This document summarizes a presentation on intelligent crowd management systems for the FIFA World Cup in Qatar in 2022. It discusses key crowd management tasks like crowd counting, people identification and tracking, abnormal event detection, and social distancing monitoring. It outlines challenges like computational complexity, lack of annotated datasets, and security/privacy concerns. It also presents techniques like knowledge distillation, transfer learning, and federated learning that can help address these challenges and ensure safety at large sporting events through cutting-edge AI and computer vision technologies.
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
A quick summary of the current state of big data technology and data science approaches used in cyber / network defender security analytics including summary use cases, a walk through of a reference architecture and breakdown of the required skills. Focus is on the knowledge needed to run a proof of concept and establish a programme for early benefits. Will then also include a view on the future of extending the platforms and capabilities of security analytics to cover performance metrics and data-driven security management approaches.
Artificial intelligence and machine learning are increasingly being adopted across industries. AI comes in various forms like narrow AI, general AI, and deep learning. Machine learning algorithms like supervised learning, unsupervised learning and reinforcement learning are used to build AI systems. The document discusses how AI is being used in security applications like malware detection. It also covers emerging technologies like the Internet of Things and associated security issues due to lack of encryption and authentication in many IoT devices.
Missouri University of Science and Technology (MS&T), Non-Destructive Microwa...kphodel
The document discusses a non-destructive microwave imaging technology that can rapidly and accurately screen people, packages, and other items in a low-cost, portable device. It solves security screening problems by being handheld, low power, and affordable compared to existing commercial systems. The technology provides see-through capabilities and has applications in travel security, campus security, and screening at events. The intellectual property is patented internationally and an initial prototype exists, but further development is needed to update components and processing and make the device smaller and lighter.
The document discusses principles of computer vision and its applications. It is a lecture by Dr. Vanessa Camilleri from the University of Malta on computer vision fundamentals and techniques. The key topics covered include object detection methods, stages of computer vision like image acquisition and processing, and examples of computer vision applications in various domains like manufacturing, healthcare, transportation and more.
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEOIRJET Journal
This document proposes using deep learning approaches like convolutional neural networks to detect suspicious activities from surveillance videos. It aims to overcome limitations of existing depth sensors by using neural networks for more accurate human pose estimation. The system would monitor public areas through video surveillance and categorize human activities as usual or suspicious in real-time. It addresses gaps in previous research which focused on images rather than videos. The proposed methodology includes collecting and preprocessing surveillance video data, designing and training deep learning models to recognize and classify activities, and integrating the system with existing surveillance infrastructure for deployment.
This document discusses the application of artificial intelligence techniques in cybersecurity. It begins by outlining the motivations for applying AI to cybersecurity, such as the growing amounts of data and connections between devices. It then provides an overview of cybersecurity challenges and common AI techniques like machine learning. The document concludes by presenting several examples of how AI is already being used to enhance cybersecurity, such as through anomaly detection, natural language processing for unstructured threat analysis, and AI-powered security analytics tools.
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
A quick summary of the current state of big data technology and data science approaches used in cyber / network defender security analytics including summary use cases, a walk through of a reference architecture and breakdown of the required skills. Focus is on the knowledge needed to run a proof of concept and establish a programme for early benefits. Will then also include a view on the future of extending the platforms and capabilities of security analytics to cover performance metrics and data-driven security management approaches.
Artificial intelligence and machine learning are increasingly being adopted across industries. AI comes in various forms like narrow AI, general AI, and deep learning. Machine learning algorithms like supervised learning, unsupervised learning and reinforcement learning are used to build AI systems. The document discusses how AI is being used in security applications like malware detection. It also covers emerging technologies like the Internet of Things and associated security issues due to lack of encryption and authentication in many IoT devices.
Missouri University of Science and Technology (MS&T), Non-Destructive Microwa...kphodel
The document discusses a non-destructive microwave imaging technology that can rapidly and accurately screen people, packages, and other items in a low-cost, portable device. It solves security screening problems by being handheld, low power, and affordable compared to existing commercial systems. The technology provides see-through capabilities and has applications in travel security, campus security, and screening at events. The intellectual property is patented internationally and an initial prototype exists, but further development is needed to update components and processing and make the device smaller and lighter.
The document discusses principles of computer vision and its applications. It is a lecture by Dr. Vanessa Camilleri from the University of Malta on computer vision fundamentals and techniques. The key topics covered include object detection methods, stages of computer vision like image acquisition and processing, and examples of computer vision applications in various domains like manufacturing, healthcare, transportation and more.
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEOIRJET Journal
This document proposes using deep learning approaches like convolutional neural networks to detect suspicious activities from surveillance videos. It aims to overcome limitations of existing depth sensors by using neural networks for more accurate human pose estimation. The system would monitor public areas through video surveillance and categorize human activities as usual or suspicious in real-time. It addresses gaps in previous research which focused on images rather than videos. The proposed methodology includes collecting and preprocessing surveillance video data, designing and training deep learning models to recognize and classify activities, and integrating the system with existing surveillance infrastructure for deployment.
This document discusses the application of artificial intelligence techniques in cybersecurity. It begins by outlining the motivations for applying AI to cybersecurity, such as the growing amounts of data and connections between devices. It then provides an overview of cybersecurity challenges and common AI techniques like machine learning. The document concludes by presenting several examples of how AI is already being used to enhance cybersecurity, such as through anomaly detection, natural language processing for unstructured threat analysis, and AI-powered security analytics tools.
1. The document discusses the security and privacy implications of pervasive memory augmentation systems that continuously collect memory cues from various sensors and devices to trigger recall.
2. It outlines several security threats such as compromised experience provenance if data comes from untrusted sources, challenges of managing access to distributed memory stores, and the possibility of memory manipulation.
3. The document also notes privacy issues from capturing bystanders' data and the need for technologies that record abstract information rather than high-fidelity recordings. Addressing these security and privacy challenges will be important for mainstream adoption of pervasive memory augmentation.
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaMartin M
This document provides information about the Regional Cyber Security Summit 2016 happening from May 11-13 in Nairobi, Kenya. The summit will discuss securing enterprises in today's connected world and ensuring business continuity in the face of human, organizational, and governance factors related to cybersecurity.
Over the three days, expert speakers will lead discussions on best practices in cybersecurity management and key issues like the skills gap in Africa, virtualization security, the internet of things risks, and using data analytics for cyber intelligence. Attendees will include CISOs, CIOs, and other IT security professionals. The goal is information sharing across the region to help organizations improve their cybersecurity posture through better funding, skills, and awareness of
Cloud security From Infrastructure to People-wareTzar Umang
Understand Cloud Security in every level from infrastructure to people ware via understanding threats, hardening your servers and creating policies that will users be guided on securing themselves.
STRATEGIES FOR DEVELOPING & IMPLEMENTING INFORMATION SECURITY POLICIES BASED ...Abdul-Hakeem Ajijola
Presented @ the eNigeria Annual Conference 2015
Theme: ”The Role of ICT & Information Security Towards an Effective Electoral Process in Nigeria”
@ the International Conference Centre, Abuja, Nigeria.
05 November 2015
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWPICPE
Jim Girouard, Sr. Product Development Manager at Worcester Polytechnic Institute, outlines the growing menace of cyber attacks on utility companies and how to educate yourself to reduce risk.
This document discusses using cloud computing for CCTV video surveillance. Some key points:
- Cloud infrastructure reduces the need for in-house IT resources and provides scalability, reliability and cost savings compared to on-premise systems.
- However, storing and transferring raw CCTV video data to the cloud is not viable due to the huge size of video files and bandwidth limitations.
- Instead, "smart cameras" can analyze video locally to extract metadata and detect meaningful events, only transferring thumbnail images or short clips to reduce transmitted data.
- This approach filters data similar to how particle physics experiments filter collision data from the LHC to identify rare events like the Higgs boson. Centralized cloud indexing and
This document summarizes information about several data innovation projects from Sirris, a non-profit technology organization. It describes projects involving online recommendations, wearable devices, emergency dispatching, healthy lifestyle coaching, and solar energy production monitoring. For each project, it outlines the innovation goal, technical approaches used, and remaining challenges. Throughout, it emphasizes that data innovation requires domain expertise, customized algorithms, and access to relevant data.
This document discusses the relationship between privacy and technology in the 21st century. It explores how technologies like smartphones, cameras, and social media can impact individual privacy through the collection and sharing of personal data and information. While technologies provide benefits like security cameras reducing crime, they also raise privacy concerns if data access is not properly managed or secured. The document concludes that technology can infringe on civic privacy and change perspectives on privacy, so people should not become overly dependent on technology.
Comprehensive cybersecurity course providing essential knowledge and skills to protect against evolving threats. Covers threat analysis, secure coding, network defense, cryptography, incident response, and risk management. Hands-on labs and real-world case studies enhance practical understanding. Ideal for professionals seeking to fortify digital assets and safeguard sensitive information in today's interconnected world.
join with us www.weyai.org
Are you ready to take your smart solutions to the next level? During this session, you will learn how to integrate AI and ML platforms for analysis and processing of digital twin data in systems based on FIWARE. In this session, we'll cover all aspects of ML Ops, including how to deploy ML in edge systems, and show you how to use AI and ML to turn data into actionable insights and business value.
You'll discover how to leverage the power of AI and ML to optimize your smart solutions and gain a competitive edge. You'll learn how to implement ML Ops in solutions powered by FIWARE, enabling you to easily deploy machine learning models and update them in real-time. We'll also discuss how to deploy ML in edge systems, allowing you to process data locally and avoid the latency of sending it to a central server.
This session will invite participants to discover how to put data to work and turn it into wisdom that drives business value. Moreover, different experiences on how to automatize ML, especially regarding training and deploying ML models into solutions powered by FIWARE in different real scenarios.
If you are interested in learning how to turn machine learning models towards perfection and deliver ML solutions more easily as part of solutions powered by FIWARE, to extract the most out of data, this session is for you.
The SDI Team reports from the ISC West conference, including industry trends, new technologies, and security market observations. Whether you were in attendance at the ISC West conference or not, please find our following takeaways to assist you with keeping your organization up to speed with industry developments.
The document discusses issues and challenges in ubiquitous computing including security, privacy, and trust. It proposes several solutions to these problems such as sandboxing, certification, proof carrying code, direct code analysis, and biometrics. The future of ubiquitous computing is envisioned as integrating computing technology everywhere for everyone at all times through pervasive networks and devices.
Detecting Anomalous Behavior with Surveillance AnalyticsDatabricks
This document discusses using surveillance analytics to automatically detect anomalous behavior and potential crimes without manual monitoring. It outlines challenges with traditional surveillance methods and proposes a solution using object detection models to identify abandoned objects, loitering individuals, and unauthorized vehicles in real-time video feeds. Key aspects of the proposed architecture include preprocessing video data for analytics, scaling the system using Databricks Delta storage, and experiment management with MLflow. A demonstration of the live video analytics pipeline showed it could process frames at 25-30 FPS on a GPU system while updating activity logs and video summaries to a central monitoring system.
The presentation on Security Testing / IoT Testing in Real World was done during #ATAGTR2017, one of the largest global testing conference. All copyright belongs to the author.
Author and presenter : Aditya Upadhya
Digital Forensics Triage and Cyber SecurityAmrit Chhetri
Digital Forensics and Forensics Triage are important concepts in cyber security. Forensics Triage is the process of collecting, analyzing, and prioritizing digital evidence during an investigation. It aims to increase efficiency and reduce costs. There are different types of Forensics Triage including live and postmortem triage. Automating Forensics Triage using tools can further improve the process. Operational technology forensics related to industrial control systems also requires Forensics Triage. Standard tools and newer automated tools can be used for Forensics Triage.
This document discusses data scrambling and descrambling technologies for secure network communication. It introduces the OSI model layers and covers attacks on software, hardware, and virtualized systems. Encryption techniques like substitution ciphers and image scrambling are explained to scramble and transmit data securely over networks. Password security best practices and network defense strategies are also outlined.
Advanced Analytics and Data Science ExpertiseSoftServe
An overview of SoftServe's Data Science service line.
- Data Science Group
- Data Science Offerings for Business
- Machine Learning Overview
- AI & Deep Learning Case Studies
- Big Data & Analytics Case Studies
Visit our website to learn more: http://www.softserveinc.com/en-us/
1. The document discusses the security and privacy implications of pervasive memory augmentation systems that continuously collect memory cues from various sensors and devices to trigger recall.
2. It outlines several security threats such as compromised experience provenance if data comes from untrusted sources, challenges of managing access to distributed memory stores, and the possibility of memory manipulation.
3. The document also notes privacy issues from capturing bystanders' data and the need for technologies that record abstract information rather than high-fidelity recordings. Addressing these security and privacy challenges will be important for mainstream adoption of pervasive memory augmentation.
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaMartin M
This document provides information about the Regional Cyber Security Summit 2016 happening from May 11-13 in Nairobi, Kenya. The summit will discuss securing enterprises in today's connected world and ensuring business continuity in the face of human, organizational, and governance factors related to cybersecurity.
Over the three days, expert speakers will lead discussions on best practices in cybersecurity management and key issues like the skills gap in Africa, virtualization security, the internet of things risks, and using data analytics for cyber intelligence. Attendees will include CISOs, CIOs, and other IT security professionals. The goal is information sharing across the region to help organizations improve their cybersecurity posture through better funding, skills, and awareness of
Cloud security From Infrastructure to People-wareTzar Umang
Understand Cloud Security in every level from infrastructure to people ware via understanding threats, hardening your servers and creating policies that will users be guided on securing themselves.
STRATEGIES FOR DEVELOPING & IMPLEMENTING INFORMATION SECURITY POLICIES BASED ...Abdul-Hakeem Ajijola
Presented @ the eNigeria Annual Conference 2015
Theme: ”The Role of ICT & Information Security Towards an Effective Electoral Process in Nigeria”
@ the International Conference Centre, Abuja, Nigeria.
05 November 2015
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWPICPE
Jim Girouard, Sr. Product Development Manager at Worcester Polytechnic Institute, outlines the growing menace of cyber attacks on utility companies and how to educate yourself to reduce risk.
This document discusses using cloud computing for CCTV video surveillance. Some key points:
- Cloud infrastructure reduces the need for in-house IT resources and provides scalability, reliability and cost savings compared to on-premise systems.
- However, storing and transferring raw CCTV video data to the cloud is not viable due to the huge size of video files and bandwidth limitations.
- Instead, "smart cameras" can analyze video locally to extract metadata and detect meaningful events, only transferring thumbnail images or short clips to reduce transmitted data.
- This approach filters data similar to how particle physics experiments filter collision data from the LHC to identify rare events like the Higgs boson. Centralized cloud indexing and
This document summarizes information about several data innovation projects from Sirris, a non-profit technology organization. It describes projects involving online recommendations, wearable devices, emergency dispatching, healthy lifestyle coaching, and solar energy production monitoring. For each project, it outlines the innovation goal, technical approaches used, and remaining challenges. Throughout, it emphasizes that data innovation requires domain expertise, customized algorithms, and access to relevant data.
This document discusses the relationship between privacy and technology in the 21st century. It explores how technologies like smartphones, cameras, and social media can impact individual privacy through the collection and sharing of personal data and information. While technologies provide benefits like security cameras reducing crime, they also raise privacy concerns if data access is not properly managed or secured. The document concludes that technology can infringe on civic privacy and change perspectives on privacy, so people should not become overly dependent on technology.
Comprehensive cybersecurity course providing essential knowledge and skills to protect against evolving threats. Covers threat analysis, secure coding, network defense, cryptography, incident response, and risk management. Hands-on labs and real-world case studies enhance practical understanding. Ideal for professionals seeking to fortify digital assets and safeguard sensitive information in today's interconnected world.
join with us www.weyai.org
Are you ready to take your smart solutions to the next level? During this session, you will learn how to integrate AI and ML platforms for analysis and processing of digital twin data in systems based on FIWARE. In this session, we'll cover all aspects of ML Ops, including how to deploy ML in edge systems, and show you how to use AI and ML to turn data into actionable insights and business value.
You'll discover how to leverage the power of AI and ML to optimize your smart solutions and gain a competitive edge. You'll learn how to implement ML Ops in solutions powered by FIWARE, enabling you to easily deploy machine learning models and update them in real-time. We'll also discuss how to deploy ML in edge systems, allowing you to process data locally and avoid the latency of sending it to a central server.
This session will invite participants to discover how to put data to work and turn it into wisdom that drives business value. Moreover, different experiences on how to automatize ML, especially regarding training and deploying ML models into solutions powered by FIWARE in different real scenarios.
If you are interested in learning how to turn machine learning models towards perfection and deliver ML solutions more easily as part of solutions powered by FIWARE, to extract the most out of data, this session is for you.
The SDI Team reports from the ISC West conference, including industry trends, new technologies, and security market observations. Whether you were in attendance at the ISC West conference or not, please find our following takeaways to assist you with keeping your organization up to speed with industry developments.
The document discusses issues and challenges in ubiquitous computing including security, privacy, and trust. It proposes several solutions to these problems such as sandboxing, certification, proof carrying code, direct code analysis, and biometrics. The future of ubiquitous computing is envisioned as integrating computing technology everywhere for everyone at all times through pervasive networks and devices.
Detecting Anomalous Behavior with Surveillance AnalyticsDatabricks
This document discusses using surveillance analytics to automatically detect anomalous behavior and potential crimes without manual monitoring. It outlines challenges with traditional surveillance methods and proposes a solution using object detection models to identify abandoned objects, loitering individuals, and unauthorized vehicles in real-time video feeds. Key aspects of the proposed architecture include preprocessing video data for analytics, scaling the system using Databricks Delta storage, and experiment management with MLflow. A demonstration of the live video analytics pipeline showed it could process frames at 25-30 FPS on a GPU system while updating activity logs and video summaries to a central monitoring system.
The presentation on Security Testing / IoT Testing in Real World was done during #ATAGTR2017, one of the largest global testing conference. All copyright belongs to the author.
Author and presenter : Aditya Upadhya
Digital Forensics Triage and Cyber SecurityAmrit Chhetri
Digital Forensics and Forensics Triage are important concepts in cyber security. Forensics Triage is the process of collecting, analyzing, and prioritizing digital evidence during an investigation. It aims to increase efficiency and reduce costs. There are different types of Forensics Triage including live and postmortem triage. Automating Forensics Triage using tools can further improve the process. Operational technology forensics related to industrial control systems also requires Forensics Triage. Standard tools and newer automated tools can be used for Forensics Triage.
This document discusses data scrambling and descrambling technologies for secure network communication. It introduces the OSI model layers and covers attacks on software, hardware, and virtualized systems. Encryption techniques like substitution ciphers and image scrambling are explained to scramble and transmit data securely over networks. Password security best practices and network defense strategies are also outlined.
Advanced Analytics and Data Science ExpertiseSoftServe
An overview of SoftServe's Data Science service line.
- Data Science Group
- Data Science Offerings for Business
- Machine Learning Overview
- AI & Deep Learning Case Studies
- Big Data & Analytics Case Studies
Visit our website to learn more: http://www.softserveinc.com/en-us/
Build applications with generative AI on Google CloudMárton Kodok
We will explore Vertex AI - Model Garden powered experiences, we are going to learn more about the integration of these generative AI APIs. We are going to see in action what the Gemini family of generative models are for developers to build and deploy AI-driven applications. Vertex AI includes a suite of foundation models, these are referred to as the PaLM and Gemini family of generative ai models, and they come in different versions. We are going to cover how to use via API to: - execute prompts in text and chat - cover multimodal use cases with image prompts. - finetune and distill to improve knowledge domains - run function calls with foundation models to optimize them for specific tasks. At the end of the session, developers will understand how to innovate with generative AI and develop apps using the generative ai industry trends.
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataKiwi Creative
Harness the power of AI-backed reports, benchmarking and data analysis to predict trends and detect anomalies in your marketing efforts.
Peter Caputa, CEO at Databox, reveals how you can discover the strategies and tools to increase your growth rate (and margins!).
From metrics to track to data habits to pick up, enhance your reporting for powerful insights to improve your B2B tech company's marketing.
- - -
This is the webinar recording from the June 2024 HubSpot User Group (HUG) for B2B Technology USA.
Watch the video recording at https://youtu.be/5vjwGfPN9lw
Sign up for future HUG events at https://events.hubspot.com/b2b-technology-usa/
We are pleased to share with you the latest VCOSA statistical report on the cotton and yarn industry for the month of March 2024.
Starting from January 2024, the full weekly and monthly reports will only be available for free to VCOSA members. To access the complete weekly report with figures, charts, and detailed analysis of the cotton fiber market in the past week, interested parties are kindly requested to contact VCOSA to subscribe to the newsletter.
University of New South Wales degree offer diploma Transcript
Crwod_Management.pptx
1. “Engineering Solutions for FIFA World Cup Qatar 2022”
Workshop
Intelligent Crowd Management and Control Systems for FIFA
World Cup Qatar 2022
Presented by: Dr. Yassine Himeur
Professor in Computer Engineering, College of Engineering, Qatar University
2. Crowd counting
People identification
and tracking
Abnormal event
detection
Presentation Plan
II. Introduction
Social distancing
monitoring
III. Principal crowd management tasks
IV. Current challenges
Computation
complexity
Lack of annotated
datasets
Security and privacy
concerns
V. Perspectives and conclusions
I. Team
3. Introduction
Love Parade disaster
(Duisburg, 2010)
Ellis Park Stadium disaster
(Johannesburg, 2001)
The PhilSports Stadium stampede
(Manila, 2006)
21 deaths 21 deaths 73 deaths
Why crowd management in sports venues is important
4. Abnormal event detection
Crowd counting
Facemask detection
Crowd Management Challenges
Social distancing monitoring Security and safety
5. Crowd Management Challenges
• Ensure the safety and smoothness of the
World Cup events due to the inherent
occlusions and density of the crowd
• Rely on deploying cutting-edge technologies,
such as AI, surveillance drones and ICT to
optimize crowd management.
6. Crowd counting
Characteristics
• Capture visitor traffic flows
• Understand occupancy level
• Reduce queuing, at entry points and vending areas
• Executed on AI-based smart cameras or common cameras and
dedicated servers as an edge/cloud solution
Application Environments
• Stadiums.
• Sports events.
• Musical events.
• Massive events.
• Etc.
Dilated and scaled neural networks
7. People identification and tracking
Characteristics
• Consider faces under pose variations using a multi-task CNN
• Manage access control and capacity control
• Identify spectators banned from the facilities
Application Environments
• Stadiums.
• Sports events.
• Musical events.
• Massive events.
• Etc.
8. People identification and tracking
Set
parameters
ResNet-50
Network
training
Masked face dataset
Images
Labels
Pre-processing
+
SVM
Decision tree
EBT
Performance
measurement
Feature extraction Classification
YOLO-v4
YOLO-v4 Tiny
Mask-RCNN
YOLO-v5
Youtube Press
conferences
TV channels ….
Dataset
collection
• Due to Covid-19 pandemic, masks have become an everyday part of our society
• Face recognition has come under scrutiny regarding the accuracy when a
mask is worn
• Maintain a 96% accuracy with individuals wearing masks
and can set up alerts for any persons not wearing a mask
9. Abnormal event detection
Characteristics
• Understand big data
• Providing behavioural analytics
• Avoid annotation of anomalous events in training videos
to reduce the computational cost
Application Environments
• Stadiums.
• Sports events.
• Musical events.
• Massive events.
• Etc.
Goals
• Detect violent spectators
• Prevent hooliganism
10. Social distancing monitoring
Data
collection
Surveillance and monitoring
center
Deep Learning based
analysis
Pedestrian detection
Distance
measurement
Internet
Data center
Characteristics
• Apply AI to detect social distancing
• Create a better fan experience
• Ensure safety is maintained at the same time
Application Environments
• Stadiums.
• Sports events.
• Musical events.
• Massive events.
• Etc.
13. Lack of annotated datasets
Batch sample
𝜃𝑖
𝜏
𝜃𝑖
𝑆
𝜃𝑖
𝑓
𝜃𝑖
𝑏
Neuron linear transformation
Frozen
Update
Target model Predict density map
Target domain
Few shot data
Source domain
Scene 400
Scene 0
𝜃𝑆
𝜃𝜏
1 2
3 Update
4
6
5
Load
Football Supporters Crowd (FSC-Set) Dataset Transfer learning
14. Security and privacy concerns
Benchmarks on diverse CV tasks
Research-oriented
Distributed computing Flexible APIs
FedCV: federated learning frameworks for CV tasks
Personalization
Security/privacy
System efficiency
…
Computer vision applications Federated learning algorithms
CIFAR 10
93%
99%
CIFAR 100
70%
94.5%
ImageNet
80%
88%
Current accuracy in FL
SOTA in centralized ML
How to bridge the research gap for federated learning on Computer vision (CV)?
Can be overcome using:
• Blockchain
• Federated learning
• Edge computing
15. Conclusion
• Fewer Cameras, Higher Definition
• Technology and the Layered Approach
to Stadium Security
• AI is Changing the Way We Secure Stadiums
Editor's Notes
Crowd disasters have taken many human lives. The Love Parade disaster (Duisburg, 2010), the Ellis Park Stadium disaster (Johannesburg, 2001), the PhilSports Stadium stampede (Manila, 2006) are just a few recent examples. Yet, controlling crowds is still an unsolved problem.
Fortunately, smart security cameras based on IoT and drone-based surveillance equipped with AI can help improve both security and operations in sports venues and stadiums. To that end, our ultimate goal, to be achieved in this project, is to develop a system that interacts with the crowd in order to prevent escalation of risk situations into actual disasters.
To achieve that goal, The team directed by Dr. Somaya is actively working on developing intelligent crowd management and control systems, including multiple components for crowd counting, people identification and tracking, abnormal event detection (AED), facemask detection, and social distancing monitoring .
In this respect, Crowd management at the World Cup stadiums and their perimeters is crucial to ensure the safety and smoothness of the World Cup events due to the inherent occlusions and density of the crowd inside and outside the stadiums. FIFA World Cup Qatar 2022 will rely on deploying cutting-edge technologies, such as AI, surveillance drones and ICT to optimize crowd management.
In this direction, Our team has first developed a crowd counting system from drones’ data, which exploits the dilated and scaled neural networks to extract pertinent features and density crowd estimations. Crowd Counting is performed whenever crowds become too dense to detect and localize individual objects with tradition object detectors.
The results can be viewed and analyzed in a dashboard. The data can be exported in many portable formats, enabling users to further analyze the data or use it in presentations and process evaluations.
Our solution can be directly executed on Edge or cloud-based platforms.
The research team's effort has also focused on developing a face recognition system, which considers faces under pose variations using a multitask CNN. This is a robust and agile solution when it comes to managing access control and capacity control and identifying in real time individuals previously banned from the facilities for violent behavior or facilitating the entry of registered users such as VIP members.
On the other hand, because of COVID-19 pandemic, masks have become an everyday part of our society, and therefore, facemask detection has become a challenge.
Also, face recognition has come under scrutiny regarding the accuracy when a mask is worn.
To that end, we developed a new solution that still maintains a 96% accuracy with individuals wearing masks and can set up alerts for any persons not wearing a mask.
Besides, The research team, has developed a novel Abnormal Event Detection scheme, which aims at learning abnormal actions by training both normal and abnormal segments. It enables to avoid the annotation of anomalous events in training video sequences to reduce the computational cost and hence be easily implemented on drones. Concretely, our solution is able to catch instances of fans’ hooliganism and violence.
In addition, the application of artificial intelligence in stadiums and sports venues can help in monitoring social distancing to create a better fan experience, and ensure safety is maintained at the same time.
To that end, we have developed a new solution to monitor social distancing of spectators inside or outside the stadiums using CNN. This helps identify social distancing violations and report them to a surveillance and monitoring center.
Specifically, our approach is based on first detecting spectators or fans using a CNN-based object detector than transforming video frames to a bird’s eye view, where Euclidian distance metric can be used to estimate the distance between detected spectators.
Finally, detected distances are compared with a threshold to detect SD violations.
Despite the progress made by the team, we face different challenges among them is the computational complexity of deep learning models.
That is why, we are trying to develop new light-weight models using knowledge distillation. That means a new student model is developed from the initial complex model with much less complexity while maintaining almost the same performance.
Another issue is the lack of annotated datasets. As you know most deep learning and CNN models are based on supervised learning, so they need large-scale datasets with labels. To overcome this issue, we’ve developed a new Football Supporters Crowd (FSC-Set) dataset which includes 6000 manually annotated images of different types of scenes that contain thousands of people gathering in or around the stadiums.
Also, we are more focusing now on using transfer learning that enables training Deep learning models on synthetic datasets that are easily created with different software then transfer the learned knowledge to real-world datasets.
Other significant issues with most crowd management systems are the security and privacy concerns that raise when processing spectators images.
To close this gap, we plan to use blockchain as it is based on utilizing private and public keys.
Blockchain systems use asymmetric cryptography to secure transactions between users, where each user has a public and private key.
Also, federated learning has been considered as another option, as it helps train algorithms across multiple decentralized edge devices or servers holding local data samples, without exchanging them.
At the end, AI in sports venues and stadiums is not thought of the future, but rather a necessity and goal in today’s post-pandemic world.
A layered approach to video surveillance that combines video management technology with trained staff and access control systems is necessary to help security operators effectively detect and deter suspicious events, avoid crowd disasters and ensure healthy environments both within and outside stadium walls.