SlideShare a Scribd company logo
.
.
.
SMART Home Camera
Agenda
Gesture
Recognition
Motion
Detection
Background
AI
IOT Scenario
How it work
Summary
3
• 即時錄像擷取
• 遠端操控鏡頭
• 遠端廣播
• 遠端警告
• 辨識影像內容
• 依照影像辨識結果進行動作
• 使用者指令辨識
使用者無法隨時隨地觀看並做出即時對應Action
camera
「邊緣智慧」可以說是AI落實真實生活應用的最後一哩路
• 占用大量傳輸資源
• 延遲時間的限制
• 防盜偵測
IOT and AIAIIOT
HOWITWORKS .
.
.
f ( ) = ……
…… ………
= “Master is raising hand!’
Serv
erWhen
Master
Is
Not
At
home ≠
2nd image1st image
Let’s take a Look at
Gesture Recognition
‘0’:
Raising hand
‘1’:
Cross hand
(in-front chest)
‘2’:
Hearing
(with 2 hands)
‘3’:
Sh~
‘4’:
Touching
belly
‘5’:
Other
‘6’:
No people
Light-on Water me
Robot Arm
No Action
Activate Respective Functions
Light-off Music-on Music-off
Gesture Recognition Gesture and Function
Gesture Recognition How it Learn – CNN model
Fully
connection
layers
Conv2D +Pooling2D
layers
Flatten
https://pixabay.com
Built an smart model.h5
IMAGE
COLLECTI
ON
FEATURE
EXTRAYIO
NC
CLASSIFIE
R
TRAINING
WEIGHTS
COLLECTI
ON
Backpropagation
Accuracy
Gesture RecognitionUse trained model to Predict
Using smart model.h5
Flatten
‘0’
‘3’
‘1’
‘2’
‘4’
‘5’
‘6’
https://pixabay.com
None
Gesture Recognition Training set#1 – 10K data
Model #1
Shuffle color filter
while taking photos
‘0’ ‘3’‘1’ ‘2’ ‘4’ ‘5’
Heat Map Verification
Blank
Background
Model #1
Strongly depends on specific face feature and specific background
Heat Map
0
20
40
60
80
100
120
120100806040200
0.2
0.4
0.6
0.8
1.0
0.0
A class activation map (CAM) lets us see which regions in
the image were relevant to this class.
Highly related
Zero related
Gesture Recognition Training set#2 – 55K data
Model #2
1. Different
face
2. Different
background
3. Different
clothes
4. Add set 6 (No
people)
+Set #1
‘0’ ‘3’‘1’ ‘2’ ‘4’ ‘5’ ‘6’
Heat Map Verification
Blank
Background
Model #1
*For different FACES: Accuracy ↑ *For different BACKGROUND: Accuracy −
Gesture Recognition Training set#3 – 100K data
Model #3
Change
background
manually
+
Set #1 Set #2
‘0’ ‘3’‘1’ ‘2’ ‘4’ ‘5’ ‘6’
Heat Map Verification
*For different FACES: Accuracy ↑ ↑ *For different BACKGROUND: Accuracy ↑
Blank
Background
Model #1
Gesture Recognition Heat Map – Summary
Fix Background
Model #1
Model #2
Model #3
NA
Gesture Recognition Heat Map – Summary
Saliency Maps
We can use these gradients to highlight input regions that cause the most change in the output.
Intuitively this should highlight salient image regions that most contribute towards the output.
∂output
∂input
How about the other?
Motion Detection
Motion Detection Motion Detect by OpenCV
Motion Detected ROI = 1
Frame (t)
Frame (t+1)
Blur (t)
Blur (t+1)
Diff () Gray () Thresh_binary Opening x2
Generate the
contour (external)
Closing x2
If contour area >
0.2x frame area
Send http post to the web server, save the picture
and record the frame and go back to while loop
Frame (t+2) Blur (t+2)
Back to WhileLoop
OpenCV (Open Source Computer Vision Library)
is an open-source BSD-licensed library that
includes several hundreds of computer vision
algorithms.
Process Flow
Time: t Time: t+1
Motion Detection The First Frame(t) & Blur
First Frame (t) First Frame (t) and Blurred
Process FlowFrame (t)
Frame (t+1)
Diff () Gray () Thresh_binary Opening x2 Closing x2 Generate contour
Blur (t)
Blur (t+1)
Motion Detection Frame (t+1) and Difference
Frame (t+1) and Blurred Frame Diff( (t+1)- (t))
Process FlowFrame (t)
Frame (t+1)
Diff () Gray () Thresh_binary Opening x2 Closing x2 Generate contour
Blur (t)
Blur (t+1)
Motion Detection Gray & Threshold Binary
Gray Threshold Binary
Process FlowFrame (t)
Frame (t+1)
Diff () Gray () Thresh_binary Opening x2 Closing x2 Generate contour
Blur (t)
Blur (t+1)
Motion Detection Opening and Closing
Opening Closing
Process FlowFrame (t)
Frame (t+1)
Diff () Gray () Thresh_binary Opening x2 Closing x2 Generate contour
Blur (t)
Blur (t+1)
Motion Detection Contours and Frame Save
Generate Contours Save Frame
Process FlowFrame (t)
Frame (t+1)
Diff () Gray () Thresh_binary Opening x2 Closing x2 Generate contour
Blur (t)
Blur (t+1)
contour area > 0.2x frame area
Send http post to the web server, save the picture and
record the frame and go back to while loop
If
It’s How They Communicate
HTTP/Node.js/MQTT
.
.
.
Serv
er
System Communication
Gesture Recognition
Motion Detection
HTTP
POST
HTTP
Response
Camera
Python
WebClient
MQTT
Open CV
-
Moving object detected!
ConvNet
0123456…
Gesture classified!
Line
Serve
r
Node.Js
User’s Device
WebServer
MQTT MQTT
HTTP POST
Panel
Line bot
Listening
MQTT
Relay
GPIOI2C
Audio player
.
.
.
AI FunctionIOT Function
Hardware
Serv
er
Summary
Who Are We?
Thank you!
Python
C/Linux
C#
Hardware
Deep learning Python
OpenCV
C
Linux embedded system
Node.js
Hardware
Deep learning
Python
C
Deep learning
Presentation
Image processing
Deep learning
Python
PPT
Visualization
Bin
Robby
Ethan
Jayden

More Related Content

Similar to AIoT居家智能應用—姿態識別 Motion detection camera v2.4

DEFCON 23 - Ian Latter - remote access the apt
DEFCON 23 - Ian Latter - remote access the aptDEFCON 23 - Ian Latter - remote access the apt
DEFCON 23 - Ian Latter - remote access the apt
Felipe Prado
 
Lukas Apa - Hacking Robots Before SkyNet
Lukas Apa - Hacking Robots Before SkyNet Lukas Apa - Hacking Robots Before SkyNet
Lukas Apa - Hacking Robots Before SkyNet
NoNameCon
 
Seeing with Python - Pycon SG 2014
Seeing with Python - Pycon SG 2014Seeing with Python - Pycon SG 2014
Seeing with Python - Pycon SG 2014
Mark Rees
 
Rust "Hot or Not" at Sioux
Rust "Hot or Not" at SiouxRust "Hot or Not" at Sioux
Rust "Hot or Not" at Sioux
nikomatsakis
 
Dealing with the need for Infrastructural Support in Ambient Intelligence
Dealing with the need for Infrastructural Support in Ambient IntelligenceDealing with the need for Infrastructural Support in Ambient Intelligence
Dealing with the need for Infrastructural Support in Ambient Intelligence
Diego López-de-Ipiña González-de-Artaza
 
Using Android Things to Detect & Exterminate Reptilians
Using Android Things to Detect & Exterminate ReptiliansUsing Android Things to Detect & Exterminate Reptilians
Using Android Things to Detect & Exterminate Reptilians
Nilhcem
 
A Layered Architecture for the Model-driven Development of Distributed Simula...
A Layered Architecture for the Model-driven Development of Distributed Simula...A Layered Architecture for the Model-driven Development of Distributed Simula...
A Layered Architecture for the Model-driven Development of Distributed Simula...
Daniele Gianni
 
มโนท ศน เทคโนโลย_ทางการศ_กษา
มโนท ศน เทคโนโลย_ทางการศ_กษามโนท ศน เทคโนโลย_ทางการศ_กษา
มโนท ศน เทคโนโลย_ทางการศ_กษา
Julalak Kaewjoonla
 
มโนท ศน เทคโนโลย_ทางการศ_กษา
มโนท ศน เทคโนโลย_ทางการศ_กษามโนท ศน เทคโนโลย_ทางการศ_กษา
มโนท ศน เทคโนโลย_ทางการศ_กษา
Julalak Kaewjoonla
 
มโนท ศน เทคโนโลย_ทางการศ_กษา
มโนท ศน เทคโนโลย_ทางการศ_กษามโนท ศน เทคโนโลย_ทางการศ_กษา
มโนท ศน เทคโนโลย_ทางการศ_กษา
Julalak Kaewjoonla
 
How Triton can help to reverse virtual machine based software protections
How Triton can help to reverse virtual machine based software protectionsHow Triton can help to reverse virtual machine based software protections
How Triton can help to reverse virtual machine based software protections
Jonathan Salwan
 
"A rootkits writer’s guide to defense" - Michal Purzynski
"A rootkits writer’s guide to defense" - Michal Purzynski"A rootkits writer’s guide to defense" - Michal Purzynski
"A rootkits writer’s guide to defense" - Michal Purzynski
PROIDEA
 
LST Toolkit: Exfiltration Over Sound, Light, Touch
LST Toolkit: Exfiltration Over Sound, Light, TouchLST Toolkit: Exfiltration Over Sound, Light, Touch
LST Toolkit: Exfiltration Over Sound, Light, Touch
Dimitry Snezhkov
 
มโนทัศน์เทคโนโลยีทางการศึกษา
มโนทัศน์เทคโนโลยีทางการศึกษามโนทัศน์เทคโนโลยีทางการศึกษา
มโนทัศน์เทคโนโลยีทางการศึกษา
may53638332
 
How shit works: the CPU
How shit works: the CPUHow shit works: the CPU
How shit works: the CPU
Tomer Gabel
 
Meltdown & Spectre attacks
Meltdown & Spectre attacksMeltdown & Spectre attacks
Meltdown & Spectre attacks
Marian Marinov
 
Analysing Ransomware
Analysing RansomwareAnalysing Ransomware
Analysing Ransomware
Napier University
 
Streaming Dataflow with Apache Flink
Streaming Dataflow with Apache Flink Streaming Dataflow with Apache Flink
Streaming Dataflow with Apache Flink
huguk
 
People detection in a video
People detection in a videoPeople detection in a video
People detection in a video
Yonatan Katz
 
Streamy, Pipy, Analyticy
Streamy, Pipy, AnalyticyStreamy, Pipy, Analyticy
Streamy, Pipy, Analyticy
darach
 

Similar to AIoT居家智能應用—姿態識別 Motion detection camera v2.4 (20)

DEFCON 23 - Ian Latter - remote access the apt
DEFCON 23 - Ian Latter - remote access the aptDEFCON 23 - Ian Latter - remote access the apt
DEFCON 23 - Ian Latter - remote access the apt
 
Lukas Apa - Hacking Robots Before SkyNet
Lukas Apa - Hacking Robots Before SkyNet Lukas Apa - Hacking Robots Before SkyNet
Lukas Apa - Hacking Robots Before SkyNet
 
Seeing with Python - Pycon SG 2014
Seeing with Python - Pycon SG 2014Seeing with Python - Pycon SG 2014
Seeing with Python - Pycon SG 2014
 
Rust "Hot or Not" at Sioux
Rust "Hot or Not" at SiouxRust "Hot or Not" at Sioux
Rust "Hot or Not" at Sioux
 
Dealing with the need for Infrastructural Support in Ambient Intelligence
Dealing with the need for Infrastructural Support in Ambient IntelligenceDealing with the need for Infrastructural Support in Ambient Intelligence
Dealing with the need for Infrastructural Support in Ambient Intelligence
 
Using Android Things to Detect & Exterminate Reptilians
Using Android Things to Detect & Exterminate ReptiliansUsing Android Things to Detect & Exterminate Reptilians
Using Android Things to Detect & Exterminate Reptilians
 
A Layered Architecture for the Model-driven Development of Distributed Simula...
A Layered Architecture for the Model-driven Development of Distributed Simula...A Layered Architecture for the Model-driven Development of Distributed Simula...
A Layered Architecture for the Model-driven Development of Distributed Simula...
 
มโนท ศน เทคโนโลย_ทางการศ_กษา
มโนท ศน เทคโนโลย_ทางการศ_กษามโนท ศน เทคโนโลย_ทางการศ_กษา
มโนท ศน เทคโนโลย_ทางการศ_กษา
 
มโนท ศน เทคโนโลย_ทางการศ_กษา
มโนท ศน เทคโนโลย_ทางการศ_กษามโนท ศน เทคโนโลย_ทางการศ_กษา
มโนท ศน เทคโนโลย_ทางการศ_กษา
 
มโนท ศน เทคโนโลย_ทางการศ_กษา
มโนท ศน เทคโนโลย_ทางการศ_กษามโนท ศน เทคโนโลย_ทางการศ_กษา
มโนท ศน เทคโนโลย_ทางการศ_กษา
 
How Triton can help to reverse virtual machine based software protections
How Triton can help to reverse virtual machine based software protectionsHow Triton can help to reverse virtual machine based software protections
How Triton can help to reverse virtual machine based software protections
 
"A rootkits writer’s guide to defense" - Michal Purzynski
"A rootkits writer’s guide to defense" - Michal Purzynski"A rootkits writer’s guide to defense" - Michal Purzynski
"A rootkits writer’s guide to defense" - Michal Purzynski
 
LST Toolkit: Exfiltration Over Sound, Light, Touch
LST Toolkit: Exfiltration Over Sound, Light, TouchLST Toolkit: Exfiltration Over Sound, Light, Touch
LST Toolkit: Exfiltration Over Sound, Light, Touch
 
มโนทัศน์เทคโนโลยีทางการศึกษา
มโนทัศน์เทคโนโลยีทางการศึกษามโนทัศน์เทคโนโลยีทางการศึกษา
มโนทัศน์เทคโนโลยีทางการศึกษา
 
How shit works: the CPU
How shit works: the CPUHow shit works: the CPU
How shit works: the CPU
 
Meltdown & Spectre attacks
Meltdown & Spectre attacksMeltdown & Spectre attacks
Meltdown & Spectre attacks
 
Analysing Ransomware
Analysing RansomwareAnalysing Ransomware
Analysing Ransomware
 
Streaming Dataflow with Apache Flink
Streaming Dataflow with Apache Flink Streaming Dataflow with Apache Flink
Streaming Dataflow with Apache Flink
 
People detection in a video
People detection in a videoPeople detection in a video
People detection in a video
 
Streamy, Pipy, Analyticy
Streamy, Pipy, AnalyticyStreamy, Pipy, Analyticy
Streamy, Pipy, Analyticy
 

More from IttrainingIttraining

【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
IttrainingIttraining
 
商品辨識定位系統_艾鍗學院-AIoT智能行動服務物聯網班
商品辨識定位系統_艾鍗學院-AIoT智能行動服務物聯網班商品辨識定位系統_艾鍗學院-AIoT智能行動服務物聯網班
商品辨識定位系統_艾鍗學院-AIoT智能行動服務物聯網班
IttrainingIttraining
 
居家雲端照護系統_艾鍗學院-AIoT智能行動服務物聯網班
居家雲端照護系統_艾鍗學院-AIoT智能行動服務物聯網班居家雲端照護系統_艾鍗學院-AIoT智能行動服務物聯網班
居家雲端照護系統_艾鍗學院-AIoT智能行動服務物聯網班
IttrainingIttraining
 
AIoT 智能商店_艾鍗學院-AIoT智能行動服務物聯網班
AIoT 智能商店_艾鍗學院-AIoT智能行動服務物聯網班AIoT 智能商店_艾鍗學院-AIoT智能行動服務物聯網班
AIoT 智能商店_艾鍗學院-AIoT智能行動服務物聯網班
IttrainingIttraining
 
04_動物姿態識別Pet pose classification
04_動物姿態識別Pet pose classification04_動物姿態識別Pet pose classification
04_動物姿態識別Pet pose classification
IttrainingIttraining
 
01_智慧英文評分系統 Evaluate Student Summaries
01_智慧英文評分系統 Evaluate Student Summaries01_智慧英文評分系統 Evaluate Student Summaries
01_智慧英文評分系統 Evaluate Student Summaries
IttrainingIttraining
 
03_AI旅宿訂房系統-AI智慧訂房方案
03_AI旅宿訂房系統-AI智慧訂房方案03_AI旅宿訂房系統-AI智慧訂房方案
03_AI旅宿訂房系統-AI智慧訂房方案
IttrainingIttraining
 
02_永豐AI GO競賽攻房戰 Dr. House Team
02_永豐AI GO競賽攻房戰 Dr. House Team02_永豐AI GO競賽攻房戰 Dr. House Team
02_永豐AI GO競賽攻房戰 Dr. House Team
IttrainingIttraining
 
05_關鍵字提取與廣告文稿評分系統_以化妝品產業為例
05_關鍵字提取與廣告文稿評分系統_以化妝品產業為例05_關鍵字提取與廣告文稿評分系統_以化妝品產業為例
05_關鍵字提取與廣告文稿評分系統_以化妝品產業為例
IttrainingIttraining
 
Novozymes Enzyme Stability Prediction
Novozymes Enzyme Stability PredictionNovozymes Enzyme Stability Prediction
Novozymes Enzyme Stability Prediction
IttrainingIttraining
 
旅遊推薦系統Tourist Line Spot
旅遊推薦系統Tourist Line Spot旅遊推薦系統Tourist Line Spot
旅遊推薦系統Tourist Line Spot
IttrainingIttraining
 
無人商店Unmanned Store
無人商店Unmanned Store無人商店Unmanned Store
無人商店Unmanned Store
IttrainingIttraining
 
物件辨識攝影機
物件辨識攝影機物件辨識攝影機
物件辨識攝影機
IttrainingIttraining
 
ChatBot問答機器人
ChatBot問答機器人ChatBot問答機器人
ChatBot問答機器人
IttrainingIttraining
 
街景門牌實價登錄
街景門牌實價登錄街景門牌實價登錄
街景門牌實價登錄
IttrainingIttraining
 
APCS程式設計實作題(Python解題)-物品堆疊/邏輯運算子
APCS程式設計實作題(Python解題)-物品堆疊/邏輯運算子APCS程式設計實作題(Python解題)-物品堆疊/邏輯運算子
APCS程式設計實作題(Python解題)-物品堆疊/邏輯運算子
IttrainingIttraining
 
APCS程式設計實作題(Python解題)-解題技巧/特殊編碼/完全奇數
APCS程式設計實作題(Python解題)-解題技巧/特殊編碼/完全奇數APCS程式設計實作題(Python解題)-解題技巧/特殊編碼/完全奇數
APCS程式設計實作題(Python解題)-解題技巧/特殊編碼/完全奇數
IttrainingIttraining
 
物聯智慧杯墊 Smart Cup Pad
物聯智慧杯墊 Smart Cup Pad物聯智慧杯墊 Smart Cup Pad
物聯智慧杯墊 Smart Cup Pad
IttrainingIttraining
 
口罩偵測機 Mask-detection
口罩偵測機 Mask-detection口罩偵測機 Mask-detection
口罩偵測機 Mask-detection
IttrainingIttraining
 
居家智能LED調光燈
居家智能LED調光燈居家智能LED調光燈
居家智能LED調光燈
IttrainingIttraining
 

More from IttrainingIttraining (20)

【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
 
商品辨識定位系統_艾鍗學院-AIoT智能行動服務物聯網班
商品辨識定位系統_艾鍗學院-AIoT智能行動服務物聯網班商品辨識定位系統_艾鍗學院-AIoT智能行動服務物聯網班
商品辨識定位系統_艾鍗學院-AIoT智能行動服務物聯網班
 
居家雲端照護系統_艾鍗學院-AIoT智能行動服務物聯網班
居家雲端照護系統_艾鍗學院-AIoT智能行動服務物聯網班居家雲端照護系統_艾鍗學院-AIoT智能行動服務物聯網班
居家雲端照護系統_艾鍗學院-AIoT智能行動服務物聯網班
 
AIoT 智能商店_艾鍗學院-AIoT智能行動服務物聯網班
AIoT 智能商店_艾鍗學院-AIoT智能行動服務物聯網班AIoT 智能商店_艾鍗學院-AIoT智能行動服務物聯網班
AIoT 智能商店_艾鍗學院-AIoT智能行動服務物聯網班
 
04_動物姿態識別Pet pose classification
04_動物姿態識別Pet pose classification04_動物姿態識別Pet pose classification
04_動物姿態識別Pet pose classification
 
01_智慧英文評分系統 Evaluate Student Summaries
01_智慧英文評分系統 Evaluate Student Summaries01_智慧英文評分系統 Evaluate Student Summaries
01_智慧英文評分系統 Evaluate Student Summaries
 
03_AI旅宿訂房系統-AI智慧訂房方案
03_AI旅宿訂房系統-AI智慧訂房方案03_AI旅宿訂房系統-AI智慧訂房方案
03_AI旅宿訂房系統-AI智慧訂房方案
 
02_永豐AI GO競賽攻房戰 Dr. House Team
02_永豐AI GO競賽攻房戰 Dr. House Team02_永豐AI GO競賽攻房戰 Dr. House Team
02_永豐AI GO競賽攻房戰 Dr. House Team
 
05_關鍵字提取與廣告文稿評分系統_以化妝品產業為例
05_關鍵字提取與廣告文稿評分系統_以化妝品產業為例05_關鍵字提取與廣告文稿評分系統_以化妝品產業為例
05_關鍵字提取與廣告文稿評分系統_以化妝品產業為例
 
Novozymes Enzyme Stability Prediction
Novozymes Enzyme Stability PredictionNovozymes Enzyme Stability Prediction
Novozymes Enzyme Stability Prediction
 
旅遊推薦系統Tourist Line Spot
旅遊推薦系統Tourist Line Spot旅遊推薦系統Tourist Line Spot
旅遊推薦系統Tourist Line Spot
 
無人商店Unmanned Store
無人商店Unmanned Store無人商店Unmanned Store
無人商店Unmanned Store
 
物件辨識攝影機
物件辨識攝影機物件辨識攝影機
物件辨識攝影機
 
ChatBot問答機器人
ChatBot問答機器人ChatBot問答機器人
ChatBot問答機器人
 
街景門牌實價登錄
街景門牌實價登錄街景門牌實價登錄
街景門牌實價登錄
 
APCS程式設計實作題(Python解題)-物品堆疊/邏輯運算子
APCS程式設計實作題(Python解題)-物品堆疊/邏輯運算子APCS程式設計實作題(Python解題)-物品堆疊/邏輯運算子
APCS程式設計實作題(Python解題)-物品堆疊/邏輯運算子
 
APCS程式設計實作題(Python解題)-解題技巧/特殊編碼/完全奇數
APCS程式設計實作題(Python解題)-解題技巧/特殊編碼/完全奇數APCS程式設計實作題(Python解題)-解題技巧/特殊編碼/完全奇數
APCS程式設計實作題(Python解題)-解題技巧/特殊編碼/完全奇數
 
物聯智慧杯墊 Smart Cup Pad
物聯智慧杯墊 Smart Cup Pad物聯智慧杯墊 Smart Cup Pad
物聯智慧杯墊 Smart Cup Pad
 
口罩偵測機 Mask-detection
口罩偵測機 Mask-detection口罩偵測機 Mask-detection
口罩偵測機 Mask-detection
 
居家智能LED調光燈
居家智能LED調光燈居家智能LED調光燈
居家智能LED調光燈
 

Recently uploaded

Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 

Recently uploaded (20)

Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 

AIoT居家智能應用—姿態識別 Motion detection camera v2.4

  • 3. 3 • 即時錄像擷取 • 遠端操控鏡頭 • 遠端廣播 • 遠端警告 • 辨識影像內容 • 依照影像辨識結果進行動作 • 使用者指令辨識 使用者無法隨時隨地觀看並做出即時對應Action camera 「邊緣智慧」可以說是AI落實真實生活應用的最後一哩路 • 占用大量傳輸資源 • 延遲時間的限制 • 防盜偵測 IOT and AIAIIOT
  • 4. HOWITWORKS . . . f ( ) = …… …… ……… = “Master is raising hand!’ Serv erWhen Master Is Not At home ≠ 2nd image1st image
  • 5. Let’s take a Look at Gesture Recognition
  • 6. ‘0’: Raising hand ‘1’: Cross hand (in-front chest) ‘2’: Hearing (with 2 hands) ‘3’: Sh~ ‘4’: Touching belly ‘5’: Other ‘6’: No people Light-on Water me Robot Arm No Action Activate Respective Functions Light-off Music-on Music-off Gesture Recognition Gesture and Function
  • 7. Gesture Recognition How it Learn – CNN model Fully connection layers Conv2D +Pooling2D layers Flatten https://pixabay.com Built an smart model.h5 IMAGE COLLECTI ON FEATURE EXTRAYIO NC CLASSIFIE R TRAINING WEIGHTS COLLECTI ON Backpropagation Accuracy
  • 8. Gesture RecognitionUse trained model to Predict Using smart model.h5 Flatten ‘0’ ‘3’ ‘1’ ‘2’ ‘4’ ‘5’ ‘6’ https://pixabay.com None
  • 9. Gesture Recognition Training set#1 – 10K data Model #1 Shuffle color filter while taking photos ‘0’ ‘3’‘1’ ‘2’ ‘4’ ‘5’ Heat Map Verification Blank Background Model #1 Strongly depends on specific face feature and specific background Heat Map 0 20 40 60 80 100 120 120100806040200 0.2 0.4 0.6 0.8 1.0 0.0 A class activation map (CAM) lets us see which regions in the image were relevant to this class. Highly related Zero related
  • 10. Gesture Recognition Training set#2 – 55K data Model #2 1. Different face 2. Different background 3. Different clothes 4. Add set 6 (No people) +Set #1 ‘0’ ‘3’‘1’ ‘2’ ‘4’ ‘5’ ‘6’ Heat Map Verification Blank Background Model #1 *For different FACES: Accuracy ↑ *For different BACKGROUND: Accuracy −
  • 11. Gesture Recognition Training set#3 – 100K data Model #3 Change background manually + Set #1 Set #2 ‘0’ ‘3’‘1’ ‘2’ ‘4’ ‘5’ ‘6’ Heat Map Verification *For different FACES: Accuracy ↑ ↑ *For different BACKGROUND: Accuracy ↑ Blank Background Model #1
  • 12. Gesture Recognition Heat Map – Summary Fix Background Model #1 Model #2 Model #3 NA
  • 13. Gesture Recognition Heat Map – Summary Saliency Maps We can use these gradients to highlight input regions that cause the most change in the output. Intuitively this should highlight salient image regions that most contribute towards the output. ∂output ∂input
  • 14. How about the other? Motion Detection
  • 15. Motion Detection Motion Detect by OpenCV Motion Detected ROI = 1 Frame (t) Frame (t+1) Blur (t) Blur (t+1) Diff () Gray () Thresh_binary Opening x2 Generate the contour (external) Closing x2 If contour area > 0.2x frame area Send http post to the web server, save the picture and record the frame and go back to while loop Frame (t+2) Blur (t+2) Back to WhileLoop OpenCV (Open Source Computer Vision Library) is an open-source BSD-licensed library that includes several hundreds of computer vision algorithms. Process Flow Time: t Time: t+1
  • 16. Motion Detection The First Frame(t) & Blur First Frame (t) First Frame (t) and Blurred Process FlowFrame (t) Frame (t+1) Diff () Gray () Thresh_binary Opening x2 Closing x2 Generate contour Blur (t) Blur (t+1)
  • 17. Motion Detection Frame (t+1) and Difference Frame (t+1) and Blurred Frame Diff( (t+1)- (t)) Process FlowFrame (t) Frame (t+1) Diff () Gray () Thresh_binary Opening x2 Closing x2 Generate contour Blur (t) Blur (t+1)
  • 18. Motion Detection Gray & Threshold Binary Gray Threshold Binary Process FlowFrame (t) Frame (t+1) Diff () Gray () Thresh_binary Opening x2 Closing x2 Generate contour Blur (t) Blur (t+1)
  • 19. Motion Detection Opening and Closing Opening Closing Process FlowFrame (t) Frame (t+1) Diff () Gray () Thresh_binary Opening x2 Closing x2 Generate contour Blur (t) Blur (t+1)
  • 20. Motion Detection Contours and Frame Save Generate Contours Save Frame Process FlowFrame (t) Frame (t+1) Diff () Gray () Thresh_binary Opening x2 Closing x2 Generate contour Blur (t) Blur (t+1) contour area > 0.2x frame area Send http post to the web server, save the picture and record the frame and go back to while loop If
  • 21. It’s How They Communicate HTTP/Node.js/MQTT . . . Serv er
  • 22. System Communication Gesture Recognition Motion Detection HTTP POST HTTP Response Camera Python WebClient MQTT Open CV - Moving object detected! ConvNet 0123456… Gesture classified! Line Serve r Node.Js User’s Device WebServer MQTT MQTT HTTP POST Panel Line bot Listening MQTT Relay GPIOI2C Audio player . . .
  • 24. Who Are We? Thank you! Python C/Linux C# Hardware Deep learning Python OpenCV C Linux embedded system Node.js Hardware Deep learning Python C Deep learning Presentation Image processing Deep learning Python PPT Visualization Bin Robby Ethan Jayden