Criminal Identification System allows the user to identify a certain criminal based on their biometrics. With advancements in security technology, CCTV cameras have been installed in many public and private areas to provide surveillance activities. The CCTV footage becomes crucial for understanding of the criminal activities that take place and to detect suspects. Additionallywhen a criminal is found it is difficult to locate and track him with just his image if he is on the run. Currently this procedure consists of finding such people in CCTV surveillance footage manually which is time consuming. It is also a tedious process as the resolution for such CCTV cameras is quite low. As a solution to these issues, the proposed system is developed to go through real time surveillance footage, detect and recognize the criminals based on reference datasets of criminals. The use of facial recognition for identifying criminals proves to bebeneficial. Once the best match is found the real time cropped image of the recognized criminal is saved which can be accessed by authorized officials for locating and tracking criminals or for further investigative use.
We develop face recognition software and other related SDKs and actually we are an algorithm provider.
Our face recognition technology was awarded "TOP 3 of FRVT2006".
Deep Unified Model for Intrusion Detection Based on Convolutional Neural NetworkYogeshIJTSRD
Indian army has always been subject to military attacks from neighbouring countries. Despite many surveillance devices and border security forces, the enemy finds a way to infiltrate deep into our borders. This is mainly because even now the surveillance in India is largely human assisted. Therefore this automated surveillance can authenticate the authorized persons and alert everyone when an enemy intrusion is detected. In this, we proposed an automated surveillance system that tackles the predicament of recognition of faces subject to different real time scenarios. This model incorporates a camera that captures the input image, an algorithm to detect a face from the input image, recognize the face using a convolution neural network along with transfer learning method, and verifies the detected person. The authorized person’s name and details are stored in CSV format and then into the database. In case of any unauthorized persons face is detected the image of the intruder along with time is stored in the database and warning signal is also given to alert the surrounding members in case of intrusion detection. Dhanu Shree D | Fouzia Fathima A | Madhumita B | Akila G | Thulasiram S "Deep Unified Model for Intrusion Detection Based on Convolutional Neural Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd39976.pdf Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/39976/deep-unified-model-for-intrusion-detection-based-on-convolutional-neural-network/dhanu-shree-d
Java Implementation based Heterogeneous Video Sequence Automated Surveillance...CSCJournals
Automated video based surveillance monitoring is an essential and computationally challenging task to resolve issues in the secure access localities. This paper deals with some of the issues which are encountered in the integration surveillance monitoring in the real-life circumstances. We have employed video frames which are extorted from heterogeneous video formats. Each video frame is chosen to identify the anomalous events which are occurred in the sequence of time-driven process. Background subtraction is essentially required based on the optimal threshold and reference frame. Rest of the frames are ablated from reference image, hence all the foreground images paradigms are obtained. The co-ordinate existing in the deducted images is found by scanning the images horizontally until the occurrence of first black pixel. Obtained coordinate is twinned with existing co-ordinates in the primary images. The twinned co-ordinate in the primary image is considered as an active-region-of-interest. At the end, the starred images are converted to temporal video that scrutinizes the moving silhouettes of human behaviors in a static background. The proposed model is implemented in Java. Results and performance analysis are carried out in the real-life environments.
We develop face recognition software and other related SDKs and actually we are an algorithm provider.
Our face recognition technology was awarded "TOP 3 of FRVT2006".
Deep Unified Model for Intrusion Detection Based on Convolutional Neural NetworkYogeshIJTSRD
Indian army has always been subject to military attacks from neighbouring countries. Despite many surveillance devices and border security forces, the enemy finds a way to infiltrate deep into our borders. This is mainly because even now the surveillance in India is largely human assisted. Therefore this automated surveillance can authenticate the authorized persons and alert everyone when an enemy intrusion is detected. In this, we proposed an automated surveillance system that tackles the predicament of recognition of faces subject to different real time scenarios. This model incorporates a camera that captures the input image, an algorithm to detect a face from the input image, recognize the face using a convolution neural network along with transfer learning method, and verifies the detected person. The authorized person’s name and details are stored in CSV format and then into the database. In case of any unauthorized persons face is detected the image of the intruder along with time is stored in the database and warning signal is also given to alert the surrounding members in case of intrusion detection. Dhanu Shree D | Fouzia Fathima A | Madhumita B | Akila G | Thulasiram S "Deep Unified Model for Intrusion Detection Based on Convolutional Neural Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd39976.pdf Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/39976/deep-unified-model-for-intrusion-detection-based-on-convolutional-neural-network/dhanu-shree-d
Java Implementation based Heterogeneous Video Sequence Automated Surveillance...CSCJournals
Automated video based surveillance monitoring is an essential and computationally challenging task to resolve issues in the secure access localities. This paper deals with some of the issues which are encountered in the integration surveillance monitoring in the real-life circumstances. We have employed video frames which are extorted from heterogeneous video formats. Each video frame is chosen to identify the anomalous events which are occurred in the sequence of time-driven process. Background subtraction is essentially required based on the optimal threshold and reference frame. Rest of the frames are ablated from reference image, hence all the foreground images paradigms are obtained. The co-ordinate existing in the deducted images is found by scanning the images horizontally until the occurrence of first black pixel. Obtained coordinate is twinned with existing co-ordinates in the primary images. The twinned co-ordinate in the primary image is considered as an active-region-of-interest. At the end, the starred images are converted to temporal video that scrutinizes the moving silhouettes of human behaviors in a static background. The proposed model is implemented in Java. Results and performance analysis are carried out in the real-life environments.
Graduation Project - Face Login : A Robust Face Identification System for Sec...Ahmed Gad
Face login is my 2015 graduation project started in 2014 and lasted 1.5 years of work.
Generally, it is an identification system using face images. It is a multi-use system but it was mainly created to authorize users to login into their system.
There is an IEEE paper published by the project algorithm used in ICCES 2014 http://ieeexplore.ieee.org/abstract/document/7030929/.
Here is its citation Semary, Noura A., and Ahmed Fawzi Gad. "A proposed framework for robust face identification system." Computer Engineering & Systems (ICCES), 2014 9th International Conference on. IEEE, 2014.
A YouTube video describing the project generally.
https://www.youtube.com/watch?v=OUvaPW70Eko
Find me on:
AFCIT
http://www.afcit.xyz
YouTube
https://www.youtube.com/channel/UCuewOYbBXH5gwhfOrQOZOdw
Google Plus
https://plus.google.com/u/0/+AhmedGadIT
SlideShare
https://www.slideshare.net/AhmedGadFCIT
LinkedIn
https://www.linkedin.com/in/ahmedfgad/
ResearchGate
https://www.researchgate.net/profile/Ahmed_Gad13
Academia
https://www.academia.edu/
Google Scholar
https://scholar.google.com.eg/citations?user=r07tjocAAAAJ&hl=en
Mendelay
https://www.mendeley.com/profiles/ahmed-gad12/
ORCID
https://orcid.org/0000-0003-1978-8574
StackOverFlow
http://stackoverflow.com/users/5426539/ahmed-gad
Twitter
https://twitter.com/ahmedfgad
Facebook
https://www.facebook.com/ahmed.f.gadd
Pinterest
https://www.pinterest.com/ahmedfgad/
Comparative Analysis of Face Recognition Methodologies and TechniquesFarwa Ansari
In the field of computer sciences such as
graphics and also analyzing the image and its processing,
face recognition is the most prominent problem due to the
comprehensive variation of faces and the complexity of
noises and image backgrounds. The purpose and working
of this system is that it identifies the face of a person from
the real time video and verifies the person from the images
store in the database. This paper provides a review of the
methodologies and techniques used for face detection and
recognition. Firstly a brief introduction of Facial
Recognition is given then the review of the face
recognition’s working which has been done until now, is
briefly introduced. Then the next sections covered the
approaches, methodologies, techniques and their
comparison. Holistic, Feature based and Hybrid
approaches are basically used for face recognition
methodologies. Eigen Faces, Fisher Faces and LBP
methodologies were introduced for recognition purpose.
Eigen Faces is most frequently used because of its
efficiencies. To observe the efficient techniques of facial
recognition, there are many scenarios to measure its
performance which are based on real time.
Overlapped Fingerprint Separation for Fingerprint AuthenticationIJERA Editor
Overlapped fingerprints captured at the crime scene plays significant role as an evidence to capture the criminals. As latent fingerprints are the accidently left skin impressions, so these are found to be with broken ridge composition, overlapped patterns and spoiled minutiae information. The Graphical User Interface (GUI) system is developed by using MATLAB R2015a software. This project also includes the development of standalone program for this system. The main purpose of GUI development is to get the value of real end points and real-branch points of a overlapped fingerprint image. The value of this point is used in fingerprint image matching process to identify the owner of an overlapped fingerprint image. The image enhancement consists of several process such as histogram equalization process, enhancement by Fast Fourier Transform (FFT) factor, and image binarization while minutiae extraction consist of ridge thinning process, region of interest (ROI) extraction, and minutiae extraction process. All processes should be done one by one.
Face Mask Detection And Attendance SystemDarsh Jain
The Current COVID-19 pandemic has got the world to a halt and took everyones attention, as it was a global pandemic the world knew about it. But some underdeveloped nations suffer from viral outbreaks every year. To protect ourselves from these viral outbreaks there is a need for a continuous supply of Sanitizers and face masks to maintain personal hygiene. To help such nations and give some contribution to the world, a novel idea of Face Mask Detection and Attendance System has been proposed in this paper. Also, the various techniques that can be used for facial recognition and object detection, like the HAAR cascade method, Machine learning Algorithms, Deep Learning, etc. are discussed.
Face recognition is a widely used biometric approach. Face recognition technology has developed rapidly
in recent years and it is more direct, user friendly and convenient compared to other methods. But face
recognition systems are vulnerable to spoof attacks made by non-real faces. It is an easy way to spoof face
recognition systems by facial pictures such as portrait photographs. A secure system needs Liveness
detection in order to guard against such spoofing. In this work, face liveness detection approaches are
categorized based on the various types techniques used for liveness detection. This categorization helps
understanding different spoof attacks scenarios and their relation to the developed solutions. A review of
the latest works regarding face liveness detection works is presented. The main aim is to provide a simple
path for the future development of novel and more secured face liveness detection approach.
Face detection is one of the most suitable applications for image processing and biometric programs. Artificial neural networks have been used in the many field like image processing, pattern recognition, sales forecasting, customer research and data validation. Face detection and recognition have become one of the most popular biometric techniques over the past few years. There is a lack of research literature that provides an overview of studies and research-related research of Artificial neural networks face detection. Therefore, this study includes a review of facial recognition studies as well systems based on various Artificial neural networks methods and algorithms.
Eye(I) Still Know! – An App for the Blind Built using Web and AIDr. Amarjeet Singh
This paper proposes eye(I) still know!, a voice control solution for the visually impaired people. The main purpose is even though the blind cannot see they can still know where to go and what to do! Nearby 60% of total blind population across the world is present in India. In a time where no one likes to rely on anyone, this is a small effort to make the blind independent individuals. This can be achieved using wireless communication, voice recognition and image scanning. The application with the use of object identification will priorly inform about the barriers in the path.
The software will use the camera of the device and scan all the obstacles with their corresponding distances from the user. This will be followed by audio instructions through audio output of the device.
This will efficiently direct the user through his/her way.
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...IJCSEIT Journal
In this article, a main perspective of developing and implementing fingerprint extraction and matching
algorithms as a part of fingerprint recognition system is focused. First, developing a simple algorithm to
extract fingerprint features and test this algorithm on PC. The second thing is implementing this algorithm
into FPGA devices. The major research topics on which the proposed approach is developing and
modifying fingerprint extraction feature algorithm. This development and modification are using crossing
number method on pixel representation value ’0’. In this new proposed algorithm, it is no need a process
concerning ROI segmentation and no trigonometry calculation. And specially in obtaining their parameters
using Angle Calculation Block avoiding floating points calculation. As this method is local feature that
usually involve with 60-100 minutiae points, makes the template is small in size. Providing FAR, FRR and
EER, performs the performance evaluation of proposed algorithm. The result is an adaptable fingerprint
minutiae extraction algorithm into hardware implementation with 14.05 % of EER, better than reference
algorithm, which is 20.39 % .The computational time is 18 seconds less than a similar method, which takes
60-90 seconds just for pre-processing step. The first step of algorithm implementation in hardware
environment (embedded) using FPGA Device by developing IP Core without using any soft processor is
presented.
Real time face recognition of video surveillance system using haar cascade c...nooriasukmaningtyas
This project investigates the use of face recognition for a surveillance system. The normal video surveillance system uses in closed-circuit television (CCTV) to record video for security purpose. It is used to identify the identity of a person through their appearances on the recorded video, manually. Today’s video surveillance camera system usually not occupied with a face recognition system. With some modification, a surveillance camera system can be used as face detection and recognition that can be done in real-time. The proposed system makes use of surveillance camera system that can identify the identity of a person automatically by using face recognition of Haar cascade classifier. The hardware used for this project were Raspberry Pi as a processor and Pi Camera as a camera module. The development of this project consist of three main phases which were data gathering, training recognizer, and face recognition process. All three phases have been executed using Python programming and OpenCV library, which have been performed in a Raspbian operation system. From the result, the proposed system successfully displays the output result of human face recognition, with facial angle within ±40°, in medium and normal light condition, and within a distance of 0.4 to 1.2 meter. Targeted image are allowed to wear face accessory as long as not covering the face structure. In conclusion, this system considered, can reduce the cost of manpower in order to identify the identity of a person in real time situation.
People Monitoring and Mask Detection using Real-time video analyzingvivatechijri
People Counting and mask detection based on video is an important field in a Computer Vision. There is growing interest in video-based solutions for people monitoring and counting in business and security applications using Computer Vision technology. It has been effectively used in many Artificial Intelligence fields. Compareing to normal sensor based solutions the one with video based allows more flexible performance, improved functionalities with lower costs. The system with people counter program requires more processing because that deals with real-time video, so this particular proposed technique converts a color image into binary in order to minimize data of image. Reducing processing time is an important term in Software Engineering to build a good working system. People counting methods based on head detection and tracking to evaluate the total number of people who move under an overhead camera and check whether that people are wearing a mask or not. There basically four main features in this proposed system: People counting, Mask detection, Alarm alert and Scan ID. Based on tracking of head, this method uses the crossing-line judgment to determine whether the particular head object will get counted or not to be counted. The two main challenges overcome in this system are: tough estimation of the background scene and the number of persons in merge split scenarios. A technique for masked face detection using three different steps of estimating eye line detection, facial part detection and eye detection is used in this system. On exceeding the count of people or in case mask is not worn then alarm gets alerted
Graduation Project - Face Login : A Robust Face Identification System for Sec...Ahmed Gad
Face login is my 2015 graduation project started in 2014 and lasted 1.5 years of work.
Generally, it is an identification system using face images. It is a multi-use system but it was mainly created to authorize users to login into their system.
There is an IEEE paper published by the project algorithm used in ICCES 2014 http://ieeexplore.ieee.org/abstract/document/7030929/.
Here is its citation Semary, Noura A., and Ahmed Fawzi Gad. "A proposed framework for robust face identification system." Computer Engineering & Systems (ICCES), 2014 9th International Conference on. IEEE, 2014.
A YouTube video describing the project generally.
https://www.youtube.com/watch?v=OUvaPW70Eko
Find me on:
AFCIT
http://www.afcit.xyz
YouTube
https://www.youtube.com/channel/UCuewOYbBXH5gwhfOrQOZOdw
Google Plus
https://plus.google.com/u/0/+AhmedGadIT
SlideShare
https://www.slideshare.net/AhmedGadFCIT
LinkedIn
https://www.linkedin.com/in/ahmedfgad/
ResearchGate
https://www.researchgate.net/profile/Ahmed_Gad13
Academia
https://www.academia.edu/
Google Scholar
https://scholar.google.com.eg/citations?user=r07tjocAAAAJ&hl=en
Mendelay
https://www.mendeley.com/profiles/ahmed-gad12/
ORCID
https://orcid.org/0000-0003-1978-8574
StackOverFlow
http://stackoverflow.com/users/5426539/ahmed-gad
Twitter
https://twitter.com/ahmedfgad
Facebook
https://www.facebook.com/ahmed.f.gadd
Pinterest
https://www.pinterest.com/ahmedfgad/
Comparative Analysis of Face Recognition Methodologies and TechniquesFarwa Ansari
In the field of computer sciences such as
graphics and also analyzing the image and its processing,
face recognition is the most prominent problem due to the
comprehensive variation of faces and the complexity of
noises and image backgrounds. The purpose and working
of this system is that it identifies the face of a person from
the real time video and verifies the person from the images
store in the database. This paper provides a review of the
methodologies and techniques used for face detection and
recognition. Firstly a brief introduction of Facial
Recognition is given then the review of the face
recognition’s working which has been done until now, is
briefly introduced. Then the next sections covered the
approaches, methodologies, techniques and their
comparison. Holistic, Feature based and Hybrid
approaches are basically used for face recognition
methodologies. Eigen Faces, Fisher Faces and LBP
methodologies were introduced for recognition purpose.
Eigen Faces is most frequently used because of its
efficiencies. To observe the efficient techniques of facial
recognition, there are many scenarios to measure its
performance which are based on real time.
Overlapped Fingerprint Separation for Fingerprint AuthenticationIJERA Editor
Overlapped fingerprints captured at the crime scene plays significant role as an evidence to capture the criminals. As latent fingerprints are the accidently left skin impressions, so these are found to be with broken ridge composition, overlapped patterns and spoiled minutiae information. The Graphical User Interface (GUI) system is developed by using MATLAB R2015a software. This project also includes the development of standalone program for this system. The main purpose of GUI development is to get the value of real end points and real-branch points of a overlapped fingerprint image. The value of this point is used in fingerprint image matching process to identify the owner of an overlapped fingerprint image. The image enhancement consists of several process such as histogram equalization process, enhancement by Fast Fourier Transform (FFT) factor, and image binarization while minutiae extraction consist of ridge thinning process, region of interest (ROI) extraction, and minutiae extraction process. All processes should be done one by one.
Face Mask Detection And Attendance SystemDarsh Jain
The Current COVID-19 pandemic has got the world to a halt and took everyones attention, as it was a global pandemic the world knew about it. But some underdeveloped nations suffer from viral outbreaks every year. To protect ourselves from these viral outbreaks there is a need for a continuous supply of Sanitizers and face masks to maintain personal hygiene. To help such nations and give some contribution to the world, a novel idea of Face Mask Detection and Attendance System has been proposed in this paper. Also, the various techniques that can be used for facial recognition and object detection, like the HAAR cascade method, Machine learning Algorithms, Deep Learning, etc. are discussed.
Face recognition is a widely used biometric approach. Face recognition technology has developed rapidly
in recent years and it is more direct, user friendly and convenient compared to other methods. But face
recognition systems are vulnerable to spoof attacks made by non-real faces. It is an easy way to spoof face
recognition systems by facial pictures such as portrait photographs. A secure system needs Liveness
detection in order to guard against such spoofing. In this work, face liveness detection approaches are
categorized based on the various types techniques used for liveness detection. This categorization helps
understanding different spoof attacks scenarios and their relation to the developed solutions. A review of
the latest works regarding face liveness detection works is presented. The main aim is to provide a simple
path for the future development of novel and more secured face liveness detection approach.
Face detection is one of the most suitable applications for image processing and biometric programs. Artificial neural networks have been used in the many field like image processing, pattern recognition, sales forecasting, customer research and data validation. Face detection and recognition have become one of the most popular biometric techniques over the past few years. There is a lack of research literature that provides an overview of studies and research-related research of Artificial neural networks face detection. Therefore, this study includes a review of facial recognition studies as well systems based on various Artificial neural networks methods and algorithms.
Eye(I) Still Know! – An App for the Blind Built using Web and AIDr. Amarjeet Singh
This paper proposes eye(I) still know!, a voice control solution for the visually impaired people. The main purpose is even though the blind cannot see they can still know where to go and what to do! Nearby 60% of total blind population across the world is present in India. In a time where no one likes to rely on anyone, this is a small effort to make the blind independent individuals. This can be achieved using wireless communication, voice recognition and image scanning. The application with the use of object identification will priorly inform about the barriers in the path.
The software will use the camera of the device and scan all the obstacles with their corresponding distances from the user. This will be followed by audio instructions through audio output of the device.
This will efficiently direct the user through his/her way.
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...IJCSEIT Journal
In this article, a main perspective of developing and implementing fingerprint extraction and matching
algorithms as a part of fingerprint recognition system is focused. First, developing a simple algorithm to
extract fingerprint features and test this algorithm on PC. The second thing is implementing this algorithm
into FPGA devices. The major research topics on which the proposed approach is developing and
modifying fingerprint extraction feature algorithm. This development and modification are using crossing
number method on pixel representation value ’0’. In this new proposed algorithm, it is no need a process
concerning ROI segmentation and no trigonometry calculation. And specially in obtaining their parameters
using Angle Calculation Block avoiding floating points calculation. As this method is local feature that
usually involve with 60-100 minutiae points, makes the template is small in size. Providing FAR, FRR and
EER, performs the performance evaluation of proposed algorithm. The result is an adaptable fingerprint
minutiae extraction algorithm into hardware implementation with 14.05 % of EER, better than reference
algorithm, which is 20.39 % .The computational time is 18 seconds less than a similar method, which takes
60-90 seconds just for pre-processing step. The first step of algorithm implementation in hardware
environment (embedded) using FPGA Device by developing IP Core without using any soft processor is
presented.
Real time face recognition of video surveillance system using haar cascade c...nooriasukmaningtyas
This project investigates the use of face recognition for a surveillance system. The normal video surveillance system uses in closed-circuit television (CCTV) to record video for security purpose. It is used to identify the identity of a person through their appearances on the recorded video, manually. Today’s video surveillance camera system usually not occupied with a face recognition system. With some modification, a surveillance camera system can be used as face detection and recognition that can be done in real-time. The proposed system makes use of surveillance camera system that can identify the identity of a person automatically by using face recognition of Haar cascade classifier. The hardware used for this project were Raspberry Pi as a processor and Pi Camera as a camera module. The development of this project consist of three main phases which were data gathering, training recognizer, and face recognition process. All three phases have been executed using Python programming and OpenCV library, which have been performed in a Raspbian operation system. From the result, the proposed system successfully displays the output result of human face recognition, with facial angle within ±40°, in medium and normal light condition, and within a distance of 0.4 to 1.2 meter. Targeted image are allowed to wear face accessory as long as not covering the face structure. In conclusion, this system considered, can reduce the cost of manpower in order to identify the identity of a person in real time situation.
People Monitoring and Mask Detection using Real-time video analyzingvivatechijri
People Counting and mask detection based on video is an important field in a Computer Vision. There is growing interest in video-based solutions for people monitoring and counting in business and security applications using Computer Vision technology. It has been effectively used in many Artificial Intelligence fields. Compareing to normal sensor based solutions the one with video based allows more flexible performance, improved functionalities with lower costs. The system with people counter program requires more processing because that deals with real-time video, so this particular proposed technique converts a color image into binary in order to minimize data of image. Reducing processing time is an important term in Software Engineering to build a good working system. People counting methods based on head detection and tracking to evaluate the total number of people who move under an overhead camera and check whether that people are wearing a mask or not. There basically four main features in this proposed system: People counting, Mask detection, Alarm alert and Scan ID. Based on tracking of head, this method uses the crossing-line judgment to determine whether the particular head object will get counted or not to be counted. The two main challenges overcome in this system are: tough estimation of the background scene and the number of persons in merge split scenarios. A technique for masked face detection using three different steps of estimating eye line detection, facial part detection and eye detection is used in this system. On exceeding the count of people or in case mask is not worn then alarm gets alerted
Social distance and face mask detector system exploiting transfer learningIJECEIAES
As time advances, the use of deep learning-based object detection algorithms has also evolved leading to developments of new human-computer interactions, facilitating an exploration of various domains. Considering the automated process of detection, systems suitable for detecting violations are developed. One such applications is the social distancing and face mask detectors to control air-borne diseases. The objective of this research is to deploy transfer learning on object detection models for spotting violations in face masks and physical distance rules in real-time. The common drawbacks of existing models are low accuracy and inability to detect in real-time. The MobileNetV2 object detection model and YOLOv3 model with Euclidean distance measure have been used for detection of face mask and physical distancing. A proactive transfer learning approach is used to perform the functionality of face mask classification on the patterns obtained from the social distance detector model. On implementing the application on various surveillance footage, it was observed that the system could classify masked and unmasked faces and if social distancing was maintained or not with accuracies 99% and 94% respectively. The models exhibited high accuracy on testing and the system can be infused with the existing internet protocol (IP) cameras or surveillance systems for real-time surveillance of face masks and physical distancing rules effectively.
An AI Based ATM Intelligent Security System using Open CV and YOLOYogeshIJTSRD
Nowadays most of the surveillance cameras in ATM doesn’t record with detail for analysis of incidents. Due to this most of the ATM cases gets unsolved. In this paper a system to improve ATM security is proposed. The proposed system deals with the development of a application using Open CV, YOLO and AI for automation of video surveillance in ATM machines and detect any type of potential criminal activities that might be arising. Prem Krishna | Saheel Ahamed | Roshan Kartik "An AI Based ATM Intelligent Security System using Open CV and YOLO" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41232.pdf Paper URL: https://www.ijtsrd.comengineering/computer-engineering/41232/an-ai-based-atm-intelligent-security-system-using-open-cv-and-yolo/prem-krishna
Automatic video censoring system using deep learningIJECEIAES
Due to the extensive use of video-sharing platforms and services, the amount of such all kinds of content on the web has become massive. This abundance of information is a problem controlling the kind of content that may be present in such a video. More than telling if the content is suitable for children and sensitive people or not, figuring it out is also important what parts of it contains such content, for preserving parts that would be discarded in a simple broad analysis. To tackle this problem, a comparison was done for popular image deep learning models: MobileNetV2, Xception model, InceptionV3, VGG16, VGG19, ResNet101 and ResNet50 to seek the one that is most suitable for the required application. Also, a system is developed that would automatically censor inappropriate content such as violent scenes with the help of deep learning. The system uses a transfer learning mechanism using the VGG16 model. The experiments suggested that the model showed excellent performance for the automatic censoring application that could also be used in other similar applications.
Real Time Object Detection with Audio Feedback using Yolo v3ijtsrd
In this paper, we propose a system that combines real time object detection using the YOLOv3 algorithm with audio feedback to assist visually impaired individuals in locating and identifying objects in their surroundings. The YOLOv3 algorithm is a state of the art object detection algorithm that has been used in numerous studies for various applications. Audio feedback has also been studied in previous research as a useful tool for assisting visually impaired individuals. Our proposed system builds on the effectiveness of both these technologies to provide a valuable tool for improving the independence and quality of life of visually impaired individuals. We present the architecture of our proposed system, which includes a YOLOv3 model for object detection and a text to speech engine for providing audio feedback. We also present the results of our experiments, which demonstrate the effectiveness of our system in detecting and identifying objects in real time. Our proposed system can be used in various settings, such as indoor and outdoor environments, and can assist visually impaired individuals in various activities such as the navigation and object identification. Dr. K. Nagi Reddy | K. Sreeja | M. Sreenivasulu Reddy | K. Sireesha | M. Triveni "Real Time Object Detection with Audio Feedback using Yolo_v3" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-2 , April 2023, URL: https://www.ijtsrd.com.com/papers/ijtsrd55158.pdf Paper URL: https://www.ijtsrd.com.com/engineering/electronics-and-communication-engineering/55158/real-time-object-detection-with-audio-feedback-using-yolov3/dr-k-nagi-reddy
Human motion is fundamental to understanding behaviour. In spite of advancement on single image 3 Dimensional pose and estimation of shapes, current video-based state of the art methods unsuccessful to produce precise and motion of natural sequences due to inefficiency of ground-truth 3 Dimensional motion data for training. Recognition of Human action for programmed video surveillance applications is an interesting but forbidding task especially if the videos are captured in an unpleasant lighting environment. It is a Spatial-temporal feature-based correlation filter, for concurrent observation and identification of numerous human actions in a little-light environment. Estimated the presentation of a proposed filter with immense experimentation on night-time action datasets. Tentative results demonstrate the potency of the merging schemes for vigorous action recognition in a significantly low light environment.
APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...ijitcs
A rapid growth in the population and economic growth has resulted in an increasing number of vehicles on
road every year. Traffic congestion is a big problem in every metropolitan city. To reach their destination
faster and to avoid traffic, some people are violating traffic rules and regulations. Violation of traffic rules
puts everyone in danger. Maintaining traffic rules manually has become difficult over the time due to the
rapid increase in the population. This alarming situation has be taken care of at the earliest. To overcome
this, we need a real-time violation detection system to help maintain the traffic rules. The approach is to
detect traffic violations in real-time using edge computing, which reduces the time to detect. Different
machine learning models and algorithms were applied to detect traffic violations like traveling without a
helmet, line crossing, parking violation detection, violating the one-way rule etc. The model implemented
gave an accuracy of around 85%, due to memory constraints of the edge device in this case NVIDIA Jetson
Nano, as the fps is quite low.
Understanding the Impact and Challenges of Corona Crisis on Education Sector...vivatechijri
n the second week of March 2020, governments of all states in a country suddenly declared
shutting down of all colleges and schools for a temporary period of time as an immediate measure to stop the
spread of pandemic that is of novel corona virus. As the days pass by almost close to a month with no certainty
when they will again reopen. Due to pandemic like this an alarm bells have started sounding in the field of
education where a huge impact can be seen on teaching and learning process as well as on the entire education
sector in turn. The pandemic disruption like this is actually gave time to educators of today to really think about
the sector. Through the present research article, the author is highlighting on the possible impact of
coronavirus on education sector with the future challenges for education sector with possible suggestions.
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT vivatechijri
This paper is explaining that how only leadership is responsible for sustainable improvement and
growth and only it can lead the organization towards improvement and overall development. Leadership and its
effectiveness are discussed in this research work and also how leadership is a different way of the success of the
organization and different from the traditional management to create true work-culture and good-will of the
organization in the social scene. Leadership is only responsible in bringing positive and negative change in the
organization; if the leadership doesn’t have the concern in the organization, the organization will not be able to
lead in the right direction towards improvement and development.
The topic of assignment is a critical problem in mathematics and is further explored in the real
physical world. We try to implement a replacement method during this paper to solve assignment problems with
algorithm and solution steps. By using new method and computing by existing two methods, we analyse a
numerical example, also we compare the optimal solutions between this new method and two current methods. A
standardized technique, simple to use to solve assignment problems, may be the proposed method
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...vivatechijri
n today’s society, we stand before a change in energy scarcity. As our civilization grows, many
countries in thedeveloping world seek to have the standard of living that has been exclusive to a few nations, so
their arises a need in thedevelopment of technology that is compatible enough with the resources provided by
nature in order to have sustainabledevelopment to all class of the society. In order to overcomethe prevailing
challenges of huge energy crises in near future, there is an urgent need for the development of electrical
vehiclesor hybrid electrical vehicles with low CO2 emissions using renewable energy sources. In view of the
above, electrochemicalcapacitors can fulfil the requirements to some extent.Preparation of nano composite
polymer gel electrolyte is the best optional product to overcome these problems. When fillers are added or
dispersed to the polymer gel electrolyte, amorphous or porous nature of electrolyte increases which enhances
the liquid absorbing quality of polymer and helps in removing the drawbacks of polymer gel electrolytes such as
leakage, poor mechanical and thermal stability etc. In this work dispersion of SiO2 nano filler is done in the
[PVdF (HFP)-PC-Mg (ClO4)2] for the synthesis of nano composite PGE [PVdF (HFP)-PC-MgClO4- SiO2].
Optimization and characterization was carried out by using various techniques.
Theoretical study of two dimensional Nano sheet for gas sensing applicationvivatechijri
This study is focus on various two dimensional material for sensing various gases with theoretical
view for new research in gas sensing application. In this paper we review various two dimensional sheet such as
Graphene, Boron Nitride nanosheet, Mxene and their application in sensing various gases present in the
atmosphere.
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOODvivatechijri
Food is essential forliving. Food adulteration deceives consumers and can endanger their health. The
purpose of this document is to list common food adulterant methods commonly found in India. An adulterant is
a substance found in other substances such as food, cosmetics, pharmaceuticals, fuels, or other chemicals that
compromise the safety or effectiveness of that substance. The addition of adulterants is called adulteration. The
most common reason for adulteration is the use of undeclared materials by manufacturers that are cheaper than
the correct and declared ones. The adulterants can be harmful or reduce the effectiveness of the product, or
they can be harmless.
The novel ideas of being a entrepreneur is a key for everyone to get in the hustle, but developing a
idea from core requires a systematic plan, time management, time investment and most importantly client
attention. The Time required for developing may vary from idea to idea and strength of the team. Leadership to
build a team and manage the same throughout the peak of development is the main quality. Innovations and
Techniques to qualify the huddles is another aspect of Business Development and client Retention.
Innovation for supporting prosperity has for quite some time been a focus on numerous orders, including PC science, brain research, and human-PC connection. In any case, the meaning of prosperity isn't continuously clear and this has suggestions for how we plan for and evaluate advances that intend to cultivate it. Here, we talk about current meanings of prosperity and how it relates with and now and then is a result of self-amazing quality. We at that point center around how innovations can uphold prosperity through encounters of self-amazing quality, finishing with conceivable future bearings.
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGEvivatechijri
Demand for data storage is growing exponentially, but the capacity of existing storage media is not keeping up, there emerges a requirement for a storage medium with high capacity, high storage density, and possibility to face up to extreme environmental conditions. According to a research in 2018, every minute Google conducted 3.88 million searches, other people posted 49,000 photos on Instagram, sent 159,362,760 e-mails, tweeted 473,000 times and watched 4.33 million videos on YouTube. In 2020 it estimated a creation of 1.7 megabytes of knowledge per second per person globally, which translates to about 418 zettabytes during a single year. The magnetic or optical data-storage systems that currently hold this volume of 0s and 1s typically cannot last for quite a century. Running data centres takes vast amounts of energy. In short, we are close to have a substantial data-storage problem which will only become more severe over time. Deoxyribonucleic acid (DNA) are often potentially used for these purposes because it isn't much different from the traditional method utilized in a computer. DNA’s information density is notable, 215 petabytes or 215 million gigabytes of data can be stored in just one gram of DNA. First we can encode all data at a molecular level and then store it in a medium that will last for a while and not become out-dated just like floppy disks. Due to the improved techniques for reading and writing DNA, a rapid increase is observed in the amount of possible data storage in DNA.
The usage of chatbots has increased tremendously since past few years. A conversational interface is an interface that the user can interact with by means of a conversation. The conversation can occur by speech but also by text input. When a chatty interface uses text, it is also described as a chatbot or a conversational medium. During this study, the user experience factors of these so called chatbots were investigated. The prime objective is “to spot the state of the art in chatbot usability and applied human-computer interaction methodologies, to research the way to assess chatbots usability". Two sorts of chatbots are formulated, one with and one without personalisation factors. the planning of this research may be a two-by-two factorial design. The independent variables are the two chatbots (unpersonalised versus personalised) and thus the speci?c task or goal the user are ready to do with the chatbot within the ?nancial ?eld (a simple versus a posh task). The results are that there was no noteworthy interaction effect between personalisation and task on the user experience of chatbots. A signi?cant di?erence was found between the two tasks with regard to the user experience of chatbots, however this variation wasn't because of personalisation.
The Smart glasses Technology of wearable computing aims to identify the computing devices into today’s world.(SGT) are wearable Computer glasses that is used to add the information alongside or what the wearer sees. They are also able to change their optical properties at runtime.(SGT) is used to be one of the modern computing devices that amalgamate the humans and machines with the help of information and communication technology. Smart glasses is mainly made up of an optical head-mounted display or embedded wireless glasses with transparent heads- up display or augmented reality (AR) overlay in it. In recent years, it is been used in the medical and gaming applications, and also in the education sector. This report basically focuses on smart glasses, one of the categories of wearable computing which is very popular presently in the media and expected to be a big market in the next coming years. It Evaluate the differences from smart glasses to other smart devices. It introduces many possible different applications from the different companies for the different types of audience and gives an overview of the different smart glasses which are available presently and will be available after the next few years.
Future Applications of Smart Iot Devicesvivatechijri
With the Internet of Things (IoT) bit by bit creating as the resulting time of the headway of the Internet, it gets critical to see the diverse expected zones for the utilization of IoT and the research challenges that are connected with these applications going from splendid savvy urban areas, to medical care administrations, shrewd farming, collaborations and retail. IoT is needed to attack into for all expectations and purposes for all pieces of our day-to-day life. Despite the fact that the current IoT enabling advancements have immensely improved in the continuous years, there are so far different issues that require attention. Since the IoT ideas results from heterogeneous advancements, many examination difficulties will arise. In like manner, IoT is planning for new components of exploration to be finished. This paper presents the progressing headway of IoT advancements and inspects future applications.
Cross Platform Development Using Fluttervivatechijri
Today the development of cross-platform mobile application has under the state of compromise. The developers are not willing to choose an alternative of either building the similar app many times for many operating systems or to accept a lowest common denominator and optimal solution that will going to trade the native speed, accuracy for portability. The Flutter is an open-source SDK for creating high-performance, high fidelity mobile apps for the development of iOS and Android. Few significant features of flutter are - Just-in-time compilation (JIT), Ahead- of-time compilation (AOT compilation) into a native (system-dependent) machine code so that the resulting binary file can execute natively. The Flutter’s hot reload functionality helps us to understand quickly and easily experiment, build UIs, add features, and fix bugs. Hot reload works by injecting updated source code files into the running Dart Virtual Machine (VM). With the help of Flutter, we believe that we would be having a solution that gives us the best of both worlds: hardware accelerated graphics and UI, powered by native ARM code, targeting both popular mobile operating systems.
The Internet, today, has become an important part of our lives. The World Wide Web that was once a small and inaccessible data storage service is now large and valuable. Current activities partially or completely integrated into the physical world can be made to a higher standard. All activities related to our daily life are mapped and linked to another business in the digital world. The world has seen great strides in the Internet and in 3D stereoscopic displays. The time has come to unite the two to bring a new level of experience to the users. 3D Internet is a concept that is yet to be used and requires browsers to be equipped with in-depth visualization and artificial intelligence. When this material is included, the Internet concept of material may become a reality discussed in this paper. In this paper we have discussed the features, possible setting methods, applications, and advantages and disadvantages of using the Internet. With this paper we aim to provide a clear view of 3D Internet and the potential benefits associated with this obviously cost the amount of investment needed to be used.
Recommender System (RS) has emerged as a significant research interest that aims to assist users to seek out items online by providing suggestions that closely match their interests. Recommender system, an information filtering technology employed in many items is presented in internet sites as per the interest of users, and is implemented in applications like movies, music, venue, books, research articles, tourism and social media normally. Recommender systems research is usually supported comparisons of predictive accuracy: the higher the evaluation scores, the higher the recommender. One amongst the leading approaches was the utilization of advice systems to proactively recommend scholarly papers to individual researchers. In today's world, time has more value and therefore the researchers haven't any much time to spend on trying to find the proper articles in line with their research domain. Recommender Systems are designed to suggest users the things that best fit the user needs and preferences. Recommender systems typically produce an inventory of recommendations in one among two ways -through collaborative or content-based filtering. Additionally, both the general public and also the non-public used descriptive metadata are used. The scope of the advice is therefore limited to variety of documents which are either publicly available or which are granted copyright permits. Recommendation systems (RS) support users and developers of varied computer and software systems to beat information overload, perform information discovery tasks and approximate computation, among others.
The study LiFi (Light Fidelity) demonstrates about how can we use this technology as a medium of communication similar to Wifi . This is the latest technology proposed by Harold Haas in 2011. It explains about the process of transmitting data with the help of illumination of an Led bulb and about its speed intensity to transmit data. Basically in this paper, author will discuss about the technology and also explain that how we can replace from WiFi to LiFi . WiFi generally used for wireless coverage within the buildings while LiFi is capable for high intensity wireless data coverage in limited areas with no obstacles .This research paper represents introduction of the Lifi technology,performance,modulation and challenges. This research paper can be used as a reference and knowledge to develop some of LiFitechnology.
Social media platform and Our right to privacyvivatechijri
The advancement of Information Technology has hastened the ability to disseminate information across the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive information being published on the World Wide Web. While such socially active websites are creative tools for expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology
THE USABILITY METRICS FOR USER EXPERIENCEvivatechijri
THE USABILITY METRICS FOR USER EXPERIENCE was innovatively created by Google engineers and it is ready for production in record time. The success of Google is to attributed the efficient search algorithm, and also to the underlying commodity hardware. As Google run number of application then Google’s goal became to build a vast storage network out of inexpensive commodity hardware. So Google create its own file system, named as THE USABILITY METRICS FOR USER EXPERIENCE that is GFS. THE USABILITY METRICS FOR USER EXPERIENCE is one of the largest file system in operation. Generally THE USABILITY METRICS FOR USER EXPERIENCE is a scalable distributed file system of large distributed data intensive apps. In the design phase of THE USABILITY METRICS FOR USER EXPERIENCE, in which the given stress includes component failures , files are huge and files are mutated by appending data. The entire file system is organized hierarchically in directories and identified by pathnames. The architecture comprises of multiple chunk servers, multiple clients and a single master. Files are divided into chunks, and that is the key design parameter. THE USABILITY METRICS FOR USER EXPERIENCE also uses leases and mutation order in their design to achieve atomicity and consistency. As of there fault tolerance, THE USABILITY METRICS FOR USER EXPERIENCE is highly available, replicas of chunk servers and master exists.
Google File System was innovatively created by Google engineers and it is ready for production in record time. The success of Google is to attributed the efficient search algorithm, and also to the underlying commodity hardware. As Google run number of application then Google’s goal became to build a vast storage network out of inexpensive commodity hardware. So Google create its own file system, named as Google File System that is GFS. Google File system is one of the largest file system in operation. Generally Google File System is a scalable distributed file system of large distributed data intensive apps. In the design phase of Google file system, in which the given stress includes component failures , files are huge and files are mutated by appending data. The entire file system is organized hierarchically in directories and identified by pathnames. The architecture comprises of multiple chunk servers, multiple clients and a single master. Files are divided into chunks, and that is the key design parameter. Google File System also uses leases and mutation order in their design to achieve atomicity and consistency. As of there fault tolerance, Google file system is highly available, replicas of chunk servers and master exists.
A Study of Tokenization of Real Estate Using Blockchain Technologyvivatechijri
Real estate is by far one of the most trusted investments that people have preferred, being a lucrative investment it provides a steady source of income in the form of lease and rents. Although there are numerous advantages, one of the key downsides of real estate investments is lack of liquidity. Thus, even though global real estate investments amount to about twice the size of investments in stock markets, the number of investors in the real estate market is significantly lower. Block chain technology has real potential in addressing the issues of liquidity and transparency, opening the market to even retail investors. Owing to the functionality and flexibility of creating Security Tokens, which are backed by real-world assets, real estate can be made liquid with the help of Special Purpose Vehicles. Tokens of ERC 777 standard, which represent fractional ownership of the real estate can be purchased by an investor and these tokens can also be listed on secondary exchanges. The robustness of Smart Contracts can enable the efficient transfer of tokens and seamless distribution of earnings amongst the investors. This work describes Ethereum blockchainbased solutions to make the existing Real Estate investment system much more efficient.
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSveerababupersonal22
It consists of cw radar and fmcw radar ,range measurement,if amplifier and fmcw altimeterThe CW radar operates using continuous wave transmission, while the FMCW radar employs frequency-modulated continuous wave technology. Range measurement is a crucial aspect of radar systems, providing information about the distance to a target. The IF amplifier plays a key role in signal processing, amplifying intermediate frequency signals for further analysis. The FMCW altimeter utilizes frequency-modulated continuous wave technology to accurately measure altitude above a reference point.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
1. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN (Online): 2581-7280 Article No. X
PP XX-XX
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
1
www.viva-technology.org/New/IJRI
CRIMINAL IDENTIFICATION FOR LOW
RESOLUTION SURVEILLANCE
Saniya Prashant Patil1
, Grishma Sunil Yadav2
, Shrutika Devdas Kudalkar3
,
Sunita Naik4
1
(Department of Computer Engineering, Mumbai University, India)
Email: patilsaniya11@gmail.com
2
(Department of Computer Engineering, Mumbai University, India)
Email: grish30799@gmail.com
3
(Department of Computer Engineering, Mumbai University, India)
Email: 17305076shrutika@viva-technology.org
4
(Department of Computer Engineering, Mumbai University, India)
Email: sunitanaik@viva-technology.org
Abstract: A Criminal Identification System allows the user to identify a certain criminal based on their
biometrics. With advancements in security technology, CCTV cameras have been installed in many public and
private areas to provide surveillance activities. The CCTV footage becomes crucial for understanding of the
criminal activities that take place and to detect suspects. Additionallywhen a criminal is found it is difficult to
locate and track him with just his image if he is on the run. Currently this procedure consists of finding such
people in CCTV surveillance footage manually which is time consuming. It is also a tedious process as the
resolution for such CCTV cameras is quite low. As a solution to these issues, the proposed system is developed
to go through real time surveillance footage, detect and recognize the criminals based on reference datasets of
criminals. The use of facial recognition for identifying criminals proves to bebeneficial. Once the best match is
found the real time cropped image of the recognized criminal is saved which can be accessed by authorized
officials for locating and tracking criminals or for further investigative use.
Keywords -Criminal Identification System, Detection, Face Recognition System, Facial Recognition
I. INTRODUCTION
For security reasons CCTV cameras are installed in public places. This CCTV footage becomes an
important piece of evidence for criminal cases. Thus it is used to identify suspects or criminals on a crime scene.
But it is difficult to track them using just their image.
According to cyber cell members of Goa branch, they make multiple members of the department sit
with laptops and computers to search through the CCTV footage to find and trace the culprit due to the lack of
automated system for doing this task with them. This process is both time and labor intensive. These resources
and time can be utilized more efficiently if an automated system is used. Moreover, the law enforcement
agencies won't have to depend on other people to spot the criminal at a particular location and then inform them
about it. Also, the resolution of surveillance footage is quite low which makes it difficult to identify a person.
The criminal detection system will ease this process. It will use facial recognition to identify criminals
in low resolution frames. When the person will be spotted in the surveillance footage, the details of the criminal
and his or her location details will be recorded in a folder. This folder can be accessed to locate and track any
criminal when required. This will save time and manpower required to manually go through the surveillance
footage. It can be used to get real-time location of wanted criminals on the run, missing persons etc.
The system will be developed using the Tiny Face Detector deep learning model. The output of the
system will be saved in a folder and accessed on the web portal developed on Django framework.
2. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN (Online): 2581-7280 Article No. X
PP XX-XX
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
2
www.viva-technology.org/New/IJRI
II. RELATED WORKS
Apoorva.P, et. al. [1] have proposed a system for real-time face recognition using automated
surveillance cameras. The system comprises of three datasets including data of citizens, data of criminals who
are citizens of the country and, data of criminals who are not the citizens of the country. The system first detects
a face in a particular frame. Then the face undergoes feature extraction which is done using Haar Cascade
Classifier and OpenCV. This processed image is compared with the datasets to identify the person. The system
proposes two approaches. The first is using multiple classifiers at a time and training and recognizing the faces
with various rotation angles. The second approach is to use single classifier to recognize faces with multiple
rotation angles but this process takes longer time. If a match is found from the criminal datasets then the time
from the surveillance is noted.
Vishakha K, et. al. [2] have proposed a system for detection of human beings in a scene, and tracking
those people as long as they stay in the scene by identifying individual persons. Functions of Haar classifier
were used for human detection. Both positive as well as negative samples were used to train the haar classifier.
It detects humans from the input frames using as many samples as possible to ensure better probability of
identification. After detection the features are extracted for every distinct human being in a frame. Tracking of
human beings is done using sampling and resampling algorithms. The next position where that human can be
found is predicted with accuracy. Positions are represented visually using unique colored rectangles enclosing
the human being.
Han Xia, et. al. [3] proposed system on Face Recognition and Application of Film and Television
Actors Based on Dlib. In this paper, a face recognition model applied to film and television is proposed. Firstly,
for a specific scene, they used the image information of all faces in the scene as input to calculate the face
feature vector and as training data, then train the KNN classification model in the scene, and then can recognize
the face in the scene. In the system, instead of building a face recognition network like Dlib from zero, they used
the face recognition network model that Dlib has trained. The system detects the actor's face, extracts feature
points, calculates face feature vectors, and then obtains the actor's identity information. Based on Dlib, this
paper designed and implemented a film actor face recognition system, and designed experiments to verify the
effectiveness of the face recognition system. The system has a high recognition rate for relatively clear faces,
but the face recognition effect with occlusion needs to be improved.The model can recognize most faces
accurately, but when the face is covered by sunglasses, hair or other occlusions, or when the face tilts to a
certain angle, the recognition rate will decrease. In addition, there will also be recognition errors.
SatyaSathvik Kadambari, et. al. [4] have proposed an automated attendance system using facial
recognition. The system consists of two phases, face detection and face recognition and records the attendance
of recognized faces in excel. Face detection was implemented using Viola-Jones algorithm. Haar features are
used along with Adaboost to describe a face with 6 sufficient accuracy and in less time. The face recognition
phase was implemented using Deep Neural Networks (DNN) with OpenCV. The dlib library consisting CNN
was used to detect a face from all the suitable angles. The face_recognition library was used for face
recognition. Since Viola Jones algorithm was inadequate for face recognition, the dlib library was used. The
accuracy of the system was 85% to 95%. For images with poor lighting conditions the accuracy was 70% to
80%.
Lirie Koraqi, et. al. [5] proposed a framework that detects fast moving object in an image or a video.
The objective of the system was to detect persons in camera frame, construct their bounding box, localize their
position in camera frame, tracking the person’s movements and visualizing all these steps in GUI. The GUI of
the system was built using Qt5 library and Qt creator IDE. The proposed system is an autonomous tracking
system. The hardware requirements were a processor (i.e. a laptop with linux OS in this case), a microcontroller
developed on Arduino platform and a physically powered camera. The communication between the processor
and microcontroller for camera controls was done using MOBUS communication protocol. The frame data and
support part of the necessary mathematical operator was manipulated using the OpenCV library. Person
detection was done using TensorFlow as main attribute. The Haar Cascade algorithm is used to detect object
specific features, face detection in this case. The essence of this paper is that it does not attempt to develop a
system that will be able to classify all possible objects, but develop a framework that enables the user to classify
as accurately as possible a rapid set of objects in the case of proposed system of detecting people and tracking
them. Tensorflow was used instead of haar cascade algorithm because the web camera did not have good
resolution while haar was used only for face detection. The decision to move the camera is made only by the
person detection algorithm.
Ratna Yustiawati, et. al. [6] proposed a research on analysing of different features using haar cascade
classifier. The research is on security of a room. Here the room can only be opened by specific face which
already exists in the database. The technology used is Haar cascade classifier. The center of focus is to detect the
3. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN (Online): 2581-7280 Article No. X
PP XX-XX
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
3
www.viva-technology.org/New/IJRI
people who using hijab and spectacles is been applied in this research. Haar-like features image processing is
used, where it uses 10 x10 pixel dimensional image. Implementation and integration for this research was done
in measurement laboratory of PoliteknikNegeriSriwijaya. The resulting average confidence value between the
object with hijab and without hijab here is 80-100. The smaller value of confidence the better and more accurate
the feature would be.
B. Maga, et. al. [7] have proposed an efficient approach for object detection and tracking. Here a new
proposed approach is provided for efficient object tracking using Kernel and feature based tracking methods. It
is approach where vehicle classification performance can be done in surveillance videos. Here this approach
requires shape and appearance of the object. Object basically contains various features and any of them is used
to track object as kernel. Object tracking can be done easily if compute the motion of the kernel of the between
more than two frames. Here the process is divided into two processes training and testing of objects in videos.
First process is a trained image or frame in videos and trained object value based on shape and moving position
with vehicle positive and negative results. It's store one database for testing video surveillance object values.
Second process is extracted image in video after capture object value then tested in database object value, if
object values are matched because result is positive then object tracked in given surveillance videos. Object
matching processing use to template matching technique. Object detecting and tracking has a wide variety of
applications in computer vision video surveillance, its gives more accuracy than other existing method like
CNN, template matching. But it fails in multiple object tracking, learning and detection in term of more
computing time required.
Igor Lashkov, et. al. [8] proposed system on driver dangerous state detection based on OpenCV & Dlib
libraries using mobile video processing. The research is on real-time driving behaviour monitoring system in
intelligent transportation systems. This system based on Vision-based approach including video cameras for
dangerous situation detection is undoubtedly one of the most perspective and commonly used in sensing driver
environment. In this case, the images of a driver, captured with video cameras, can describe its facial features,
like head movements, eye state, mouth state, and, afterwards, identify a current level of fatigue state. In this
paper, author leverage the built-in front-facing camera of the smart phone to continuously track driving facial
features and early recognize driver’s drowsiness and distraction dangerous states. Dlib presents one of the most
popular and frequently used libraries for facial landmarks extraction using the trained model, the library allows
to obtain the 68 facial landmarks, including the information about eyes, nose, lips and mouth, including its size
and location. According to the received results of the study the developed framework for smart phones
demonstrates 93% drowsiness state classification.
III. METHODOLOGY
The proposed model uses Tiny Face Detector model for face recognition. It is a prominent real-time
face detector. It is a mobile and web friendly model. The quantized model i.e. the tiny_face_detector_model has
the size of only 190 KB. It detects faces and facial landmarks on images or frames. It takes a person’s face as
input and gives a vector called embedding of 128 numbers as output. The vector represents the most important
features of the face. Then the images are classified by comparing with the feature from the dataset of criminals.
The web portal is developed using Django framework which allows the admin to view the results.
First the frames are fed to the convolution neural network where the faces or facial landmarks are
detected in them. After the face is detected, the features are extracted. It takes a person’s face as input and gives
a vector called embedding of 128 numbers as output. The embeddings represent the most important features of
the face and are similar for similar faces. Essentially, embeddings are low-dimensional representations of the
high-dimensional data viz. images or frames. It identifies key features of a person’s face which separate it from
different faces. Then the features are compared with the features extracted from the images in the dataset to find
a match and thus the face is recognized.
The fig.1 depicts the system flow diagram of the proposed system. The dataset comprises of photos of
various criminals which are used to train the model of the proposed system. After training, the user can test the
system by giving input of live surveillance video feed to identify any criminal. After the video dataset is fed to
the system, it is divided into multiple frames and they are fed to the network for face detection. It is done using
Tiny Face Detector Model. The network returns the bounding boxes of each face from the face landmark
positions. The extracted and aligned face images are fed into the network Later the frames undergo feature
extraction of the detected faces. It gives a vector called as embedding. These embeddings comprise of the
distinctive features of the face. The said embeddings are compared to the features of the images from the dataset
i.e., the reference data to find a match. It is judged using a threshold value, 0.6 in this case. The recognized
4. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN (Online): 2581-7280 Article No. X
PP XX-XX
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
4
www.viva-technology.org/New/IJRI
images are saved in PNG format in a folder which can be accessed through the portal. The image file will
specify the name, date and time and the location for identification.
Figure 1: System Flow Diagram
IV. RESULT
The system is trained using 200 images of 3 people each. The web portal can be used to view the
details of the criminals in the database. The system consists of tiny_face_detector_model. It returns the
bounding boxes of each face from the face landmark positions. The features are extracted as a vector called
embedding of 128 numbers. Then the features are compared with the features extracted from the images in the
dataset to find a match and thus the face is recognized. The Euclidian distance is used to compare the features of
the two faces with a threshold value of 0.6. This value is ideal for images with resolution 150x150 pixels. The
model detects faces for images with lowest resolution of 200x200 pixels.
The following figures 2 and 3 are screenshots of live video feed in the portal. The model used is
tiny_face_detector that correctly recognizes the face. Here age and expression of face is also recognized which
is done by using age_expression model.
Figure 2: Result of face recognition of face wearing a hijab
Figure 2 is a screenshot of live video feed in the portal. The model used correctly recognizes the face
wearing a hijab as it is trained with the dataset including labels with masked and unmasked faces. The model is
able to predict the label of the face wearing a hijab with Euclidean distance of 59 i.e. 0.59.
5. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN (Online): 2581-7280 Article No. X
PP XX-XX
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
5
www.viva-technology.org/New/IJRI
Figure 3: Result of Face Recognition of Face Wearing Mask
Figure 3 is a screenshot of live video feed in the portal. The tiny_face_detector model correctly
recognizes the face and based on the dataset provided the model is trained to recognize the faces their label. The
dataset also includes labels with masked and unmasked faces which is why it is able to predict face wearing a
mask with euclidean distance of 55 i.e. 0.55.
Table 1: Result analysis table
Parameters Uncovered
Face
Face
Wearing
Mask
Face
Wearing
Scarf
Face
Wearing
Spectacles
Left
Sided
Right
Sided
Close
In
Light
31 48 59 42 42 49
Close
In Dark
43 45 60 45 50 54
Far In
Light
50 57 Only
detected
49 Only
detected
Only
detected
Far In
Dark
50 58 Not accurate 57 Not accurate Not accurate
*ACCURACY COMPARED ON FOLLOWING CONDITIONS
Very Accurate 1-20
Accurate 21-40
Less Accurate 41-60
Unknown 61-100
Table 1 is a result analysis of the proposed model where above mentioned conditions are considered
where it gives a accurate results for the covered and uncovered faces in day as well as in dark light but in certain
scenario where face is covered and person is standing at far in light place it is good in only detecting faces but
not in recognizing but when scenario changes in far in dark result drop and does not give good accuracy for
detecting.
V. CONCLUSION
The proposed system is a deep learning approach to detect criminals in public places from live
surveillance footage. The system does facial recognition for uncovered faces as well as faces wearing hijabs,
masks and scarves. The need of developing such a system is the increasing crime rate at public places and lack
of security. The system will ease the investigation process of the crimes. The output of the proposed system can
be used to detect if any criminals were present at any particular location such as a crime scene. This system will
be better than the current system that use OpenCV as they lag while real-time streaming. It can also be used to
find missing persons by facial recognition by adding those particular images to the dataset.
6. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN (Online): 2581-7280 Article No. X
PP XX-XX
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
6
www.viva-technology.org/New/IJRI
Acknowledgements
We would like to express a deep sense of gratitude towards our guide Prof.Sunita Naik, Computer
Engineering Department for her constant encouragement and valuable suggestions. The work that we are able to
present is possible because of her timely guidance. We would like to pay gratitude to the panel of examiners
Prof. Sunita Naik, Prof. Dnyaneshwar Bhabad, & Prof. Vinit Raut for their time, effort they put to evaluate our
work and their valuable suggestions time to time. We would like to thank Project Head of the Computer
Engineering Department, Prof. Janhavi Sangoi for her support and co-ordination. We would like to thank the
Head of the Computer Engineering Department, Prof. Ashwini Save for her support and co-ordination. We are
also grateful to the teaching and the non-teaching staff of Computer Engineering Department who lend their
helping hands in providing continuous support.
REFERENCES
[1] Apoorva.P, Impana.H.C, Siri.S.L, Varshitha.M.R and Ramesh.B, “Automated Criminal Identification by Face Recognition Using Open
Computer Vision Classifiers”, Third International Conference on Computing Methodologies and Communication (ICCMC 2019), IEEE,
2019, CFP19K25-ART; ISBN: 978-1-5386-7808-4
[2] Visakha K and Sidharth S Prakash, “Detection and Tracking of Human Beings in a Video using Haar Classifier“, International
Conference on Inventive Research in Computing Applications (ICIRCA 2018), IEEE, 2018, CFP18N67-ART; ISBN:978-1-5386-2456-2
[3] Han Xia and Chunfang Li, “Face Recognition and Application of Film and Television Actors Based on Dlib”, 12th International
Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), IEEE, 2019, 978-1-7281-4852-6
[4] SatyaSathvik Kadambari, Deep Mistry, Gauraang Prabhu and Prof.Monica Khanore, “Automation of Attendance System Using Facial
Recognition”, International Conference on Advances in Computing, Communication and Control (ICAC3), IEEE, 2019
[5] Lirie Koraqi and Florim Idrizi, “Detection, identification and tracking of objects during the motion”, IEEE, 2019, 978-1-7281-3789-6/19
[6] Ratna Yustiawati, Nyayu Latifah Husni, Evelina, Sabilal Rasyad, Iskandar Lutfi, Ade Silvia, Niksen Alfarizal, Adella Rialita,
“Analyzing Of Different Features Using Haar Cascade Classifier”, International Conference on Electrical Engineering and Computer
Science (ICEECS), IEEE, 2018, 978-1-5386-5721-8/18
[7] B.Maga and Mr. K.Jayasakthi Velmurgan, “An Efficient Approach for Object Detection and Tracking”, Third International Conference
on Science Technology Engineering & Management (ICONSTEM), IEEE, 2017, 978-1-5090-4855-7/17
[8] igor Lashkov, Alexey Kashevnik, Vladimir Parfenov and Anton Shabaev, “Driver Dangerous State Detection Based on OpenCV & Dlib
Libraries Using Mobile Video Processing”, International Conference on Computational Science and Engineering (CSE) and
International Conference on Embedde and Ubiquitous Computing (EUC), IEEE, 2019, 978-1-7281-1664-8