_CR16","doi-asserted-by":"publisher","unstructured":"Tang H, Tang C, Shu X, Zhou G, Guo S. Design and development of a snake robot with wheeled modules. In: 2021 China Automation Congress (CAC), Beijing, China, 2021, pp. 8321\u20138326. https:\/\/doi.org\/10.1109\/CAC53003.2021.9727403.","DOI":"10.1109\/CAC53003.2021.9727403"},{"key":"2366_CR17","doi-asserted-by":"crossref","unstructured":"Bouazza A. Climate change effects on venomous snakes: distribution and snakebite epidemiology. In: Information Resources Management Association (eds) Research Anthology on Ecosystem Conservation and Preserving Biodiversity. IGI Global, 2022, pp. 1381\u20131396.","DOI":"10.4018\/978-1-6684-5678-1.ch066"},{"issue":"7","key":"2366_CR18","doi-asserted-by":"publisher","first-page":"7353","DOI":"10.1109\/TIE.2022.3201304","volume":"70","author":"Y Hong","year":"2023","unstructured":"Hong Y, Yang M, Chang B, Du D. Filter-PCA-based process monitoring and defect identification during climbing helium arc welding process using DE-SVM. IEEE Trans Ind Electron. 2023;70(7):7353\u201362. https:\/\/doi.org\/10.1109\/TIE.2022.3201304.","journal-title":"IEEE Trans Ind Electron"},{"issue":"6","key":"2366_CR19","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1109\/LSP.2009.2017477","volume":"16","author":"BN Saha","year":"2009","unstructured":"Saha BN, Ray N, Zhang H. Snake validation: a PCA-based outlier detection method. IEEE Signal Process Lett. 2009;16(6):549\u201352. https:\/\/doi.org\/10.1109\/LSP.2009.2017477.","journal-title":"IEEE Signal Process Lett"},{"key":"2366_CR20","doi-asserted-by":"publisher","unstructured":"Deshan PDR, Pabasara DVH, Yapa NA, Perera DSRCV, Lunugalage D, Wijekoon JL. Smart snake identification system using video processing. In: TENCON 2021 - 2021 IEEE Region 10 Conference (TENCON), Auckland, New Zealand, 2021, pp. 539\u2013544. https:\/\/doi.org\/10.1109\/TENCON54134.2021.9707360.","DOI":"10.1109\/TENCON54134.2021.9707360"},{"issue":"10","key":"2366_CR21","doi-asserted-by":"publisher","first-page":"169","DOI":"10.23919\/JCC.2021.10.012","volume":"18","author":"D Mohanapriya","year":"2021","unstructured":"Mohanapriya D, Mahesh K. Multi object tracking using gradient-based learning model in video-surveillance. China Commun. 2021;18(10):169\u201380. https:\/\/doi.org\/10.23919\/JCC.2021.10.012.","journal-title":"China Commun"},{"key":"2366_CR22","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/S0035-9203(02)90250-6","volume":"96","author":"H Bawaskar","year":"2002","unstructured":"Bawaskar H, Bawaskar P. Profile of snakebite envenoming in Western Maharashtra, India. Trans R Soc Trop Med Hyg. 2002;96:79\u201384.","journal-title":"Trans R Soc Trop Med Hyg"},{"key":"2366_CR23","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1038\/537026a","volume":"537","author":"C Arnold","year":"2016","unstructured":"Arnold C. Vipers, mambas and taipans: the escalating health crisis over snakebites. Nature. 2016;537:26\u20138.","journal-title":"Nature"},{"issue":"4","key":"2366_CR24","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pntd.0001018","volume":"5","author":"B Mohapatra","year":"2011","unstructured":"Mohapatra B, Warrell DA, Suraweera W, Bhatia P, Dhingra N, Jotkar RM, et al. Snakebite mortality in India: a nationally representative mortality survey. PLoS Negl Trop Dis. 2011;5(4): e1018.","journal-title":"PLoS Negl Trop Dis"},{"key":"2366_CR25","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1038\/027205a0","volume":"27","author":"J Fayrer","year":"1882","unstructured":"Fayrer J. Destruction of life in India by poisonous snakes. Nature. 1882;27:205\u20138.","journal-title":"Nature"},{"key":"2366_CR26","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/BF01945429","volume":"47","author":"W W\u00fcster","year":"1991","unstructured":"W\u00fcster W, Thorpe RS. Asiatic cobras: systematics and snakebite. Experientia. 1991;47:205\u20139.","journal-title":"Experientia"},{"key":"2366_CR27","doi-asserted-by":"publisher","first-page":"84252","DOI":"10.1109\/ACCESS.2021.3088075","volume":"9","author":"N Mamdouh","year":"2021","unstructured":"Mamdouh N, Khattab A. YOLO-based deep learning framework for olive fruit fly detection and counting. IEEE Access. 2021;9:84252\u201362.","journal-title":"IEEE Access"},{"key":"2366_CR28","doi-asserted-by":"crossref","unstructured":"Neuenschwander W, Fua P, Sz\u00e9kely G, Kubler O. Making snakes converge from minimal initialization. In: Proceedings of 12th International Conference on Pattern Recognition, vol. 1, pp. 613\u2013615. IEEE, 1994.","DOI":"10.1109\/ICPR.1994.576376"},{"key":"2366_CR29","doi-asserted-by":"crossref","unstructured":"Li Q, Jin S, Yan J. Mimicking very efficient network for object detection. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 6356\u20136364. 2017.","DOI":"10.1109\/CVPR.2017.776"},{"key":"2366_CR30","doi-asserted-by":"crossref","unstructured":"Olszewska JI. Snakes in trees: an explainable artificial intelligence approach for automatic object detection and recognition. In: ICAART (3), pp. 996\u20131002. 2022.","DOI":"10.5220\/0010993000003116"},{"key":"2366_CR31","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/7463091","author":"AA Alnuaim","year":"2022","unstructured":"Alnuaim AA, Zakariah M, Alhadlaq A, Shashidhar C, Hatamleh WA, Tarazi H, Shukla PK, Ratna R. Human-computer interaction with detection of speaker emotions using convolution neural networks. Comput Intell Neurosci. 2022. https:\/\/doi.org\/10.1155\/2022\/7463091.","journal-title":"Comput Intell Neurosci"},{"issue":"29","key":"2366_CR32","first-page":"22","volume":"181","author":"P Joshi","year":"2018","unstructured":"Joshi P, Sarpale D, Sapkal R, Rajput A. A survey on snake species identification using image processing technique. Int J Comput Appl. 2018;181(29):22\u20134.","journal-title":"Int J Comput Appl"},{"key":"2366_CR33","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/2354866","author":"C Sridhar","year":"2022","unstructured":"Sridhar C, Pareek PK, Kalidoss R, Jamal SS, Shukla PK, Nuagah SJ. Optimal medical image size reduction model creation using recurrent neural network and GenPSOWVQ. J Healthc Eng. 2022. https:\/\/doi.org\/10.1155\/2022\/2354866.","journal-title":"J Healthc Eng"},{"issue":"3","key":"2366_CR34","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.irbm.2020.07.003","volume":"43","author":"D Pandey","year":"2022","unstructured":"Pandey D, Rawat U, Rathore NK, Pandey K, Shukla PK. Distributed biomedical scheme for controlled recovery of medical encrypted images. IRBM. 2022;43(3):151\u201360.","journal-title":"IRBM"},{"issue":"1","key":"2366_CR35","first-page":"41","volume":"1","author":"E Naresh","year":"2013","unstructured":"Naresh E, Kalaskar SK. A novel testing methodology to improve the quality of testing a GUI application. MSR J Eng Technol Res. 2013;1(1):41\u20136.","journal-title":"MSR J Eng Technol Res"},{"issue":"2","key":"2366_CR36","first-page":"98","volume":"5","author":"E Naresh","year":"2014","unstructured":"Naresh E, Rayudu DMK, Vijaya Kumar BP. The impact of test-driven development on software defects and cost: a comparative case study. IJCET. 2014;5(2):98\u2013107.","journal-title":"IJCET"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-02366-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-023-02366-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-02366-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T19:42:56Z","timestamp":1730749376000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-023-02366-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,2]]},"references-count":36,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,1]]}},"alternative-id":["2366"],"URL":"https:\/\/doi.org\/10.1007\/s42979-023-02366-z","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,2]]},"assertion":[{"value":"8 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 September 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 December 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors do not have any conflicts of interest with this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"52"}}