SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 910
Automated Criminal Identification System using Face Detection and
Recognition
Piyush Chhoriya
UG Scholar, Computer Engineering Department, K. K. Wagh Institute of Engineering Education & Research,
Nashik-422003, Maharashtra, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - As the world has seen exponential advancement over the last decade, there is an abnormal increase inthe crimerate
and also the number of criminals are increasing at an alarming rate, this leads toward a great concern about the security issues.
various causes of theft, stealing crimes, burglary, kidnapping, human trafficking etc. are left unsolved because the availability of
police personnel is limited, many times there is no identification of the person who was involved in criminal activities.
To avoid this situation an automated facial recognition system for criminal identification is proposed using Haar feature-based
cascade classifier. This paper presents a real-time face recognition using an automated surveillance camera. This system will be
able to detect and recognize face automatically in real-time.
Key Words: Criminal Identification, Facial recognition, Haar Classifier, Real-time, Viola-jones.
1. INTRODUCTION
The face is crucial for human identity. It is the feature which best distinguishes a person. Face detection and recognition is the
technology which is used to identify a person from a video or image. The whole Face Detection and Recognitionprocesscanbe
divided into four major steps:
Fig.1 Face Detection and Recognition process
In this paper, we propose a face detection and recognition system for criminal identification using python along with OpenCV
package. The proposed system consists of 4 steps: (1) Training of images (2) Face detection using Haar cascade classifier
(3) comparison of trained images with images captured from the surveillance camera (4)result based on the comparison.
2. METHODOLOGY:
In this project, we can detect and recognize the faces of the criminals in a video stream obtained from a camera in real-time.
The system consists of three databases. First is the citizen database, which will contain the images and unique-id of all the
citizens living in that country. Second is local watch list database, which will have the images(min 10) and details(Unique-id,
Name, Gender, Religion, Crimes done, etc) of each criminal who belongs to that country. Third is International watch list
database, which will have the images (min 10) anddetails(Unique-id,Name,Gender, Religion,Crimesdone,etc)ofthecriminals
who are not the citizens of that country. All the images are first preprocessed. Then it goes through feature extraction where
Haar cascade is used.
The video is captured from the surveillance camera which are converted into frames. When a face is detected in a frame, it is
preprocessed. Then it goes through feature extraction where Haar cascade is used. The features of the processed real-time
image is compared with the features of processed images which are stored in the citizen database. If a match is found, it is
further compared with the features of images stored in a local watch list database to identify if the person is criminal or not. If
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 911
he is criminal a notification is sent to the police personnel with all the details and the time for which he was under the
surveillance of the camera. If he is not a citizen of that country, it is then compared with the features of images stored in the
international watch list database. If a match is found, a notification is sent to the police personnel with all the details and the
time for which he was under the surveillance of the camera. If a match is not found in both the watch lists, he is innocent.
Fig -2: Flowchart of proposed methodology
3. IMPLEMENTATION:
3.1 Modules required
The Modules required to perform the facial recognition are cv2, image module and numpy. cv2 is the OpenCV module and
contains various functions for face detection and recognition. The dataset images are in gif format and, OpenCV does not
support gif format, Image module from PIL is used to read the image in grayscale format. Numpy is a python library used for
scientific computing. NumPy arrays are used to store the images.
3.2 Load the detection Cascade
To Load the face detection cascade the first step is to detect the face in eachframe. Oncewegettheregionofinterest containing
the face in the image, we use it for training the recognizer. For the purpose of face detection, we will use the Haar Cascade
provided by OpenCV. The haar cascades that come with OpenCV are located in the directory of OpenCV installation. Haar
cascade frontal face default.xml is used for detecting the face. Cascade is loaded using the cv2CascadeClassifierfunctionwhich
takes the path to the cascade xml file. If the xml file is in the current working directory, then the relative path is used.
3.3 Create the Face Recognizer Object
The next step involves creating the face recognizer object [4]. The face recognizer object has functions like
FaceRecognizer.train() to train the recognizer and FaceRecognizer.predict() to recognize a face. OpenCV currently provides
Video surveillance
Frames
Pre-processing
Feature Extraction
Matching
Citizen Database
Local watch-list Database International watch-list
Database
Matching
Matching
Criminal Innocent
Criminal Innocent
Notification
Notification
Pre-
processed
images
Unique-
id
Pre-
processed
images
Details Pre-
processed
images
Details
No
NoYes
Yes No
Yes
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 912
Eigenface Recognizer, Fisherface Recognizer and Local Binary Patterns Histograms(LBPH)FaceRecognizer[4]. Wehaveused
LBPH recognizer because Real life isn’t perfect. We simply can’t guarantee perfect light settings in your images or10 different
images of a person. LBPH focus on extracting local features from images. The idea is to not look at the whole image as a high-
dimensional vector but describe only local features of an object. The basic idea of Local Binary Patterns is to summarize the
local structure in an image by comparing each pixel with its neighbourhood.
3.4 Perform the training
3.5 Perform Testing
4. HAAR CASCEDE CLASSIFIER
The face detection algorithm proposed by Viola and Jones is used as the basis of our design [1]. The face detection algorithm
looks for specific Haar features and not pixels of a human face. This method consists of four steps-
4.1 Haar Feature Selection
After the tremendous amount of training data (in the form of images) is fed into the system, the classifier begins by extracting
Haar features from each image. Haar features are kind of convolutionkernelswhichprimarilydetect whethera suitablefeature
is present on an image or not. Some examples of Haar features are mentioned below:
These Haar Features are like windows and are placed upon images to compute a single feature. The feature is essentially a
single value obtained by subtracting the sum of the pixels under the white region and that under the black. The process canbe
easily visualized in the example below.
For demonstration purpose, let's say we are only extracting two features, hence we have only two windows here. The first
feature relies on the point that the eye region is darker than theadjacentcheeksandnoseregion.Thesecondfeaturefocuseson
the fact that eyes are kind of darker as compared to the bridge of the nose. Thus, when the feature window moves over the
eyes, it will calculate a single value. This value will then be compared to somethresholdandifitpassesthatitwill concludethat
there is an edge here or some positive feature.
4.2 Creating Integral Images
The algorithm proposed by Viola-Jones uses a 24X24 base window size, and that would result in more than 180,000 features
being calculated in this window. Imagine calculating the pixel difference for all the features. The solution devised for this
computationally intensive process is to go for the Integral Image concept. The integral image means thattofindthe sumofall
pixels under any rectangle, we simply need the four corner values.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 913
This means, to calculate the sum of pixels in any feature window, we do not need to sum them up individually. All weneedisto
calculate the integral image using the 4 corner values.
4.3 Adaboost training
As pointed out above, more than 180,000 features values result within a 24X24 window. However, not all features are useful
for identifying a face. To only select the best feature out of the entire chunk, a machine learning algorithm called Adaboost is
used [2]. What it essentially does is that it selects only those features that help to improve the classifier accuracy. It does so by
constructing a strong classifier which is a linear combination of several weak classifiers. This reduces the amount of features
drastically to around 6000 from around 180,000.
4.4 Cascading Classifier
Another way by which Viola Jones ensured that the algorithm performs fast is by employing a cascade of classifiers [3]. The
cascade classifier essentially consists of stages where each stage consists of a strong classifier. This is beneficial since it
eliminates the need to apply all features at once on a window. Rather, it groupsthefeatures intoseparatesub-windowsandthe
classifier at each stage determines whether or not the sub-window is a face. In case it isnot,thesub-windowisdiscardedalong
with the features in that window. If the sub-window moves past the classifier, it continues to the next stage where the second
stage of features is applied. The process can be understood with the help of the diagram below.
3. CONCLUSION
In this project, we can detect and recognize faces of the criminals in a video stream obtained from a camera in real time. We
have used Haar feature-based cascade classifiers in OpenCV approach for face detection. It is a machine learning based
approach where a cascade function is trained from a lot of positive and negative images. It is then used to detect objects in
other images. Also, we have used Local Binary Patterns Histograms (LBPH) for face recognition. Several advantages of this
algorithm are: Efficient selection of features, Scale and location invariant detector, instead of scaling the image itself, wescale
the features. LBPH recognizer can recognize faces in different lighting conditions with highaccuracy.Also,LBPHcanrecognize
efficiently even if single training image is used for each person. The real-timeautomatedfacedetectionandrecognitionsystem
proposed would be ideal for crowd surveillance applications.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 914
REFERENCES
[1] Viola, P. and Jones, M. Rapid object detection using boosted cascade of simple features. IEEE Conference on Computer
Vision and Pattern Recognition, 2001.
[2] Hui-Xing, J., Yu-Jin, Z.: Fast Adaboost Training Algorithm by Dynamic Weight Trimming. Chinese Journal of Computers
(2009)
[3] https://en.wikipedia.org/wiki/Cascading_classifiers
[4] https://docs.opencv.org/2.4/modules/contrib/doc/facerec/facerec_tutorial.html#local-binary-patterns-histograms
[5] https://opencv.org/
[6] Apoorva.P, Impana.H.C, Siri.S.L, “Automated criminal identification by face recognition using open computer vision
classifiers”, 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)
[7] http://docs.opencv.org/trunk/d7/d8b/tutorial_py_face_detection.html
[8] Piyush Kakkar, Vibhor Sharma, “Criminal identification system using Face Detection and Recognition ”, IJARCCE, Vol.
7,issue 3, March 2018

More Related Content

What's hot

Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyranjit banshpal
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system pptRavi Kumar
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
Face Detection techniques
Face Detection techniquesFace Detection techniques
Face Detection techniquesAbhineet Bhamra
 
Face recognization
Face recognizationFace recognization
Face recognizationleenak770
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyShubhamLamichane
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition SystemZara Tariq
 
modeling and predicting cyber hacking breaches
modeling and predicting cyber hacking breaches modeling and predicting cyber hacking breaches
modeling and predicting cyber hacking breaches Venkat Projects
 
HUMAN EMOTION RECOGNIITION SYSTEM
HUMAN EMOTION RECOGNIITION SYSTEMHUMAN EMOTION RECOGNIITION SYSTEM
HUMAN EMOTION RECOGNIITION SYSTEMsoumi sarkar
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection SystemAbhiroop Ghatak
 
Facial Recognition System
Facial Recognition SystemFacial Recognition System
Facial Recognition SystemArun ACE
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYJASHU JASWANTH
 
Facial Expression Recognition
Facial Expression Recognition Facial Expression Recognition
Facial Expression Recognition Rupinder Saini
 
Face Recognition
Face RecognitionFace Recognition
Face Recognitionlaknatha
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/TechnologyRahulSingh3034
 

What's hot (20)

Human Emotion Recognition
Human Emotion RecognitionHuman Emotion Recognition
Human Emotion Recognition
 
Face Detection
Face DetectionFace Detection
Face Detection
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Face Detection techniques
Face Detection techniquesFace Detection techniques
Face Detection techniques
 
Face recognization
Face recognizationFace recognization
Face recognization
 
EMOTION DETECTION USING AI
EMOTION DETECTION USING AIEMOTION DETECTION USING AI
EMOTION DETECTION USING AI
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
modeling and predicting cyber hacking breaches
modeling and predicting cyber hacking breaches modeling and predicting cyber hacking breaches
modeling and predicting cyber hacking breaches
 
HUMAN EMOTION RECOGNIITION SYSTEM
HUMAN EMOTION RECOGNIITION SYSTEMHUMAN EMOTION RECOGNIITION SYSTEM
HUMAN EMOTION RECOGNIITION SYSTEM
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
 
Facial Recognition System
Facial Recognition SystemFacial Recognition System
Facial Recognition System
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Facial Expression Recognition
Facial Expression Recognition Facial Expression Recognition
Facial Expression Recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
 
Emotion recognition
Emotion recognitionEmotion recognition
Emotion recognition
 

Similar to Automated Criminal Identification Using Face Detection and Recognition

IRJET- Drive Assistance an Android Application for Drowsiness Detection
IRJET- Drive Assistance an Android Application for Drowsiness DetectionIRJET- Drive Assistance an Android Application for Drowsiness Detection
IRJET- Drive Assistance an Android Application for Drowsiness DetectionIRJET Journal
 
IRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry Pi
IRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry PiIRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry Pi
IRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry PiIRJET Journal
 
Smart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face RecognitionSmart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face RecognitionIRJET Journal
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET Journal
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET Journal
 
IRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face RecognitionIRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face RecognitionIRJET Journal
 
Virtual Contact Discovery using Facial Recognition
Virtual Contact Discovery using Facial RecognitionVirtual Contact Discovery using Facial Recognition
Virtual Contact Discovery using Facial RecognitionIRJET Journal
 
Real time face recognition of video surveillance system using haar cascade c...
Real time face recognition of video surveillance system using  haar cascade c...Real time face recognition of video surveillance system using  haar cascade c...
Real time face recognition of video surveillance system using haar cascade c...nooriasukmaningtyas
 
IRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: SurveyIRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: SurveyIRJET Journal
 
A Real Time Advance Automated Attendance System using Face-Net Algorithm
A Real Time Advance Automated Attendance System using Face-Net AlgorithmA Real Time Advance Automated Attendance System using Face-Net Algorithm
A Real Time Advance Automated Attendance System using Face-Net AlgorithmIRJET Journal
 
IRJET- VISITX: Face Recognition Visitor Management System
IRJET-  	  VISITX: Face Recognition Visitor Management SystemIRJET-  	  VISITX: Face Recognition Visitor Management System
IRJET- VISITX: Face Recognition Visitor Management SystemIRJET Journal
 
IRJET- Driver’s Sleep Detection
IRJET-  	  Driver’s Sleep DetectionIRJET-  	  Driver’s Sleep Detection
IRJET- Driver’s Sleep DetectionIRJET Journal
 
IRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET Journal
 
Security by user through application to lock/unlock machine by face detection
Security by user through application to lock/unlock machine by face detectionSecurity by user through application to lock/unlock machine by face detection
Security by user through application to lock/unlock machine by face detectionIRJET Journal
 
Effective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsEffective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsIRJET Journal
 
IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial RecognitionIRJET Journal
 
IRJET- Object Detection in an Image using Convolutional Neural Network
IRJET- Object Detection in an Image using Convolutional Neural NetworkIRJET- Object Detection in an Image using Convolutional Neural Network
IRJET- Object Detection in an Image using Convolutional Neural NetworkIRJET Journal
 
IRJET- Face Detection and Recognition using OpenCV
IRJET- Face Detection and Recognition using OpenCVIRJET- Face Detection and Recognition using OpenCV
IRJET- Face Detection and Recognition using OpenCVIRJET Journal
 
Smart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionSmart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionIRJET Journal
 

Similar to Automated Criminal Identification Using Face Detection and Recognition (20)

IRJET- Drive Assistance an Android Application for Drowsiness Detection
IRJET- Drive Assistance an Android Application for Drowsiness DetectionIRJET- Drive Assistance an Android Application for Drowsiness Detection
IRJET- Drive Assistance an Android Application for Drowsiness Detection
 
IRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry Pi
IRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry PiIRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry Pi
IRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry Pi
 
Smart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face RecognitionSmart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face Recognition
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face Recognition
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face Recognition
 
IRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face RecognitionIRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face Recognition
 
Virtual Contact Discovery using Facial Recognition
Virtual Contact Discovery using Facial RecognitionVirtual Contact Discovery using Facial Recognition
Virtual Contact Discovery using Facial Recognition
 
Real time face recognition of video surveillance system using haar cascade c...
Real time face recognition of video surveillance system using  haar cascade c...Real time face recognition of video surveillance system using  haar cascade c...
Real time face recognition of video surveillance system using haar cascade c...
 
IRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: SurveyIRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: Survey
 
A Real Time Advance Automated Attendance System using Face-Net Algorithm
A Real Time Advance Automated Attendance System using Face-Net AlgorithmA Real Time Advance Automated Attendance System using Face-Net Algorithm
A Real Time Advance Automated Attendance System using Face-Net Algorithm
 
IRJET- VISITX: Face Recognition Visitor Management System
IRJET-  	  VISITX: Face Recognition Visitor Management SystemIRJET-  	  VISITX: Face Recognition Visitor Management System
IRJET- VISITX: Face Recognition Visitor Management System
 
IRJET- Driver’s Sleep Detection
IRJET-  	  Driver’s Sleep DetectionIRJET-  	  Driver’s Sleep Detection
IRJET- Driver’s Sleep Detection
 
IRJET- Digiyathra
IRJET-  	  DigiyathraIRJET-  	  Digiyathra
IRJET- Digiyathra
 
IRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric Attendance
 
Security by user through application to lock/unlock machine by face detection
Security by user through application to lock/unlock machine by face detectionSecurity by user through application to lock/unlock machine by face detection
Security by user through application to lock/unlock machine by face detection
 
Effective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsEffective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID Tags
 
IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial Recognition
 
IRJET- Object Detection in an Image using Convolutional Neural Network
IRJET- Object Detection in an Image using Convolutional Neural NetworkIRJET- Object Detection in an Image using Convolutional Neural Network
IRJET- Object Detection in an Image using Convolutional Neural Network
 
IRJET- Face Detection and Recognition using OpenCV
IRJET- Face Detection and Recognition using OpenCVIRJET- Face Detection and Recognition using OpenCV
IRJET- Face Detection and Recognition using OpenCV
 
Smart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionSmart Surveillance System through Computer Vision
Smart Surveillance System through Computer Vision
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 

Recently uploaded (20)

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 

Automated Criminal Identification Using Face Detection and Recognition

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 910 Automated Criminal Identification System using Face Detection and Recognition Piyush Chhoriya UG Scholar, Computer Engineering Department, K. K. Wagh Institute of Engineering Education & Research, Nashik-422003, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - As the world has seen exponential advancement over the last decade, there is an abnormal increase inthe crimerate and also the number of criminals are increasing at an alarming rate, this leads toward a great concern about the security issues. various causes of theft, stealing crimes, burglary, kidnapping, human trafficking etc. are left unsolved because the availability of police personnel is limited, many times there is no identification of the person who was involved in criminal activities. To avoid this situation an automated facial recognition system for criminal identification is proposed using Haar feature-based cascade classifier. This paper presents a real-time face recognition using an automated surveillance camera. This system will be able to detect and recognize face automatically in real-time. Key Words: Criminal Identification, Facial recognition, Haar Classifier, Real-time, Viola-jones. 1. INTRODUCTION The face is crucial for human identity. It is the feature which best distinguishes a person. Face detection and recognition is the technology which is used to identify a person from a video or image. The whole Face Detection and Recognitionprocesscanbe divided into four major steps: Fig.1 Face Detection and Recognition process In this paper, we propose a face detection and recognition system for criminal identification using python along with OpenCV package. The proposed system consists of 4 steps: (1) Training of images (2) Face detection using Haar cascade classifier (3) comparison of trained images with images captured from the surveillance camera (4)result based on the comparison. 2. METHODOLOGY: In this project, we can detect and recognize the faces of the criminals in a video stream obtained from a camera in real-time. The system consists of three databases. First is the citizen database, which will contain the images and unique-id of all the citizens living in that country. Second is local watch list database, which will have the images(min 10) and details(Unique-id, Name, Gender, Religion, Crimes done, etc) of each criminal who belongs to that country. Third is International watch list database, which will have the images (min 10) anddetails(Unique-id,Name,Gender, Religion,Crimesdone,etc)ofthecriminals who are not the citizens of that country. All the images are first preprocessed. Then it goes through feature extraction where Haar cascade is used. The video is captured from the surveillance camera which are converted into frames. When a face is detected in a frame, it is preprocessed. Then it goes through feature extraction where Haar cascade is used. The features of the processed real-time image is compared with the features of processed images which are stored in the citizen database. If a match is found, it is further compared with the features of images stored in a local watch list database to identify if the person is criminal or not. If
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 911 he is criminal a notification is sent to the police personnel with all the details and the time for which he was under the surveillance of the camera. If he is not a citizen of that country, it is then compared with the features of images stored in the international watch list database. If a match is found, a notification is sent to the police personnel with all the details and the time for which he was under the surveillance of the camera. If a match is not found in both the watch lists, he is innocent. Fig -2: Flowchart of proposed methodology 3. IMPLEMENTATION: 3.1 Modules required The Modules required to perform the facial recognition are cv2, image module and numpy. cv2 is the OpenCV module and contains various functions for face detection and recognition. The dataset images are in gif format and, OpenCV does not support gif format, Image module from PIL is used to read the image in grayscale format. Numpy is a python library used for scientific computing. NumPy arrays are used to store the images. 3.2 Load the detection Cascade To Load the face detection cascade the first step is to detect the face in eachframe. Oncewegettheregionofinterest containing the face in the image, we use it for training the recognizer. For the purpose of face detection, we will use the Haar Cascade provided by OpenCV. The haar cascades that come with OpenCV are located in the directory of OpenCV installation. Haar cascade frontal face default.xml is used for detecting the face. Cascade is loaded using the cv2CascadeClassifierfunctionwhich takes the path to the cascade xml file. If the xml file is in the current working directory, then the relative path is used. 3.3 Create the Face Recognizer Object The next step involves creating the face recognizer object [4]. The face recognizer object has functions like FaceRecognizer.train() to train the recognizer and FaceRecognizer.predict() to recognize a face. OpenCV currently provides Video surveillance Frames Pre-processing Feature Extraction Matching Citizen Database Local watch-list Database International watch-list Database Matching Matching Criminal Innocent Criminal Innocent Notification Notification Pre- processed images Unique- id Pre- processed images Details Pre- processed images Details No NoYes Yes No Yes
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 912 Eigenface Recognizer, Fisherface Recognizer and Local Binary Patterns Histograms(LBPH)FaceRecognizer[4]. Wehaveused LBPH recognizer because Real life isn’t perfect. We simply can’t guarantee perfect light settings in your images or10 different images of a person. LBPH focus on extracting local features from images. The idea is to not look at the whole image as a high- dimensional vector but describe only local features of an object. The basic idea of Local Binary Patterns is to summarize the local structure in an image by comparing each pixel with its neighbourhood. 3.4 Perform the training 3.5 Perform Testing 4. HAAR CASCEDE CLASSIFIER The face detection algorithm proposed by Viola and Jones is used as the basis of our design [1]. The face detection algorithm looks for specific Haar features and not pixels of a human face. This method consists of four steps- 4.1 Haar Feature Selection After the tremendous amount of training data (in the form of images) is fed into the system, the classifier begins by extracting Haar features from each image. Haar features are kind of convolutionkernelswhichprimarilydetect whethera suitablefeature is present on an image or not. Some examples of Haar features are mentioned below: These Haar Features are like windows and are placed upon images to compute a single feature. The feature is essentially a single value obtained by subtracting the sum of the pixels under the white region and that under the black. The process canbe easily visualized in the example below. For demonstration purpose, let's say we are only extracting two features, hence we have only two windows here. The first feature relies on the point that the eye region is darker than theadjacentcheeksandnoseregion.Thesecondfeaturefocuseson the fact that eyes are kind of darker as compared to the bridge of the nose. Thus, when the feature window moves over the eyes, it will calculate a single value. This value will then be compared to somethresholdandifitpassesthatitwill concludethat there is an edge here or some positive feature. 4.2 Creating Integral Images The algorithm proposed by Viola-Jones uses a 24X24 base window size, and that would result in more than 180,000 features being calculated in this window. Imagine calculating the pixel difference for all the features. The solution devised for this computationally intensive process is to go for the Integral Image concept. The integral image means thattofindthe sumofall pixels under any rectangle, we simply need the four corner values.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 913 This means, to calculate the sum of pixels in any feature window, we do not need to sum them up individually. All weneedisto calculate the integral image using the 4 corner values. 4.3 Adaboost training As pointed out above, more than 180,000 features values result within a 24X24 window. However, not all features are useful for identifying a face. To only select the best feature out of the entire chunk, a machine learning algorithm called Adaboost is used [2]. What it essentially does is that it selects only those features that help to improve the classifier accuracy. It does so by constructing a strong classifier which is a linear combination of several weak classifiers. This reduces the amount of features drastically to around 6000 from around 180,000. 4.4 Cascading Classifier Another way by which Viola Jones ensured that the algorithm performs fast is by employing a cascade of classifiers [3]. The cascade classifier essentially consists of stages where each stage consists of a strong classifier. This is beneficial since it eliminates the need to apply all features at once on a window. Rather, it groupsthefeatures intoseparatesub-windowsandthe classifier at each stage determines whether or not the sub-window is a face. In case it isnot,thesub-windowisdiscardedalong with the features in that window. If the sub-window moves past the classifier, it continues to the next stage where the second stage of features is applied. The process can be understood with the help of the diagram below. 3. CONCLUSION In this project, we can detect and recognize faces of the criminals in a video stream obtained from a camera in real time. We have used Haar feature-based cascade classifiers in OpenCV approach for face detection. It is a machine learning based approach where a cascade function is trained from a lot of positive and negative images. It is then used to detect objects in other images. Also, we have used Local Binary Patterns Histograms (LBPH) for face recognition. Several advantages of this algorithm are: Efficient selection of features, Scale and location invariant detector, instead of scaling the image itself, wescale the features. LBPH recognizer can recognize faces in different lighting conditions with highaccuracy.Also,LBPHcanrecognize efficiently even if single training image is used for each person. The real-timeautomatedfacedetectionandrecognitionsystem proposed would be ideal for crowd surveillance applications.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 914 REFERENCES [1] Viola, P. and Jones, M. Rapid object detection using boosted cascade of simple features. IEEE Conference on Computer Vision and Pattern Recognition, 2001. [2] Hui-Xing, J., Yu-Jin, Z.: Fast Adaboost Training Algorithm by Dynamic Weight Trimming. Chinese Journal of Computers (2009) [3] https://en.wikipedia.org/wiki/Cascading_classifiers [4] https://docs.opencv.org/2.4/modules/contrib/doc/facerec/facerec_tutorial.html#local-binary-patterns-histograms [5] https://opencv.org/ [6] Apoorva.P, Impana.H.C, Siri.S.L, “Automated criminal identification by face recognition using open computer vision classifiers”, 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC) [7] http://docs.opencv.org/trunk/d7/d8b/tutorial_py_face_detection.html [8] Piyush Kakkar, Vibhor Sharma, “Criminal identification system using Face Detection and Recognition ”, IJARCCE, Vol. 7,issue 3, March 2018