Driver Drowsiness is a grave issue resulting in many road accidents each year. To evaluate the exact number of sleep related accidents because of the difficulties in detecting whether fatigue was a factor and in assessing the level of fatigue is not currently possible. In this paper the camera will be placed besides the rare view mirror of car in way such that it is in clear view of the frontal face of the driver. This camera will continuously capture the video of driver’s frontal face while driving. The system will detect the frontal face in the image and later the eyes. Depending upon the conditions the system will generate an alert. The focus will be on the system that will accurately monitor the open or closed state of the driver’s eyes in real-time. By monitoring the eyes, it is believed that the symptoms of driver fatigue can be detected early to avoid accidents.
Driver Drowsiness is a grave issue resulting in many road accidents each year. To evaluate the exact number of sleep related accidents because of the difficulties in detecting whether fatigue was a factor and in assessing the level of fatigue is not currently possible. In this paper the camera will be placed besides the rare view mirror of car in way such that it is in clear view of the frontal face of the driver. This camera will continuously capture the video of driver’s frontal face while driving. The system will detect the frontal face in the image and later the eyes. Depending upon the conditions the system will generate an alert. The focus will be on the system that will accurately monitor the open or closed state of the driver’s eyes in real-time. By monitoring the eyes, it is believed that the symptoms of driver fatigue can be detected early to avoid accidents.
For the full video of this presentation, please visit:
http://www.embedded-vision.com/platinum-members/videantis/embedded-vision-training/videos/pages/may-2016-embedded-vision-summit
For more information about embedded vision, please visit:
http://www.embedded-vision.com
Marco Jacobs, Vice President of Marketing at videantis, presents the "Computer Vision in Cars: Status, Challenges, and Trends" tutorial at the May 2016 Embedded Vision Summit.
Just as horse carriages were replaced by cars in the 1920s, human operators in our cars will be replaced by electronics in the 2020s. The benefits are tremendous: self-driving cars save lives, save time and save cost. For car manufacturers, this will be a gradual change. With each new model year, they’re adopting increasingly sophisticated advanced driver assistance systems (ADAS) that aid the driver, instead of taking full control. These systems use cameras and computer vision techniques to understand the vehicle’s surroundings. Besides detecting pedestrians, vehicles, lanes, signs, and obstacles, these systems must be aware of where these objects are, and where they’re going. In this talk, Jacobs provides an overview of the state of ADAS today and gives a glimpse into the future. He highlights technology trends, challenges, and lessons learned, with a focus on the crucial role that computer vision plays in these systems.
The Internet of things is spreading its influence on all the verticals we can think of. From healthcare to agriculture, connected devices are proving to be more and more valuable everyday.
On the consumer side, very much has been said about wearables and smart home appliances. But one of the industries the most impacted by the IoT revolution is definitely the automotive sector.
The internet of things is changing the way car dealers sell cars and consumers drive them. The emergence of new products and new services will ultimately craft a new economy for the car industry. If they want to survive, the various players of the automotive industry, from carmakers, to OEMs, to insurers, will have to adapt their business model.
Fortunately, most of them have already jumped on the bandwagon. All the players of the automotive industry are now catching up, competing with each other to launch ever more innovative features.
In this presentation, we explore how the IoT is impacting the automotive sector and what new services are emerging.
Traffic Control and Vehicle-to-Everything (V2X) CommunicationsOfinno
As the number of vehicles increases, traffic accidents and waste of resources due to
congestion are consistently growing every year. Cellular Vehicle-to-Everything (V2X) is a
key technology improving driving safety and traffic efficiency by enabling traffic elements
such as vehicles, roadside infrastructures, networks, and pedestrians to communicate with
each other. Dynamic interactions between traffic elements ultimately facilitate intelligent
autonomous driving. The 3rd Generation Partnership Project (3GPP) Technical Specification
Group has developed a series of standards for cellular V2X features and is working on
continuous enhancements for higher reliable and low latency communication. This paper
provides an overview of cellular V2X use cases and 3GPP standardization, and summarizes
the impact of the V2X technology.
Hotel Management with Hibernate MVC Minor Projectjames parmar
The "Hotel Management System" is definition of my fifth-sem minor project and i have created a real time MVC application by using Servlet, JSP, and Hibernate. This application is developed using MVC pattern, where JSP pages acts as view layer, Hibernate and mySql database as the model and servlet as controller layer.
user centric machine learning framework for cyber security operations centerVenkat Projects
In order to ensure a company's Internet security, SIEM (Security Information and Event Management) system is in place to simplify the various preventive technologies and flag alerts for security events. Inspectors (SOC) investigate warnings to determine if this is true or not. However, the number of warnings in general is wrong with the majority and is more than the ability of SCO to handle all awareness. Because of this, malicious possibility. Attacks and compromised hosts may be wrong. Machine learning is a possible approach to improving the wrong positive rate and improving the productivity of SOC analysts. In this article, we create a user-centric engineer learning framework for the Internet Safety Functional Center in the real organizational context. We discuss regular data sources in SOC, their work flow, and how to process this data and create an effective machine learning system. This article is aimed at two groups of readers. The first group is intelligent researchers who have no knowledge of data scientists or computer safety fields but who engineer should develop machine learning systems for machine safety. The second groups of visitors are Internet security practitioners that have deep knowledge and expertise in Cyber Security, but do Machine learning experiences do not exist and I'd like to create one by themselves. At the end of the paper, we use the account as an example to demonstrate full steps from data collection, label creation, feature engineering, machine learning algorithm and sample performance evaluations using the computer built in the SOC production of Seyondike.
The objective of this project is to find the alive humans in destroyed building with the help of rescue robot in disaster prone and bomb blast areas. The alive human detection sensor is the special type of sensor which has two elements, the live body sensor and Amplifier Circuit. The passive infrared radiation emitting from the alive human bodies are sensed by the sensor and if there is a variation due to movement of alive human body, the difference output is generated. It will be amplified by differential amplifier and then the signal is fed to another amplifier unit in order to amplify the voltage level. Then the amplified signal is given to flash type reprogrammable microcontroller which controls the motor connected to the robot model. The robot moves according to the instructions provided by the operator. If the sensor detects the presence of alive human body, it forces the robot to stop there and microcontroller will activate the alarm. The driver circuit is constructed with transistor, which acts as a switch to turn ON and turn OFF alarm. Now the alarm makes the sound for the alive body indication.
For the full video of this presentation, please visit:
http://www.embedded-vision.com/platinum-members/videantis/embedded-vision-training/videos/pages/may-2016-embedded-vision-summit
For more information about embedded vision, please visit:
http://www.embedded-vision.com
Marco Jacobs, Vice President of Marketing at videantis, presents the "Computer Vision in Cars: Status, Challenges, and Trends" tutorial at the May 2016 Embedded Vision Summit.
Just as horse carriages were replaced by cars in the 1920s, human operators in our cars will be replaced by electronics in the 2020s. The benefits are tremendous: self-driving cars save lives, save time and save cost. For car manufacturers, this will be a gradual change. With each new model year, they’re adopting increasingly sophisticated advanced driver assistance systems (ADAS) that aid the driver, instead of taking full control. These systems use cameras and computer vision techniques to understand the vehicle’s surroundings. Besides detecting pedestrians, vehicles, lanes, signs, and obstacles, these systems must be aware of where these objects are, and where they’re going. In this talk, Jacobs provides an overview of the state of ADAS today and gives a glimpse into the future. He highlights technology trends, challenges, and lessons learned, with a focus on the crucial role that computer vision plays in these systems.
The Internet of things is spreading its influence on all the verticals we can think of. From healthcare to agriculture, connected devices are proving to be more and more valuable everyday.
On the consumer side, very much has been said about wearables and smart home appliances. But one of the industries the most impacted by the IoT revolution is definitely the automotive sector.
The internet of things is changing the way car dealers sell cars and consumers drive them. The emergence of new products and new services will ultimately craft a new economy for the car industry. If they want to survive, the various players of the automotive industry, from carmakers, to OEMs, to insurers, will have to adapt their business model.
Fortunately, most of them have already jumped on the bandwagon. All the players of the automotive industry are now catching up, competing with each other to launch ever more innovative features.
In this presentation, we explore how the IoT is impacting the automotive sector and what new services are emerging.
Traffic Control and Vehicle-to-Everything (V2X) CommunicationsOfinno
As the number of vehicles increases, traffic accidents and waste of resources due to
congestion are consistently growing every year. Cellular Vehicle-to-Everything (V2X) is a
key technology improving driving safety and traffic efficiency by enabling traffic elements
such as vehicles, roadside infrastructures, networks, and pedestrians to communicate with
each other. Dynamic interactions between traffic elements ultimately facilitate intelligent
autonomous driving. The 3rd Generation Partnership Project (3GPP) Technical Specification
Group has developed a series of standards for cellular V2X features and is working on
continuous enhancements for higher reliable and low latency communication. This paper
provides an overview of cellular V2X use cases and 3GPP standardization, and summarizes
the impact of the V2X technology.
Hotel Management with Hibernate MVC Minor Projectjames parmar
The "Hotel Management System" is definition of my fifth-sem minor project and i have created a real time MVC application by using Servlet, JSP, and Hibernate. This application is developed using MVC pattern, where JSP pages acts as view layer, Hibernate and mySql database as the model and servlet as controller layer.
user centric machine learning framework for cyber security operations centerVenkat Projects
In order to ensure a company's Internet security, SIEM (Security Information and Event Management) system is in place to simplify the various preventive technologies and flag alerts for security events. Inspectors (SOC) investigate warnings to determine if this is true or not. However, the number of warnings in general is wrong with the majority and is more than the ability of SCO to handle all awareness. Because of this, malicious possibility. Attacks and compromised hosts may be wrong. Machine learning is a possible approach to improving the wrong positive rate and improving the productivity of SOC analysts. In this article, we create a user-centric engineer learning framework for the Internet Safety Functional Center in the real organizational context. We discuss regular data sources in SOC, their work flow, and how to process this data and create an effective machine learning system. This article is aimed at two groups of readers. The first group is intelligent researchers who have no knowledge of data scientists or computer safety fields but who engineer should develop machine learning systems for machine safety. The second groups of visitors are Internet security practitioners that have deep knowledge and expertise in Cyber Security, but do Machine learning experiences do not exist and I'd like to create one by themselves. At the end of the paper, we use the account as an example to demonstrate full steps from data collection, label creation, feature engineering, machine learning algorithm and sample performance evaluations using the computer built in the SOC production of Seyondike.
The objective of this project is to find the alive humans in destroyed building with the help of rescue robot in disaster prone and bomb blast areas. The alive human detection sensor is the special type of sensor which has two elements, the live body sensor and Amplifier Circuit. The passive infrared radiation emitting from the alive human bodies are sensed by the sensor and if there is a variation due to movement of alive human body, the difference output is generated. It will be amplified by differential amplifier and then the signal is fed to another amplifier unit in order to amplify the voltage level. Then the amplified signal is given to flash type reprogrammable microcontroller which controls the motor connected to the robot model. The robot moves according to the instructions provided by the operator. If the sensor detects the presence of alive human body, it forces the robot to stop there and microcontroller will activate the alarm. The driver circuit is constructed with transistor, which acts as a switch to turn ON and turn OFF alarm. Now the alarm makes the sound for the alive body indication.
Smart surveillance systems play an important role in security today. The goal of security systems is to protect users against fires, car accidents, and
other forms of violence. The primary function of these systems is to offer security in residential areas. In today’s culture, protecting our homes is
critical. Surveillance, which ranges from private houses to large corporations, is critical in making us feel safe. There are numerous machine learning algorithms for home security systems; however, the deep learning convolutional neural network (CNN) technique outperforms the others. The
Keras, Tensorflow, Cv2, Glob, Imutils, and PIL libraries are used to train and assess the detection method. A web application is used to provide a
user-friendly environment. The flask web framework is used to construct it. The flash-mail, requests, and telegram application programming interface (API) apps are used in the alerting approach. The surveillance system tracks
abnormal activities and uses machine learning to determine if the scenario is normal or not based on the acquired image. After capturing the image, it is
compared with the existing dataset, and the model is trained using normal events. When there is an anomalous event, the model produces an output from which the mean distance for each frame is calculated.
Software engineering model based smart indoor localization system using deep-...TELKOMNIKA JOURNAL
During the last few years, the allocation of objects or persons inside a specific
building is highly required. It is well known that the global positioning system
(GPS) cannot be adopted in indoor environment due to the lack of signals.
Therefore, it is important to discover a new way that works inside.
The proposed system uses the deep learning techniques to classify places based
on capturing images. The proposed system contains two parts: software part
and hardware part. The software part is built based on software engineering
model to increase the reliability, flexibility, and scalability. In addition,
this part, the dataset is collected using the Raspberry Pi III camera as training
and validating data set. This dataset is used as an input to the proposed deep
learning model. In the hardware part, Raspberry Pi III is used for loading
the proposed model and producing prediction results and a camera that is used
to collect the images dataset. Two wheels’ car is adopted as an object
for introducing indoor localization project. The obtained training accuracy
is 99.6% for training dataset and 100% for validating dataset.
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE cscpconf
Ubiquitous computing allows more efficient exploitation of information systems, economizes
user cost and effort to use the information system. The network technical room monitoring
problem, arising from network management practice, is important to operate the network, to
discover and resolve unpredictable situation. In addition, many of monitoring and sensor
product are shipped with closed proprietary software, and the interoperability between them is
very difficult. In this article, the author present several ubiquitous computing technologies,
propose a model of ubiquitous monitoring system for network technical room. This model
allows monitoring the network technical room remotely, via variable terminal devices and
variable communication infrastructure. The model has been implemented in Hanoi University of
Science and Technology (HUST) Network Information Centre with IP Cameras and RFID
devices.
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfKamal Acharya
Online movie ticket booking system for movies is a web-based program. This application allows users to purchase cinema tickets over the portal. To buy tickets, people must first register or log in. This website's backend is PHP and JavaScript, and the front end is HTML and CSS. All phases of the software development life cycle are efficiently managed in order to design and implement software. On the website, there are two panels: one for administrators and one for customers/users. The admin has the ability to add cinemas, movies, delete, halt execution, and add screens, among other things. The website is simple to navigate and appealing, saving the end user time.
Toll tax management system project report..pdfKamal Acharya
Toll Tax Management System is a web based application that can provide all the information related to toll plazas and the passenger checks in and pays the amount, then he/she will be provided by a receipt. With this receipt he/she can leave the toll booth without waiting for any verification call.
The information would also cover registration of staff, toll plaza collection, toll plaza collection entry for vehicles, date wise report entry, Vehicle passes and passes reports b/w dates.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Construction method of steel structure space frame .pptxwendy cai
High-altitude bulk installation refers to the method of total assembling of small assembled units or loose parts directly in the design position, applicable to the installation of space structure such as space frame and reticulated shell.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Q.1 A single plate clutch with both sides of the plate effective is required to transmit 25 kW at 1600 r.p.m. The outer diameter of the plate is limited to 300 mm and the intensity of pressure between the plates not to exceed 0.07N / m * m ^ 2 Assuming uniform wear and coefficient of friction 0.3, find the inner diameter of the plates and the axial force necessary to engage the clutch.
Q.2 A multiple disc clutch has radial width of the friction material as 1/5th of the maximum radius. The coefficient of friction is 0.25. Find the total number of discs required to transmit 60 kW at 3000 r.p.m. The maximum diameter of the clutch is 250 mm and the axial force is limited to 600 N. Also find the mean unit pressure on each contact surface.
Q.3 A cone clutch is to be designed to transmit 7.5 kW at 900 r.p.m. The cone has a face angle of 12°. The width of the face is half of the mean radius and the normal pressure between the contact faces is not to exceed 0.09 N/mm². Assuming uniform wear and the coefficient of friction between the contact faces as 0.2, find the main dimensions of the clutch and the axial force required to engage the clutch.
Q.4 A cone clutch is mounted on a shaft which transmits power at 225 r.p.m. The small diameter of the cone is 230 mm, the cone face is 50 mm and the cone face makes an angle of 15 deg with the horizontal. Determine the axial force necessary to engage the clutch to transmit 4.5 kW if the coefficient of friction of the contact surfaces is 0.25. What is the maximum pressure on the contact surfaces assuming uniform wear?
Q.5 A soft surface cone clutch transmits a torque of 200 N-m at 1250 r.p.m. The larger diameter of the clutch is 350 mm. The cone pitch angle is 7.5 deg and the face width is 65 mm. If the coefficient of friction is 0.2. find:
1. the axial force required to transmit the torque:
2. the axial force required to engage the clutch;
3. the average normal pressure on the contact surfaces when the maximum torque is being transmitted; and
4. the maximum normal pressure assuming uniform wear.
Q.6 A single block brake, as shown in Fig. 1. has the drum diameter 250 mm. The angle of contact is 90° and the coefficient of friction between the drum and the lining is 0.35. If the torque transmitted by the brake is 70 N-m, find the force P required to operate the brake. Q.7 The layout and dimensions of a double shoe brake is shown in Fig. 2. The diameter of the
brake drum is 300 mm and the contact angle for each shoe is 90°. If the coefficient of friction for the brake lining and the drum is 0.4, find the spring force necessary to transmit a torque of 30 N-m. Also determine the width of the brake shoes, if the bearing pressure on the lining material is not to exceed 0.28N / m * m ^ 2
This document is by explosives industry in which document discussed manufacturing process and flow charts details by nitric acid and sulfuric acid and tetra benzene and step by step details of explosive industry explosives industry is produced raw materials and manufacture it by manufacturing process
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
1. Facoltà dell'Informazione, Informatica e Statistica
Corso di Laurea Magistrale in Ingegneria Informatica
Integrating multiple independent legacy
indoor localization systems through a
RESTful API
Candidate:
Jacopo Carlini
Thesis Advisors:
Prof. Massimo Mecella
PhD Francesco Leotta
Academic Year: 2017/2018
2. 18/01/2019Master Thesis Pagina 2
Context
Smart Space: an intelligent environment with advanced technology that
understand the needs of users and react accordingly.
Characteristics: Context detection, Setting up, self-adaptation, Interoperability
Benefits of Tracking:
• Recognition
• Transport and Logistics
• Hospital
• Personnel Management
• Security
Using mainly tracking systems we can provide increasingly intelligent services for
the environments. For these services, being aware of the environment is a necessity
because the behavior of the system is based above all on the environmental
dynamics.
3. 18/01/2019Master Thesis Pagina 3
PLaTHEA
People Localization and Tracking for Home Automation
PLaTHEA is a system of environmental intelligence (AMI). It is a vision-based
indoor location system of people for Home Automation that allows you to
capture a stereo video stream through two cameras connected to the
network.
In addition to the traditional features of indoor location systems, PLaTHEA
includes identity recognition features.
PLaTHEA is a monolithic system with a GUI designed for the tracking in a
single room without marker.
4. 18/01/2019Master Thesis Pagina 4
Objectives
The project consists of creating Web services accessible through REST API
The project consists of creating Web services accessible through REST API
GOAL: a Web service accessible through REST API, for indoor
multi-room localization and tracking.
1. Study and analysis of the code of PLaTHEA project for
integration in the system and use it for tracking facilities.
2. Design the architecture of the server and the REST API.
3. Realization of Java server and of a JNI and transformation of
PLaTHEA in a dynamic-link library (DLL) and adaptation for
multi-room tracking.
4. Realization of a Web Application.
5. Validation of the multi-room tracking.
5. 18/01/2019Master Thesis Pagina 5
PLaTHEA: Technical Aspects
Description of the modules
Phases of the system:
1. The internal calibration is used at runtime for rectification and stereo
calibration of the cameras. The external calibration describes the
relationship between the coordinates system centered in the left camera and
the scene coordinates system.
2. The Synchronization algorithm which selects the frames to be discarded in
each of the sequences so as to modulate and maintain the state of synchrony
and provides a sequence of pairs to be used for stereo vision.
3. The Foreground extraction activity consists in keeping track of the agents
within a space through the operation of separating the pixels belonging to
them.
4. The Tracking and posture algorithm project to the ground all the pixels
belonging to the first floor after the stereo calibration procedure and the
foreground mask extracted.
5. The Extracting the frame containing faces, using, as a rule, a Viola-Jones
classifier.
6. For each face detected, perform the recognition using the comparison of the
SIFT features with each of the faces in the database.
7. Re-project the face on the ground, obtaining the corresponding trace subject.
6. 18/01/2019Master Thesis Pagina 6
Hardware Architecture
Each room can have one or more technologies inside that will be connected
to the main computer.
7. 18/01/2019Master Thesis Pagina 7
Software Architecture
1. The Server offers a REST interface with
JSON.
2. SubProcesses load individually an
instance of library.
3. InterfaceDLL is the wrapper for PLaTHEA
library. This Dynamic-link library is a JNI
(Java Native Interface).
4. PLATHEA DLL is a Dynamic-link library
that provides real-time information on the
location and occupancy of agents.
8. 18/01/2019Master Thesis Pagina 8
WebApp
The web application was written with React.
Through the web app it is possible to:
• Add a new room to monitor by the system.
• Configure the room, sending the files and setting the parameters
necessary for the operation of PLaTHEA DLL.
• Start tracking and identification in a room.
• View the video stream from PLaTHEA DLL.
• Display information of people inside the room.
10. 18/01/2019Master Thesis Pagina 10
A Running Example 1/2
Trajectory in the rooms of the person.
Verify the ability to track people moving from one
room to another.
11. 18/01/2019Master Thesis Pagina 11
A Running Example 2/2
When the person enters in the Room2 the system correctly assigns 5
as ID to the person near the door.
OK
Room1 Room2
12. 18/01/2019Master Thesis Pagina 12
Conclusions
With this work a web interface has been created to make accessible, through REST
API, the functionalities of a system of localization, identification and monitoring of
users that are present not only in a single room but also in multiple rooms of an
smart space.
The Web interface can be applied to any type of user location and tracking system
but in this specific project PLaTHEA and its vision based functionalities have been
used.
Future Works:
By combining different technologies, for each rooms different levels of tracking
precision can be obtained according to specific needs. Therefore, future developments
are represented by the possibility of integrating other technologies to exploit the
advantages of each of them.
Other future work is the implementation of alarm systems. We can set the system to
send notifications if unauthorized persons access in certain areas.