This document presents an algorithm for detecting hidden objects in terahertz images using a three-stage approach. The first stage applies edge-based segmentation after smoothing the image. The second stage extracts shape descriptors like Gabor and GLCM texture features from regions of interest. Finally, a Euclidean distance criterion is used to classify objects by comparing a test feature vector to vectors in a database. The algorithm was tested on gun, knife and needle images, achieving a 1.04% detection error rate and 91.9% detection rate compared to ground truths. Potential applications are in security screening to detect weapons and explosives in public areas.
Design Description of a Tentacle Based Scanning SystemOyeniyi Samuel
This document describes the design of a tentacle-based 3D scanning device. The scanner uses a camera and two lasers for distance measurement via triangulation. As an object on a turntable rotates, the camera and lasers move up and down via a lead screw to scan the entire object. The scanner is intended to be low-cost and portable for use in scanning small objects up to 15x15x20 cm in size and 500g in weight. It is designed using inexpensive and readily available materials like a polymer composite for rigidity. The main mechanisms are NEMA stepper motors to control the turntable and lead screw for camera/laser movement.
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN csandit
Object tracking can be defined as the process of detecting an object of interest from a video scene and keeping track of its motion, orientation, occlusion etc. in order to extract useful
information. It is indeed a challenging problem and it’s an important task. Many researchers are getting attracted in the field of computer vision, specifically the field of object tracking in video surveillance. The main purpose of this paper is to give to the reader information of the present state of the art object tracking, together with presenting steps involved in Background Subtraction and their techniques. In related literature we found three main methods of object tracking: the first method is the optical flow; the second is related to the background subtraction, which is divided into two types presented in this paper, and the last one is temporal
differencing. We present a novel approach to background subtraction that compare a current frame with the background model that we have set before, so we can classified each pixel of the image as a foreground or a background element, then comes the tracking step to present our object of interest, which is a person, by his centroid. The tracking step is divided into two different methods, the surface method and the K-NN method, both are explained in the paper.Our proposed method is implemented and evaluated using CAVIAR database.
A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...sipij
Object tracking can be defined as the process of detecting an object of interest from a video scene and
keeping track of its motion, orientation, occlusion etc. in order to extract useful information. It is indeed a
challenging problem and it’s an important task. Many researchers are getting attracted in the field of
computer vision, specifically the field of object tracking in video surveillance. The main purpose of this
paper is to give to the reader information of the present state of the art object tracking, together with
presenting steps involved in Background Subtraction and their techniques. In related literature we found
three main methods of object tracking: the first method is the optical flow; the second is related to the
background subtraction, which is divided into two types presented in this paper, then the temporal
differencing and the SIFT method and the last one is the mean shift method. We present a novel approach
to background subtraction that compare a current frame with the background model that we have set
before, so we can classified each pixel of the image as a foreground or a background element, then comes
the tracking step to present our object of interest, which is a person, by his centroid. The tracking step is
divided into two different methods, the surface method and the K-NN method, both are explained in the
paper. Our proposed method is implemented and evaluated using CAVIAR database.
1. The document proposes a new method for shadow detection and removal in satellite images using image segmentation, shadow feature extraction, and inner-outer outline profile line (IOOPL) matching.
2. Key steps include segmenting the image, detecting suspected shadows, eliminating false shadows through analysis of color and spatial properties, extracting shadow boundaries, and obtaining homogeneous sections through IOOPL similarity matching to determine radiation parameters for shadow removal.
3. Experimental results showed the method could successfully detect shadows and remove them to improve image quality for applications like object classification and change detection.
Survey on video object detection & trackingijctet
This document summarizes previous work on video object detection and tracking techniques. It discusses research papers that used techniques like active contour modeling, gradient-based attraction fields, neural fuzzy networks, and region-based contour extraction for object tracking. Background subtraction, frame differencing, optical flow, spatio-temporal features, Kalman filtering, and contour tracking are described as common video object detection techniques. The challenges of multi-object data association and state estimation for tracking multiple objects are also mentioned.
Proposed Multi-object Tracking Algorithm Using Sobel Edge Detection operatorQUESTJOURNAL
ABSTRACT:Tracking of moving objects that is called video tracking is used for measuring motion parameters and obtaining a visual record of the moving objects, it is an important area of application in image processing. In general there are two different approaches to obtain object tracking: the first is Recognition-based Tracking, and the second is the Motion-based Tracking. Video tracking system raises a wide possibility in today’s society. This system is used in various applications such as military, security, monitoring, robotic, and nowadays in dayto-day applications. However the video tracking systems still have many open problems and various research activities in a video tracking system are explores. This paper presents an algorithm for video tracking of any moving targets with the uses of contour based detection technique that depends on the sobel operator. The proposed system is suitable for indoor and outdoor applications. Our approach has the advantage of extending the applicability of tracking system and also, as presented here improves the performance of the tracker making feasible high frame rate video tracking. The goal of the tracking system is to analyze the video frames and estimate the position of a part of the input video frame (usually a moving object), our approach can detect, tracked any object more than one object and calculate the position of the moving objects. Therefore, the aim of this paper is to construct a motion tracking system for moving objects. Where, at the end of this paper, the detail outcome and result are discussed using experiments results of the proposed technique
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Improvement of Weld Images using MATLAB –A Reviewinventy
Research Inventy provides an outlet for research findings and reviews in areas of Engineering, Computer Science found to be relevant for national and international development, Research Inventy is an open access, peer reviewed international journal with a primary objective to provide research and applications related to Engineering. In its publications, to stimulate new research ideas and foster practical application from the research findings. The journal publishes original research of such high quality as to attract contributions from the relevant local and international communities.
Design Description of a Tentacle Based Scanning SystemOyeniyi Samuel
This document describes the design of a tentacle-based 3D scanning device. The scanner uses a camera and two lasers for distance measurement via triangulation. As an object on a turntable rotates, the camera and lasers move up and down via a lead screw to scan the entire object. The scanner is intended to be low-cost and portable for use in scanning small objects up to 15x15x20 cm in size and 500g in weight. It is designed using inexpensive and readily available materials like a polymer composite for rigidity. The main mechanisms are NEMA stepper motors to control the turntable and lead screw for camera/laser movement.
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN csandit
Object tracking can be defined as the process of detecting an object of interest from a video scene and keeping track of its motion, orientation, occlusion etc. in order to extract useful
information. It is indeed a challenging problem and it’s an important task. Many researchers are getting attracted in the field of computer vision, specifically the field of object tracking in video surveillance. The main purpose of this paper is to give to the reader information of the present state of the art object tracking, together with presenting steps involved in Background Subtraction and their techniques. In related literature we found three main methods of object tracking: the first method is the optical flow; the second is related to the background subtraction, which is divided into two types presented in this paper, and the last one is temporal
differencing. We present a novel approach to background subtraction that compare a current frame with the background model that we have set before, so we can classified each pixel of the image as a foreground or a background element, then comes the tracking step to present our object of interest, which is a person, by his centroid. The tracking step is divided into two different methods, the surface method and the K-NN method, both are explained in the paper.Our proposed method is implemented and evaluated using CAVIAR database.
A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...sipij
Object tracking can be defined as the process of detecting an object of interest from a video scene and
keeping track of its motion, orientation, occlusion etc. in order to extract useful information. It is indeed a
challenging problem and it’s an important task. Many researchers are getting attracted in the field of
computer vision, specifically the field of object tracking in video surveillance. The main purpose of this
paper is to give to the reader information of the present state of the art object tracking, together with
presenting steps involved in Background Subtraction and their techniques. In related literature we found
three main methods of object tracking: the first method is the optical flow; the second is related to the
background subtraction, which is divided into two types presented in this paper, then the temporal
differencing and the SIFT method and the last one is the mean shift method. We present a novel approach
to background subtraction that compare a current frame with the background model that we have set
before, so we can classified each pixel of the image as a foreground or a background element, then comes
the tracking step to present our object of interest, which is a person, by his centroid. The tracking step is
divided into two different methods, the surface method and the K-NN method, both are explained in the
paper. Our proposed method is implemented and evaluated using CAVIAR database.
1. The document proposes a new method for shadow detection and removal in satellite images using image segmentation, shadow feature extraction, and inner-outer outline profile line (IOOPL) matching.
2. Key steps include segmenting the image, detecting suspected shadows, eliminating false shadows through analysis of color and spatial properties, extracting shadow boundaries, and obtaining homogeneous sections through IOOPL similarity matching to determine radiation parameters for shadow removal.
3. Experimental results showed the method could successfully detect shadows and remove them to improve image quality for applications like object classification and change detection.
Survey on video object detection & trackingijctet
This document summarizes previous work on video object detection and tracking techniques. It discusses research papers that used techniques like active contour modeling, gradient-based attraction fields, neural fuzzy networks, and region-based contour extraction for object tracking. Background subtraction, frame differencing, optical flow, spatio-temporal features, Kalman filtering, and contour tracking are described as common video object detection techniques. The challenges of multi-object data association and state estimation for tracking multiple objects are also mentioned.
Proposed Multi-object Tracking Algorithm Using Sobel Edge Detection operatorQUESTJOURNAL
ABSTRACT:Tracking of moving objects that is called video tracking is used for measuring motion parameters and obtaining a visual record of the moving objects, it is an important area of application in image processing. In general there are two different approaches to obtain object tracking: the first is Recognition-based Tracking, and the second is the Motion-based Tracking. Video tracking system raises a wide possibility in today’s society. This system is used in various applications such as military, security, monitoring, robotic, and nowadays in dayto-day applications. However the video tracking systems still have many open problems and various research activities in a video tracking system are explores. This paper presents an algorithm for video tracking of any moving targets with the uses of contour based detection technique that depends on the sobel operator. The proposed system is suitable for indoor and outdoor applications. Our approach has the advantage of extending the applicability of tracking system and also, as presented here improves the performance of the tracker making feasible high frame rate video tracking. The goal of the tracking system is to analyze the video frames and estimate the position of a part of the input video frame (usually a moving object), our approach can detect, tracked any object more than one object and calculate the position of the moving objects. Therefore, the aim of this paper is to construct a motion tracking system for moving objects. Where, at the end of this paper, the detail outcome and result are discussed using experiments results of the proposed technique
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Improvement of Weld Images using MATLAB –A Reviewinventy
Research Inventy provides an outlet for research findings and reviews in areas of Engineering, Computer Science found to be relevant for national and international development, Research Inventy is an open access, peer reviewed international journal with a primary objective to provide research and applications related to Engineering. In its publications, to stimulate new research ideas and foster practical application from the research findings. The journal publishes original research of such high quality as to attract contributions from the relevant local and international communities.
This paper represents a survey of various methods of video surveillance system which improves the security. The aim of this paper is to review of various moving object detection technics. This paper focuses on detection of moving objects in video surveillance system. Moving body detection is first important task for any video surveillance system. Detection of moving object is a challenging task. Tracking is required in higher level applications that require the location and shape of object in every frame. In this survey,paper described about optical flow method, Background subtraction, frame differencing to detect moving object. It also described tracking method based on Morphology technique.
Keywords -- Frame separation, Pre-processing, Object detection using frame difference, Optical flow,
Temporal Differencing and background subtraction. Object tracking
A Novel Approach for Tracking with Implicit Video Shot DetectionIOSR Journals
1) The document presents a novel approach that combines video shot detection and object tracking using a particle filter to create an efficient tracking algorithm with implicit shot detection.
2) It uses a robust pixel difference method for shot detection that is resistant to sudden illumination changes. It then applies a particle filter for tracking that uses color histograms and Bhattacharyya distance to track objects across frames.
3) The key innovation is that the tracking algorithm is only initiated after a shot change is detected, reducing computational costs by discarding unneeded frames and triggering tracking only when needed. This provides a more efficient solution for tracking large video datasets with minimal preprocessing.
This document proposes an imaging technique that models targets as a superposition of infinitesimally small dipoles rather than point scatterers. It describes how the orientation of each dipole is represented by a dyadic contrast function and how this allows determining the orientation of dipoles, providing additional target information. Experimental results are shown for improving electromagnetic interference rejection using a distributed aperture MIMO radar configuration and for achieving improved resolution through coherent fusion imaging across distributed apertures.
MOTION PREDICTION USING DEPTH INFORMATION OF HUMAN ARM BASED ON ALEXNETgerogepatton
This document describes a study that uses a convolutional neural network model based on AlexNet to predict the drop point of a ball thrown by experimenters based on analyzing depth map images of their arm motion captured by a Kinect sensor. The researchers collected depth map data from 400 throwing trials, trained and tested their CNN model on this data, and made modifications to improve prediction accuracy, such as adjusting the network scale, loss function, and adding regularization. Their best model achieved over 70% accuracy in predicting the drop area of test examples based on the motion seen in the first 10 frames of depth maps capturing the throw.
This document reviews various methods for object tracking in video sequences. It discusses object detection, classification, and tracking techniques reported in previous research. The key methods covered include background subtraction, optical flow, Kalman filtering, and particle filtering. The document also provides a table summarizing several papers on object tracking, listing the techniques proposed and results achieved in each. It concludes that existing probability-based tracking works well for single objects but proposes improving the technique to track multiple objects.
The document discusses a Phase I study for an Artificial Neural Membrane (ANM) Flapping Wing concept funded by NASA. It proposes investigating the development of an ANM flapping wing as a demonstration of neural engineering and advanced materials. The concept integrates technologies like carbon nanotubes embedded in a polymer membrane to function as a multifunctional communications and remote sensing platform. The Phase I study examined computational modeling of flapping wing aerodynamics and the ANM's potential applications in areas like planetary exploration, environmental monitoring, and space suits.
Real Time Detection of Moving Object Based on Fpgaiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IEEE CASE 2016 On Avoiding Moving Objects for Indoor Autonomous QuadrotorsPeter SHIN
This document presents a method called Motion-vector-based Moving Objects Detection (MMOD) for detecting and avoiding moving obstacles in real-time using stereo motion vectors from a vision system on indoor autonomous quadrotors. MMOD detects moving objects by analyzing motion vectors from stereo images and categorizing them as either ego-motion from the quadrotor's movement or object-motion from moving obstacles. It then estimates distances to detected moving objects and determines safe areas for the quadrotor to navigate while avoiding collisions. The method was implemented and tested on a 3D Robotics IRIS+ quadrotor equipped with a Raspberry Pi and stereo camera. Experimental results demonstrated the ability of MMOD to detect and allow the quadrotor
Fast Human Detection in Surveillance VideoIOSR Journals
This document proposes a fast and efficient algorithm for tracking humans in indoor surveillance videos. It uses HOG features and correlation-based methods. Candidate frames are selected using strips along the borders to detect new objects entering the frame. HOG features are extracted only on candidate frames to reduce computation time. A correlation-based method then tracks humans between frames using the highest correlated sample window as the tracked window. Experimental results showed over 86% detection rates on test videos totalling over 6 hours, demonstrating the algorithm can detect and track humans in real-time surveillance applications.
This document discusses an optical computed tomography (CT) scan project. It begins with an abstract that outlines how CT is used in medical and industrial applications. It then describes how the project aimed to reconstruct a previous student's CT device using a laser light source and photodiode detector. Iterative reconstruction methods combined with the Radon and inverse Radon transforms were used to obtain 2D slice images from multiple projections of a sample.
IRJET- Moving Object Detection using Foreground Detection for Video Surveil...IRJET Journal
This document summarizes a research paper that proposes a new method for detecting moving objects in videos using foreground detection and background subtraction. The key steps of the proposed method include initializing a background model using the median of initial frames, dynamically updating the background model to adapt to lighting changes, subtracting the background model from current frames and applying a threshold to detect moving objects, and using morphological operations and projection analysis to extract human bodies and remove noise. The experimental results showed that the proposed method can accurately and reliably detect moving human bodies in real-time video surveillance.
IRJET- A Review Analysis to Detect an Object in Video Surveillance SystemIRJET Journal
This document reviews techniques for detecting objects in video surveillance systems. It discusses common object detection methods like frame differencing, optical flow, and background subtraction. Frame differencing detects motion by calculating pixel differences between frames but cannot detect still objects. Optical flow estimates pixel motion between frames to detect objects. Background subtraction models the static background and detects objects by subtracting current frames from the background model. The document analyzes these techniques and their use in video surveillance applications like traffic monitoring and security. It concludes more research is needed to improve object classification accuracy and handle challenges like camera motion.
This document provides a literature review of augmented reality in medical applications. It discusses early concepts from the 1930s and summarizes seven categories of medical augmented reality technologies developed since the 1980s, including head-mounted displays, augmented optical devices like microscopes, and image overlay techniques. The review establishes relationships between subsets of work in the field and discusses remaining challenges for medical augmented reality research.
Framework for Contextual Outlier Identification using Multivariate Analysis a...IJECEIAES
Majority of the existing commercial application for video surveillance system only captures the event frames where the accuracy level of captures is too poor. We reviewed the existing system to find that at present there is no such research technique that offers contextual-based scene identification of outliers. Therefore, we presented a framework that uses unsupervised learning approach to perform precise identification of outliers for a given video frames concerning the contextual information of the scene. The proposed system uses matrix decomposition method using multivariate analysis to maintain an equilibrium better faster response time and higher accuracy of the abnormal event/object detection as an outlier. Using an analytical methodology, the proposed system blocking operation followed by sparsity to perform detection. The study outcome shows that proposed system offers an increasing level of accuracy in contrast to the existing system with faster response time.
Pixel Based Fusion Methods for Concealed Weapon DetectionIJERA Editor
Concealed Weapon Detection(CWD) is the detection of weapons underneath a person’s clothing which is an important obstacle for the security of general public as well as safety of public assets like airports and buildings. Concealed weapons such as handbags , knives and explosives are detected using manual screening procedures. It is desirable to detect the concealed weapons from a far off distance at airports and other secured places. A number of sensors with different phenomenology have been developed to observe objects underneath’s persons clothing. As no single technology provide improved performance in CWD applications, different image fusion schemes based on pixel level is proposed . Image obtained from visual camera does not reveal any information hidden under persons clothing whereas MWM image obtained from MWM (Millimeter Wave Imaging )sensor reveal clothing penetration underneath persons cloth but cannot identify the person. In this paper fusion of MWM image with visible image based on pixels is proposed. Experimental results reveal that fused image can identify the person with concealed weapons. Performance metrics such as standard deviation, entropy and cross entropy is calculated and from simulation results it is observed that PCA based fusion method is similar to DWT based fusion scheme.
Rician Noise Reduction with SVM and Iterative Bilateral Filter in Different T...IJMERJOURNAL
ABSTRACT: Parallel magnetic resonance imaging (pMRI) techniques can speed up MRI scan through a multi-channel coil array receiving signal simultaneously. Nevertheless, noise amplification and aliasing artifacts are serious in pMRI reconstructed images at high accelerations. Image Denoising is one of the most challenging task because image denoising techniques not only poised some technical difficulties, but also may result in the destruction of the image (i.e. making it blur) if not effectively and adequately applied to image. This study presents a patch-wise de-noising method for pMRI by exploiting the rank deficiency of multi-Channel coil images and sparsity of artifacts. For each processed patch, similar patches a researched in spatial domain and through-out all coil elements, and arranged in appropriate matrix forms. Then, noise and aliasing artifacts are removed from the structured Matrix by applying sparse and low rank matrix decomposition method. The proposed method has been validated using both phantom and in vivo brain data sets, producing encouraging results. Specifically, the method can effectively remove both noise and residual aliasing artifact from pMRI reconstructed noisy images, and produce higher peak signal noise rate (PSNR) and structural similarity index matrix (SSIM) than other state-of-the-art De-noising methods. We propose image de-noising using low rank matrix decomposition (LMRD) and Support vector machine (SVM). The aim of Low Rank Matrix approximation based image enhancement is that it removes the various types of noises in the contaminated image simultaneously. The main contribution is to explore the image denoising low-rank property and the applications of LRMD for enhanced image Denoising, Then support vector machine is applied over the result.
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...AM Publications
A digital radiography delivers a radiation dose to patients; therefore it poses potential risk to the patients. One effort to reduce dose is carried out using a radiation filter, e.g. Silicone Rubber (SR) sheet. The purpose of this research was to determine the impact of the SR sheet on the high contrast objects (HCO) and the low contrast objects (LCO). The dose reduction was determined from attenuation x-rays before and after using the SR sheet. Assessment of HCO and LCO was observed from CDR TOR phantom at tube voltage of 48 kVp and tube current of 8 mAs. The physical parameter to assess image quality was the Signal to Noise Ratio (SNR) value in LCO. The maximum x-ray attenuation using the SR sheet is 48.82%. The visibility of the HCO remains the same, namely 16 objects; however the LCO slighly decreases from 14 objects to 13 objects after using the SR sheet. The SNR value decreases with an average value of 15.17%.Therefore, the SR sheet as a alternative filter has no effect on the HCO and has realtively little effect on the LCO. Thus, the SR sheet potentially is used for radiation protection in patients, especially on examinations that do not require low contrast resolution.
concealed weapon detection using digital image processingKongara Sudharshan
This document proposes and describes a method for concealed weapon detection using digital image processing. The method uses both a visual RGB image and an infrared image as inputs. It resizes the images, complements the infrared image, and performs discrete wavelet transform fusion on the images. The fused image is converted to grayscale and binarized before weapon detection is attempted. Challenges include performing accurate detection from a distance while minimizing false alarms. More research is needed to improve detection when clothing is loose.
People sometimes hide contraband inside body cavities. For instance, prison inmates and visitors may hide money or cell phones this way. Smugglers may carry drugs, and terrorists may conceal explosives inside the body. The paper proposed a method for detecting hidden item inside human body. It can detect both metal and non-metal objects and display them as images on a video screen.
This paper represents a survey of various methods of video surveillance system which improves the security. The aim of this paper is to review of various moving object detection technics. This paper focuses on detection of moving objects in video surveillance system. Moving body detection is first important task for any video surveillance system. Detection of moving object is a challenging task. Tracking is required in higher level applications that require the location and shape of object in every frame. In this survey,paper described about optical flow method, Background subtraction, frame differencing to detect moving object. It also described tracking method based on Morphology technique.
Keywords -- Frame separation, Pre-processing, Object detection using frame difference, Optical flow,
Temporal Differencing and background subtraction. Object tracking
A Novel Approach for Tracking with Implicit Video Shot DetectionIOSR Journals
1) The document presents a novel approach that combines video shot detection and object tracking using a particle filter to create an efficient tracking algorithm with implicit shot detection.
2) It uses a robust pixel difference method for shot detection that is resistant to sudden illumination changes. It then applies a particle filter for tracking that uses color histograms and Bhattacharyya distance to track objects across frames.
3) The key innovation is that the tracking algorithm is only initiated after a shot change is detected, reducing computational costs by discarding unneeded frames and triggering tracking only when needed. This provides a more efficient solution for tracking large video datasets with minimal preprocessing.
This document proposes an imaging technique that models targets as a superposition of infinitesimally small dipoles rather than point scatterers. It describes how the orientation of each dipole is represented by a dyadic contrast function and how this allows determining the orientation of dipoles, providing additional target information. Experimental results are shown for improving electromagnetic interference rejection using a distributed aperture MIMO radar configuration and for achieving improved resolution through coherent fusion imaging across distributed apertures.
MOTION PREDICTION USING DEPTH INFORMATION OF HUMAN ARM BASED ON ALEXNETgerogepatton
This document describes a study that uses a convolutional neural network model based on AlexNet to predict the drop point of a ball thrown by experimenters based on analyzing depth map images of their arm motion captured by a Kinect sensor. The researchers collected depth map data from 400 throwing trials, trained and tested their CNN model on this data, and made modifications to improve prediction accuracy, such as adjusting the network scale, loss function, and adding regularization. Their best model achieved over 70% accuracy in predicting the drop area of test examples based on the motion seen in the first 10 frames of depth maps capturing the throw.
This document reviews various methods for object tracking in video sequences. It discusses object detection, classification, and tracking techniques reported in previous research. The key methods covered include background subtraction, optical flow, Kalman filtering, and particle filtering. The document also provides a table summarizing several papers on object tracking, listing the techniques proposed and results achieved in each. It concludes that existing probability-based tracking works well for single objects but proposes improving the technique to track multiple objects.
The document discusses a Phase I study for an Artificial Neural Membrane (ANM) Flapping Wing concept funded by NASA. It proposes investigating the development of an ANM flapping wing as a demonstration of neural engineering and advanced materials. The concept integrates technologies like carbon nanotubes embedded in a polymer membrane to function as a multifunctional communications and remote sensing platform. The Phase I study examined computational modeling of flapping wing aerodynamics and the ANM's potential applications in areas like planetary exploration, environmental monitoring, and space suits.
Real Time Detection of Moving Object Based on Fpgaiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IEEE CASE 2016 On Avoiding Moving Objects for Indoor Autonomous QuadrotorsPeter SHIN
This document presents a method called Motion-vector-based Moving Objects Detection (MMOD) for detecting and avoiding moving obstacles in real-time using stereo motion vectors from a vision system on indoor autonomous quadrotors. MMOD detects moving objects by analyzing motion vectors from stereo images and categorizing them as either ego-motion from the quadrotor's movement or object-motion from moving obstacles. It then estimates distances to detected moving objects and determines safe areas for the quadrotor to navigate while avoiding collisions. The method was implemented and tested on a 3D Robotics IRIS+ quadrotor equipped with a Raspberry Pi and stereo camera. Experimental results demonstrated the ability of MMOD to detect and allow the quadrotor
Fast Human Detection in Surveillance VideoIOSR Journals
This document proposes a fast and efficient algorithm for tracking humans in indoor surveillance videos. It uses HOG features and correlation-based methods. Candidate frames are selected using strips along the borders to detect new objects entering the frame. HOG features are extracted only on candidate frames to reduce computation time. A correlation-based method then tracks humans between frames using the highest correlated sample window as the tracked window. Experimental results showed over 86% detection rates on test videos totalling over 6 hours, demonstrating the algorithm can detect and track humans in real-time surveillance applications.
This document discusses an optical computed tomography (CT) scan project. It begins with an abstract that outlines how CT is used in medical and industrial applications. It then describes how the project aimed to reconstruct a previous student's CT device using a laser light source and photodiode detector. Iterative reconstruction methods combined with the Radon and inverse Radon transforms were used to obtain 2D slice images from multiple projections of a sample.
IRJET- Moving Object Detection using Foreground Detection for Video Surveil...IRJET Journal
This document summarizes a research paper that proposes a new method for detecting moving objects in videos using foreground detection and background subtraction. The key steps of the proposed method include initializing a background model using the median of initial frames, dynamically updating the background model to adapt to lighting changes, subtracting the background model from current frames and applying a threshold to detect moving objects, and using morphological operations and projection analysis to extract human bodies and remove noise. The experimental results showed that the proposed method can accurately and reliably detect moving human bodies in real-time video surveillance.
IRJET- A Review Analysis to Detect an Object in Video Surveillance SystemIRJET Journal
This document reviews techniques for detecting objects in video surveillance systems. It discusses common object detection methods like frame differencing, optical flow, and background subtraction. Frame differencing detects motion by calculating pixel differences between frames but cannot detect still objects. Optical flow estimates pixel motion between frames to detect objects. Background subtraction models the static background and detects objects by subtracting current frames from the background model. The document analyzes these techniques and their use in video surveillance applications like traffic monitoring and security. It concludes more research is needed to improve object classification accuracy and handle challenges like camera motion.
This document provides a literature review of augmented reality in medical applications. It discusses early concepts from the 1930s and summarizes seven categories of medical augmented reality technologies developed since the 1980s, including head-mounted displays, augmented optical devices like microscopes, and image overlay techniques. The review establishes relationships between subsets of work in the field and discusses remaining challenges for medical augmented reality research.
Framework for Contextual Outlier Identification using Multivariate Analysis a...IJECEIAES
Majority of the existing commercial application for video surveillance system only captures the event frames where the accuracy level of captures is too poor. We reviewed the existing system to find that at present there is no such research technique that offers contextual-based scene identification of outliers. Therefore, we presented a framework that uses unsupervised learning approach to perform precise identification of outliers for a given video frames concerning the contextual information of the scene. The proposed system uses matrix decomposition method using multivariate analysis to maintain an equilibrium better faster response time and higher accuracy of the abnormal event/object detection as an outlier. Using an analytical methodology, the proposed system blocking operation followed by sparsity to perform detection. The study outcome shows that proposed system offers an increasing level of accuracy in contrast to the existing system with faster response time.
Pixel Based Fusion Methods for Concealed Weapon DetectionIJERA Editor
Concealed Weapon Detection(CWD) is the detection of weapons underneath a person’s clothing which is an important obstacle for the security of general public as well as safety of public assets like airports and buildings. Concealed weapons such as handbags , knives and explosives are detected using manual screening procedures. It is desirable to detect the concealed weapons from a far off distance at airports and other secured places. A number of sensors with different phenomenology have been developed to observe objects underneath’s persons clothing. As no single technology provide improved performance in CWD applications, different image fusion schemes based on pixel level is proposed . Image obtained from visual camera does not reveal any information hidden under persons clothing whereas MWM image obtained from MWM (Millimeter Wave Imaging )sensor reveal clothing penetration underneath persons cloth but cannot identify the person. In this paper fusion of MWM image with visible image based on pixels is proposed. Experimental results reveal that fused image can identify the person with concealed weapons. Performance metrics such as standard deviation, entropy and cross entropy is calculated and from simulation results it is observed that PCA based fusion method is similar to DWT based fusion scheme.
Rician Noise Reduction with SVM and Iterative Bilateral Filter in Different T...IJMERJOURNAL
ABSTRACT: Parallel magnetic resonance imaging (pMRI) techniques can speed up MRI scan through a multi-channel coil array receiving signal simultaneously. Nevertheless, noise amplification and aliasing artifacts are serious in pMRI reconstructed images at high accelerations. Image Denoising is one of the most challenging task because image denoising techniques not only poised some technical difficulties, but also may result in the destruction of the image (i.e. making it blur) if not effectively and adequately applied to image. This study presents a patch-wise de-noising method for pMRI by exploiting the rank deficiency of multi-Channel coil images and sparsity of artifacts. For each processed patch, similar patches a researched in spatial domain and through-out all coil elements, and arranged in appropriate matrix forms. Then, noise and aliasing artifacts are removed from the structured Matrix by applying sparse and low rank matrix decomposition method. The proposed method has been validated using both phantom and in vivo brain data sets, producing encouraging results. Specifically, the method can effectively remove both noise and residual aliasing artifact from pMRI reconstructed noisy images, and produce higher peak signal noise rate (PSNR) and structural similarity index matrix (SSIM) than other state-of-the-art De-noising methods. We propose image de-noising using low rank matrix decomposition (LMRD) and Support vector machine (SVM). The aim of Low Rank Matrix approximation based image enhancement is that it removes the various types of noises in the contaminated image simultaneously. The main contribution is to explore the image denoising low-rank property and the applications of LRMD for enhanced image Denoising, Then support vector machine is applied over the result.
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...AM Publications
A digital radiography delivers a radiation dose to patients; therefore it poses potential risk to the patients. One effort to reduce dose is carried out using a radiation filter, e.g. Silicone Rubber (SR) sheet. The purpose of this research was to determine the impact of the SR sheet on the high contrast objects (HCO) and the low contrast objects (LCO). The dose reduction was determined from attenuation x-rays before and after using the SR sheet. Assessment of HCO and LCO was observed from CDR TOR phantom at tube voltage of 48 kVp and tube current of 8 mAs. The physical parameter to assess image quality was the Signal to Noise Ratio (SNR) value in LCO. The maximum x-ray attenuation using the SR sheet is 48.82%. The visibility of the HCO remains the same, namely 16 objects; however the LCO slighly decreases from 14 objects to 13 objects after using the SR sheet. The SNR value decreases with an average value of 15.17%.Therefore, the SR sheet as a alternative filter has no effect on the HCO and has realtively little effect on the LCO. Thus, the SR sheet potentially is used for radiation protection in patients, especially on examinations that do not require low contrast resolution.
concealed weapon detection using digital image processingKongara Sudharshan
This document proposes and describes a method for concealed weapon detection using digital image processing. The method uses both a visual RGB image and an infrared image as inputs. It resizes the images, complements the infrared image, and performs discrete wavelet transform fusion on the images. The fused image is converted to grayscale and binarized before weapon detection is attempted. Challenges include performing accurate detection from a distance while minimizing false alarms. More research is needed to improve detection when clothing is loose.
People sometimes hide contraband inside body cavities. For instance, prison inmates and visitors may hide money or cell phones this way. Smugglers may carry drugs, and terrorists may conceal explosives inside the body. The paper proposed a method for detecting hidden item inside human body. It can detect both metal and non-metal objects and display them as images on a video screen.
Digital Image Processing Projects for Final Year StudentsManoj Subramanian
The document lists 66 projects related to image and signal processing. The projects cover various applications including satellite imaging, computer vision, biomedical imaging, machine vision, data security, storage and transmission, and mobile apps. The projects utilize different technologies such as Matlab, TMS320C5505, TMS320C6745, H.264, AI systems, wavelets, NSCT, SURF, and more. The document provides a high level overview of the projects, their codes, themes, applications, and technologies.
Using image stitching and image steganography security can be provided to any image which has to be
sent over the network or transferred using any electronic mode. There is a message and a secret image that
has to be sent. The secret image is divided into parts.The first phase is the Encrypting Phase, which deals
with the process of converting the actual secret message into ciphertext using the AES algorithm. In the
second phase which is the Embedding Phase, the cipher text is embedded into any part of the secret image
that is to be sent. Third phase is the Hiding Phase, where steganography is performed on the output image
of Embedding Phase and other parts of the image where the parts are camouflaged by another image using
least significant bit replacement. These individual parts are sent to the concerned receiver. At the
receivers end decryption of Hiding phase and Embedding Phase takes place respectively. The parts
obtained are stitched together using k nearest method. Using SIFT features the quality of the image is
improved.
This document discusses biometric authentication for ATM security. It describes common ATM attacks like skimming and explains how biometric authentication works by using unique human characteristics. Various biometric modalities are described, including fingerprints, iris scans, palm veins, and facial recognition. Multimodal biometrics is presented as an accurate approach that fuses multiple biometrics to strongly authenticate users. Applications of biometrics for ATMs and other systems are mentioned along with advantages like improved security and disadvantages like increased costs. The conclusion states that multimodal biometrics provides a high level of ATM security by reducing fraudulent activities and false acceptance rates.
Introduction to Digital Image Processing Using MATLABRay Phan
This was a 3 hour presentation given to undergraduate and graduate students at Ryerson University in Toronto, Ontario, Canada on an introduction to Digital Image Processing using the MATLAB programming environment. This should provide the basics of performing the most common image processing tasks, as well as providing an introduction to how digital images work and how they're formed.
You can access the images and code that I created and used here: https://www.dropbox.com/sh/s7trtj4xngy3cpq/AAAoAK7Lf-aDRCDFOzYQW64ka?dl=0
Granular Mobility-Factor Analysis Framework for enrichingOccupancy Sensing wi...IJECEIAES
With the growing need for adoption of smarter resource control system in existing infrastructure, the proliferation of occupancy sensing is slowly increasing its pace. After reviewing an existing system, we find that utilization of Doppler radar is less progressive in enhancing the accuracy of occupancy sensing operation. Therefore, we introduce a novel analytical model that is meant for incorporating granularity in tracing the psychological periodic characteristic of an object by emphasizing on the mobility and uncertainty movement of an object in the monitoring area. Hence, the model is more emphasized on identifying the rate of change in any periodic physiological characteristic of an object with the aid of mathematical modelling. At the same time, the model extracts certain traits of frequency shift and directionality for better tracking of the unidentified object behavior where its applicabilibility can be generalized in majority of the fields related to object detection.
Landmines cause enormous humanitarian and economic problems around the world. This document proposes using image processing techniques to detect landmines. It discusses using filters like median and weighted median filters to reduce noise in images captured by sensor devices. A thresholding method is also introduced to convert images to binary to aid in landmine detection. The goal is to develop a safe and efficient landmine detection system using these image processing methods.
REAL TIME DEEP LEARNING WEAPON DETECTION TECHNIQUES FOR MITIGATING LONE WOLF ...ijaia
Firearm Shootings and stabbings attacks are intense and result in severe trauma and threat to public
safety. Technology is needed to prevent lone-wolf attacks without human supervision. Hence designing
an automatic weapon detection using deep learning, is an optimized solution to localize and detect the
presence of weapon objects using Neural Networks. This research focuses on both unified and II-stage
object detectors whose resultant model not only detects the presence of weapons but also classifies with
respective to its weapon classes, including handgun, knife, revolver, and rifle, along with person
detection. This research focuses on YOLOv5 (You Look Only Once) family and Faster RCNN family for
model validation and training. Pruning and Ensembling techniques were applied to YOLOv5 to
enhance their speed and performance. YOLOv5 models achieve the highest score of 78% with an
inference speed of 8.1ms. However, Faster R-CNN models achieve the highest AP 89%.
REAL TIME DEEP LEARNING WEAPON DETECTION TECHNIQUES FOR MITIGATING LONE WOLF ...gerogepatton
This document discusses techniques for real-time deep learning weapon detection to mitigate lone wolf attacks. It evaluates both one-stage and two-stage object detectors, including YOLOv5 and Faster R-CNN models, for detecting weapons such as handguns, knives, revolvers, and rifles. The YOLOv5 models achieved the highest accuracy of 78% with an inference speed of 8.1ms, while the Faster R-CNN models achieved the highest average precision of 89%. Pruning and ensembling techniques were applied to YOLOv5 to improve speed and performance.
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NNIJCSEIT Journal
Scanning baggage by x-ray and analysing such images have become important technique for detecting
illicit materials in the baggage at Airports. In order to provide adequate security, a reliable and fast
screening technique is needed for baggage examination.This paper aims at providing an automatic method
for detecting concealed weapons, typically a gun in the baggage by employing image segmentation method
to extract the objects of interest from the image followed by applying feature extraction methods namely
Shape context descriptor and Zernike moments. Finally the objects are classified using fuzzy KNN as illicit
or non-illicit object.
Introduction to image processing-Class NotesDr.YNM
This document provides an introduction and overview of digital image processing. It discusses key concepts such as how digital images are composed of pixels and how image processing is used to enhance images by removing noise and irregularities. It then describes several fields that use digital image processing techniques, including medical imaging using X-rays, gamma rays, and infrared light, as well as applications in remote sensing, fingerprint analysis, and radar imaging.
A Fast Laser Motion Detection and Approaching Behavior Monitoring Method for ...toukaigi
1. The document describes a method for a Moving Object Alarm System (MOAS) that uses a laser sensor to detect moving objects, monitor their trajectories and approaching speed, and provide alerts if approaching in a dangerous manner.
2. The method defines a boundary around the monitored area and uses a fan-shaped grid to efficiently detect continuous moving objects. Object association across time is determined by updating a deviation matrix measuring changes in range, angle, and size of detected objects.
3. Outdoor experiments tested passing, approaching, and crossing objects, finding the method effectively detected motion and monitored approaching behavior in real-time.
Reeb Graph for Automatic 3D CephalometryCSCJournals
The purpose of this study is to present a method of three-dimensional computed tomographic (3D-CT) cephalometrics and its use to study cranio/maxilla-facial malformations. We propose a system for automatic localization of cephalometric landmarks using reeb graphs. Volumetric images of a patient were reconstructed into 3D mesh. The proposed method is carried out in three steps: we begin by applying 3d mesh skull simplification, this mesh was reconstructed from a head volumetric medical image, and then we extract a reeb graph. Reeb graph mesh extraction represents a skeleton composed in a number of nodes and arcs. We are interested in the node position; we noted that some reeb nodes could be considered as cephalometric landmarks under specific conditions. The third step is to identify these nodes automatically by using elastic mesh registration using “thin plate” transformation and clustering. Preliminary results show a landmarks recognition rate of more than 90%, very close to the manually provided landmarks positions made by a medical stuff.
Implementation of multiple 3D scans for error calculation on object digital r...IJERA Editor
Laser scanning is a widespread methodology of visualizing the natural environment and the manmade structures that exist in it. Laser scanners accomplish to digitalize our reality by making highly accurate measurements. Using these measurements they create a set of points in 3D space which is called point cloud and depicts an entire area or object or parts of them. Triangulation laser scanners use the triangle theories and they mainly are used to visualize handheld objects at a very close range from them. In many cases, users of such devices take for granted the accuracy specifications provided by laser scanner manufacturers and respective software and for many applications this is enough. In this paper we use point clouds, collected by a triangulation laser scanner under a repetition method, of two cubes that are geometrically similar to each other but differ in material. At first, the data of each repetition are being compared to each other to examine the consistency of the scanner under multiple measurements of the same scene. Then, the reconstruction of the objects‟ geometry is achieved and the results are being compared to the data derived by a digital caliper. The errors of calculated dimensions were estimated by the use of error propagation law.
This document discusses using k-means clustering to detect minerals from remote sensing images. It begins with an abstract describing using k-means clustering on hyperspectral images to segment and extract features to detect minerals like giacomo. It then provides background on remote sensing, k-means clustering algorithms, and describes the giacomo mineral deposit in Peru that contains silicon dioxide and titanium dioxide. It concludes with discussing using sobel edge detection as part of the mineral detection process from remote sensing images.
11.texture feature based analysis of segmenting soft tissues from brain ct im...Alexander Decker
This document describes a study that used texture feature analysis and a bidirectional associative memory (BAM) type artificial neural network to segment normal and tumor tissues from brain CT images. Gray level co-occurrence matrix features were extracted from 80 CT images of normal, benign and malignant tumors. The most discriminative features were selected using t-tests and used to train the BAM network classifier to segment tissues in the images. The proposed method provided accurate segmentation of normal and tumor regions, especially small tumors, in an efficient and fast manner with less computational time compared to other methods.
This document provides a review of using x-ray computed tomography (XCT) for additive manufacturing (AM). It begins with introductions to the principles of XCT and various AM processes. Historically, XCT and AM were first combined in 1990 to create a 3D model of a skull for medical purposes. Between 1995-2005, uses expanded from medical modeling to include XCT being used as an inspection tool to quantitatively measure AM parts. Current research focuses on using XCT for porosity measurements and general dimensional measurements of AM parts. Limitations in resolution hinder porosity measurements, while surface texture measurement needs more research.
The document discusses different types of cargo screening equipment and their capabilities. It describes backscatter x-rays which produce virtual "naked" images of passengers, as well as computerized tomography (CT) scans which provide density information. Trace detection equipment analyzes air samples to detect explosive particles. The document also examines metal detectors and their limitations in detecting non-magnetized metals, as well as newer screening technologies like puffer machines and whole body scanners. It provides learning objectives and discussion questions about evaluating appropriate screening methods based on environmental factors.
This document discusses terahertz communication devices. It begins with an introduction to terahertz radiation and its spectrum. Then it provides a brief history of terahertz technology development. It describes some key properties of terahertz waves, such as their ability to penetrate certain materials. Examples of potential terahertz communication devices and applications are mentioned, such as high-speed wireless communication. Finally, it lists some references for further information.
A new Compton scattered tomography modality and its application to material n...irjes
This document describes a new Compton scattered tomography modality and its application to non-destructive material evaluation, specifically for concrete. The modality utilizes Compton scattering of gamma rays to reconstruct the electron density distribution within an object. Data is acquired by rotating a gamma ray source and detector around the object, collecting scattered radiation along circular arcs. The electron density can then be reconstructed using an inverse Radon transform formula. Simulations demonstrate the viability of using this technique to image rebar grids and cracks within concrete samples. The reconstructed electron density provides complementary information to attenuation-based techniques for non-destructive concrete evaluation.
Wavelet analysis applied to the study of digitalized bullet striatures for th...Luca Gervasio
The firearm identification through fired bullets involves the analysis of signs by studying their features. The aim of this paper is to propose a method based on the comparison of multilevel wavelet analysis applied to the digitalized images of the bullet surface.
NIOLA VINCENZO, BUCCELLI CLAUDIO, GERVASIO LUCA, PILLERI MICHELE, POLICINO FABIO , QUAREMBA GIUSEPPE
Hybrid Approach for Brain Tumour Detection in Image Segmentationijtsrd
In this paper we have considered illustrating a few techniques. But the numbers of techniques are so large they cannot be all addressed. Image segmentation forms the basics of pattern recognition and scene analysis problems. The segmentation techniques are numerous in number but the choice of one technique over the other depends only on the application or requirements of the problem that is being considered. Analysis of cluster is a descriptive assignment that perceive homogenous group of objects and it is also one of the fundamental analytical method in facts mining. The main idea of this is to present facts about brain tumour detection system and various data mining methods used in this system. This is focuses on scalable data systems, which include a set of tools and mechanisms to load, extract, and improve disparate data power to perform complex transformations and analysis will be measured between the way of measuring the Furrier and Wavelet Transform distance. Sandeep | Jyoti Kataria "Hybrid Approach for Brain Tumour Detection in Image Segmentation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33409.pdf Paper Url: https://www.ijtsrd.com/medicine/other/33409/hybrid-approach-for-brain-tumour-detection-in-image-segmentation/sandeep
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes a research paper that presents a framework for detecting and tracking objects in real-time video based on color. The proposed methodology uses a webcam to capture video, performs color-based filtering and image processing to isolate the target object, and analyzes the object's motion over time to track its path. Key steps include Euclidean filtering to isolate the object's color, converting to grayscale for faster processing, contour extraction to delineate the object's shape, and analyzing metrics like the Hurst exponent and Lyapunov exponent to detect chaos in the object's motion over time. The goal is to develop an efficient and real-time system for color-based object detection and tracking.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Similar to Design of algorithm for detection of hidden objects from Tera hertz images (20)
This document provides a technical review of secure banking using RSA and AES encryption methodologies. It discusses how RSA and AES are commonly used encryption standards for secure data transmission between ATMs and bank servers. The document first provides background on ATM security measures and risks of attacks. It then reviews related work analyzing encryption techniques. The document proposes using a one-time password in addition to a PIN for ATM authentication. It concludes that implementing encryption standards like RSA and AES can make transactions more secure and build trust in online banking.
This document analyzes the performance of various modulation schemes for achieving energy efficient communication over fading channels in wireless sensor networks. It finds that for long transmission distances, low-order modulations like BPSK are optimal due to their lower SNR requirements. However, as transmission distance decreases, higher-order modulations like 16-QAM and 64-QAM become more optimal since they can transmit more bits per symbol, outweighing their higher SNR needs. Simulations show lifetime extensions up to 550% are possible in short-range networks by using higher-order modulations instead of just BPSK. The optimal modulation depends on transmission distance and balancing the energy used by electronic components versus power amplifiers.
This document provides a review of mobility management techniques in vehicular ad hoc networks (VANETs). It discusses three modes of communication in VANETs: vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and hybrid vehicle (HV) communication. For each communication mode, different mobility management schemes are required due to their unique characteristics. The document also discusses mobility management challenges in VANETs and outlines some open research issues in improving mobility management for seamless communication in these dynamic networks.
This document provides a review of different techniques for segmenting brain MRI images to detect tumors. It compares the K-means and Fuzzy C-means clustering algorithms. K-means is an exclusive clustering algorithm that groups data points into distinct clusters, while Fuzzy C-means is an overlapping clustering algorithm that allows data points to belong to multiple clusters. The document finds that Fuzzy C-means requires more time for brain tumor detection compared to other methods like hierarchical clustering or K-means. It also reviews related work applying these clustering algorithms to segment brain MRI images.
1) The document simulates and compares the performance of AODV and DSDV routing protocols in a mobile ad hoc network under three conditions: when users are fixed, when users move towards the base station, and when users move away from the base station.
2) The results show that both protocols have higher packet delivery and lower packet loss when users are either fixed or moving towards the base station, since signal strength is better in those scenarios. Performance degrades when users move away from the base station due to weaker signals.
3) AODV generally has better performance than DSDV, with higher throughput and packet delivery rates observed across the different user mobility conditions.
This document describes the design and implementation of 4-bit QPSK and 256-bit QAM modulation techniques using MATLAB. It compares the two techniques based on SNR, BER, and efficiency. The key steps of implementing each technique in MATLAB are outlined, including generating random bits, modulation, adding noise, and measuring BER. Simulation results show scatter plots and eye diagrams of the modulated signals. A table compares the results, showing that 256-bit QAM provides better performance than 4-bit QPSK. The document concludes that QAM modulation is more effective for digital transmission systems.
The document proposes a hybrid technique using Anisotropic Scale Invariant Feature Transform (A-SIFT) and Robust Ensemble Support Vector Machine (RESVM) to accurately identify faces in images. A-SIFT improves upon traditional SIFT by applying anisotropic scaling to extract richer directional keypoints. Keypoints are processed with RESVM and hypothesis testing to increase accuracy above 95% by repeatedly reprocessing images until the threshold is met. The technique was tested on similar and different facial images and achieved better results than SIFT in retrieval time and reduced keypoints.
This document studies the effects of dielectric superstrate thickness on microstrip patch antenna parameters. Three types of probes-fed patch antennas (rectangular, circular, and square) were designed to operate at 2.4 GHz using Arlondiclad 880 substrate. The antennas were tested with and without an Arlondiclad 880 superstrate of varying thicknesses. It was found that adding a superstrate slightly degraded performance by lowering the resonant frequency and increasing return loss and VSWR, while decreasing bandwidth and gain. Specifically, increasing the superstrate thickness or dielectric constant resulted in greater changes to the antenna parameters.
This document describes a wireless environment monitoring system that utilizes soil energy as a sustainable power source for wireless sensors. The system uses a microbial fuel cell to generate electricity from the microbial activity in soil. Two microbial fuel cells were created using different soil types and various additives to produce different current and voltage outputs. An electronic circuit was designed on a printed circuit board with components like a microcontroller and ZigBee transceiver. Sensors for temperature and humidity were connected to the circuit to monitor the environment wirelessly. The system provides a low-cost way to power remote sensors without needing battery replacement and avoids the high costs of wiring a power source.
1) The document proposes a model for a frequency tunable inverted-F antenna that uses ferrite material.
2) The resonant frequency of the antenna can be significantly shifted from 2.41GHz to 3.15GHz, a 31% shift, by increasing the static magnetic field placed on the ferrite material.
3) Altering the permeability of the ferrite allows tuning of the antenna's resonant frequency without changing the physical dimensions, providing flexibility to operate over a wide frequency range.
This document summarizes a research paper that presents a speech enhancement method using stationary wavelet transform. The method first classifies speech into voiced, unvoiced, and silence regions based on short-time energy. It then applies different thresholding techniques to the wavelet coefficients of each region - modified hard thresholding for voiced speech, semi-soft thresholding for unvoiced speech, and setting coefficients to zero for silence. Experimental results using speech from the TIMIT database corrupted with white Gaussian noise at various SNR levels show improved performance over other popular denoising methods.
This document reviews the design of an energy-optimized wireless sensor node that encrypts data for transmission. It discusses how sensing schemes that group nodes into clusters and transmit aggregated data can reduce energy consumption compared to individual node transmissions. The proposed node design calculates the minimum transmission power needed based on received signal strength and uses a periodic sleep/wake cycle to optimize energy when not sensing or transmitting. It aims to encrypt data at both the node and network level to further optimize energy usage for wireless communication.
This document discusses group consumption modes. It analyzes factors that impact group consumption, including external environmental factors like technological developments enabling new forms of online and offline interactions, as well as internal motivational factors at both the group and individual level. The document then proposes that group consumption modes can be divided into four types based on two dimensions: vertical (group relationship intensity) and horizontal (consumption action period). These four types are instrument-oriented, information-oriented, enjoyment-oriented, and relationship-oriented consumption modes. Finally, the document notes that consumption modes are dynamic and can evolve over time.
The document summarizes a study of different microstrip patch antenna configurations with slotted ground planes. Three antenna designs were proposed and their performance evaluated through simulation: a conventional square patch, an elliptical patch, and a star-shaped patch. All antennas were mounted on an FR4 substrate. The effects of adding different slot patterns to the ground plane on resonance frequency, bandwidth, gain and efficiency were analyzed parametrically. Key findings were that reshaping the patch and adding slots increased bandwidth and shifted resonance frequency. The elliptical and star patches in particular performed better than the conventional design. Three antenna configurations were selected for fabrication and measurement based on the simulations: a conventional patch with a slot under the patch, an elliptical patch with slots
1) The document describes a study conducted to improve call drop rates in a GSM network through RF optimization.
2) Drive testing was performed before and after optimization using TEMS software to record network parameters like RxLevel, RxQuality, and events.
3) Analysis found call drops were occurring due to issues like handover failures between sectors, interference from adjacent channels, and overshooting due to antenna tilt.
4) Corrective actions taken included defining neighbors between sectors, adjusting frequencies to reduce interference, and lowering the mechanical tilt of an antenna.
5) Post-optimization drive testing showed improvements in RxLevel, RxQuality, and a reduction in dropped calls.
This document describes the design of an intelligent autonomous wheeled robot that uses RF transmission for communication. The robot has two modes - automatic mode where it can make its own decisions, and user control mode where a user can control it remotely. It is designed using a microcontroller and can perform tasks like object recognition using computer vision and color detection in MATLAB, as well as wall painting using pneumatic systems. The robot's movement is controlled by DC motors and it uses sensors like ultrasonic sensors and gas sensors to navigate autonomously. RF transmission allows communication between the robot and a remote control unit. The overall aim is to develop a low-cost robotic system for industrial applications like material handling.
This document reviews cryptography techniques to secure the Ad-hoc On-Demand Distance Vector (AODV) routing protocol in mobile ad-hoc networks. It discusses various types of attacks on AODV like impersonation, denial of service, eavesdropping, black hole attacks, wormhole attacks, and Sybil attacks. It then proposes using the RC6 cryptography algorithm to secure AODV by encrypting data packets and detecting and removing malicious nodes launching black hole attacks. Simulation results show that after applying RC6, the packet delivery ratio and throughput of AODV increase while delay decreases, improving the security and performance of the network under attack.
The document describes a proposed modification to the conventional Booth multiplier that aims to increase its speed by applying concepts from Vedic mathematics. Specifically, it utilizes the Urdhva Tiryakbhyam formula to generate all partial products concurrently rather than sequentially. The proposed 8x8 bit multiplier was coded in VHDL, simulated, and found to have a path delay 44.35% lower than a conventional Booth multiplier, demonstrating its potential for higher speed.
This document discusses image deblurring techniques. It begins by introducing image restoration and focusing on image deblurring. It then discusses challenges with image deblurring being an ill-posed problem. It reviews existing approaches to screen image deconvolution including estimating point spread functions and iteratively estimating blur kernels and sharp images. The document also discusses handling spatially variant blur and summarizes the relationship between the proposed method and previous work for different blur types. It proposes using color filters in the aperture to exploit parallax cues for segmentation and blur estimation. Finally, it proposes moving the image sensor circularly during exposure to prevent high frequency attenuation from motion blur.
This document describes modeling an adaptive controller for an aircraft roll control system using PID, fuzzy-PID, and genetic algorithm. It begins by introducing the aircraft roll control system and motivation for developing an adaptive controller to minimize errors from noisy analog sensor signals. It then provides the mathematical model of aircraft roll dynamics and describes modeling the real-time flight control system in MATLAB/Simulink. The document evaluates PID, fuzzy-PID, and PID-GA (genetic algorithm) controllers for aircraft roll control and finds that the PID-GA controller delivers the best performance.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Design of algorithm for detection of hidden objects from Tera hertz images
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 13, Issue 2 (Jul. - Aug. 2013), PP 25-32
www.iosrjournals.org
www.iosrjournals.org 25 | Page
Design of algorithm for detection of hidden objects from Tera
hertz images
P.Vijayalakshmi1
, M.Sumathi2
1
(Department of Information Technology, Pandian Saraswathi Yadav Engineering College, Sivagangai
TN,India)
2
(Department of Computer Science, Sri Meenakshi Govt. Arts College for Women, Madurai, TN, India)
Abstract: An algorithm for detection of hidden objects from tera hertz images is presented. Presently, terahertz
imaging employs object’s radiometric temperatures in human to acquire images of concealed objects. But, it
presents problem in temperature sensitive areas like oil and coal mines, factories etc. The aim of the paper is to
detect and extract hidden objects underneath person’s clothing. Here, a three stage approach is presented: In
the first stage, edge based segmentation is applied after smoothing the image using bilateral filter. In the next
stage, transform invariant shape descriptors, Gabor and gray level co-occurrence (GLCM) texture features of
interested object regions are computed. Finally, a Euclidean distance criterion is used for classification. To
appraise the technique, detection error and detection rate are calculated. Test results are compared with
ground truth data obtained from the original image. Experiment results are found to be promising with 1.04%
detection error and 91.9% as detection rate. Potential applications in security include detection of weapons and
explosive in public places like airports, stations etc.
Key words: Edge detection, GLCM features, Gobor features, Shape descriptors, THZ images.
I. INTRODUCTION
In the recent years, increased threats of criminal action have led to the development of many techniques
for the detection of concealed weapons, explosives etc. They include metal detectors, X-ray scanners, and
detection of explosive and are based on energetic radiation. Electromagnetic waves at Tera hertz frequencies are
safe, penetrate barriers, have short wave lengths to allow discrimination between objects. They have unique
reflection and absorption properties. Also, many explosives have characteristic signatures at terahertz
wavelengths. A survey of object recognition/classification methods based on image moments was presented.
They had reviewed various types of moments and moment-based invariants. They had studied the role for
various image degradations and distortions that affects the shape descriptors for classification. They had
reviewed numerical algorithms for moment computation in real applications [1]. Another paper had explained
millimeter wave (MMW) sensors designed for detecting both metallic and nonmetallic objects placed on a
human body and hidden under clothes. The sensor was based on the synchronized detection principle. It had
estimated the power of back-scattered signal from hidden objects. Time-gating algorithm combined with
threshold level was implemented to detect hidden objects at the distance [2].Detection and segmentation of
concealed objects in Terahertz Image was presented. Standard segmentation algorithms were unable to segment
or detect concealed objects. A two stage approach was presented. First, the noise from the image was removed
using the anisotropic diffusion algorithm and then detected the boundaries of the concealed objects. A mixture
of Gaussian model was used to study the distribution of the temperature inside the image to identify the
concealed objects [3].A inter ferro metric imaging and sensing for the detection of explosives, weapons and
drugs was explored. It worked with three objectives: (a) THz radiation to detect concealed weapons (b) to detect
compounds such as explosives and illicit drugs that have characteristic THz spectra [4].Detection and
identification of explosive RDX by Diffuse Reflection Spectroscopy was presented. The reflection spectrum of
the explosive RDX was acquired from a diffuse reflection measurement using a THz time-domain spectroscopy
system. Kramers-Kronig transform was applied over the reflection spectrum to obtain the absorption spectrum.
The investigation demonstrated that THz technique could be capable of detecting and identifying hidden RDX-
related explosives [5].
The article was presented to provide a tutorial overview of developments in Tera hertz imaging. It was
to detect concealed weapons from a standoff distance, especially where the flow of people could not be
controlled. It' was a technological challenge that required innovative solutions in sensor technologies and image
processing. A number of sensors based on different phenomenon as well as image processing techniques were to
be developed to observe objects underneath people are clothing [6]. .A technology with a warning system was
presented. It educated the customer about the use of technology and its applicability. It strongly recommended
that potential customers to trial the technology in their own unique environments to determine the utility of this
technology and for its adaptability to environmental pressures. The false alarms and missed detections that
2. Design of algorithm for detection of hidden objects from Tera hertz images
www.iosrjournals.org 26 | Page
occurred were easily accommodated. [7]. Object detection is a critical part in many applications like image
search, image understanding and scene analysis. However, still it is an open problem due to complexity of
object classes and images. Current approaches used for object detection are top down and bottom up. Top down
approaches include training stage and to define object configurations. The later approach includes low level
image features to high level image features. Here, we have included both the approaches for detection of
concealed objects [8],[9].Recent developments in the area of concealed weapon detection using electromagnetic
methods including metal detection, magnetic field distortion, electromagnetic resonance, acoustic and ultrasonic
inspection, millimeter waves, Terahertz imaging, Infrared, X-ray were reviewed. The advantages and
disadvantages of various approaches were discussed. Research challenges were presented. Future research
perspectives were in the above areas was analyzed [10].
A 35GHz imager was presented that was based on conical scan technology from low cost materials. In
conjunction with an illumination chamber it was used to collect indoor images of people with weapons and
illegal imports hidden under their clothing. That imager had a spot size of 20mm and covered a field of view of
20 x 10 degrees that partially covered the body of knees to shoulders. A variant imager was designed and
constructed. It had a field of view of 36 x 18 degrees and was capable of covering the whole body of an adult.
That was achieved by increasing the number of direct detection receivers by implementing an improved optical
design. The optics system consisted of a front grid, a polarization device which converted linear to circular
polarization and a rotating scanner [11].THz time domain spectroscopy (THz-TDS) was presented. It was used
to investigate explosives and establish a spectra database of explosive materials in the THz frequency range.
Signatures of selected explosives and related compounds (ERCs) were identified in the THz band and
maintained. THz spectra of ERCs were calculated based on Density Functional Theory [12]. The progress that
had been made in Tera hertz technology over the years was reviewed. It identified the achievements,
challenges and prospects in millimeter wave and terahertz technology for specialized screening tasks. It
explored that many solids including explosives have characteristic spectroscopic signatures at terahertz
wavelengths that were used to identify them [13].Detection of biological hazards using electronic Terahertz
systems was presented. The discriminating sense of vulnerability to concealed threats by weapons or biological
agents such as anthrax had led the scientific community to address the problem of detecting such concealed
threats [14]. A survey of object recognition/classification methods based on image moments was presented.
They had reviewed various types of moments and moment-based invariants. They had studied the role for
various image degradations and distortions that affects the shape descriptors for classification. They had
reviewed numerical algorithms for moment computation in real applications [15].
II. PROPOSED METHOD
Initially, images are processed to compensate for losses due to noise and other variations. In general,
objects are featured in images by its color, edge, and shape and texture information. In this paper, three main
attributes of object are considered at various spatial resolutions to detect any hidden object. First, the search
image is divided into number of overlapping grids to reduce the missing probability. Both region-based and
contour based shape descriptors are computed to distinguish shapes of different objects. Gobor, GLCM features
are extracted as texture information to characterize objects. For robust detection, a combined feature vector of
edge, shape and texture is employed. Test feature vector is calculated and compared with feature vectors of the
search image using Euclidean distance classifier. To appraise the algorithm, detection rate and detection error
are measured against ground truth data. Experiments are repeated both with combined and individual feature
vector for gun, knife and needle images.
2.1. Shape Features
Shape descriptors are mathematical functions that are applied on images to produce numerical values.
These numerical values are processed to provide information about objects. Two dimensional shape descriptors
are of two categories, region-based descriptors and contour-based descriptors. Region-based descriptors
characterize spatial distribution of pixel intensities and they include pixels in boundary and interior. Region-
based shape descriptors describe complex objects having multiple disconnected regions, simple objects with or
without holes. Contour based shape descriptors are transform invariant and robust to noise. Moments invariants
are more useful in shape analysis and they are used in distinguishing shape between different objects. A closed
boundary is characterized by an ordered sequence )(iz that represents the Euclidean distance between centroid
and all N bounding pixels of the digitized shape. Here, translation, rotation and scale invariant normalized
contour sequence moment rm and contour sequence central moment r are calculated for shape
representation. Also, computation time is much less for spiral and concave shapes. Classification by using
contour sequence moments comparatively good over area based moments. Shape descriptors 321 ,, FFF are
calculated using (2.1), (2.2) and (2.3).
3. Design of algorithm for detection of hidden objects from Tera hertz images
www.iosrjournals.org 27 | Page
1
2
1
2
1
)(
m
F
…… … …. (2.1)
2
3
2
3
2
)(
F
…………. .. (2.2)
2
2
4
3
)(
F
…………..… (2.3)
321 ,, FFF - Shape descriptors of regions
1m - First order moment
432 ,, -- Second, third, fourth order central moments
2.2. Texture Features
A GLCM is a matrix where the number of rows and columns is equal to the number of gray levels, G,
in a image. The matrix element P(i, j | d, θ) is the relative frequency with which two pixels, separated by
distance d, and in direction specified by the particular angle (θ). Here, gray level co-occurrence based texture
features are computed in two steps. In the first step, pair wise spatial co-occurrences of pixels separated by a
particular distance are charted by a gray level co-occurrence matrix (GLCM). Then using the GLCM, a set of
texture features of interested object regions is computed. Here, entropy, correlation, energy, contrast and
homogeneity features are computed. Energy content is computed using: (2.4) and is the sum of squared elements
in the GLCM. Entropy represents the randomness of intensity distribution and is computed using: (2.5). Contrast
is computed using: ( 2.6) that presents the amount of local variation present in the image . Correlation reveals
the linearity present in the image and is measured using : (2.7). Homogeneity measures the closeness of the
distribution of elements in the GLCM and is evaluated using: (2.8).
1
0
1
0
2
),(
G
m
G
n
nmpEnergy ------------- (2.4)
1
0
1
0
),(log),(
G
m
G
n
nmpnmpEntrophy ----------- (2.5)
),()(
)1(
1 1
0
1
0
2
2
nmpnm
G
Contrast
G
m
G
n
---------- (2.6)
yx
G
m
G
n
yxnmmnp
nCorrelatio
1
0
1
0
),(
----------- (2.7)
1
0
1
0
),(
G
m
G
n
x nmpm
1
0
1
0
),(
G
m
G
n
y nmpn
1
0
1
0
2
),()(
G
m
G
n
xx nmpm
1
0
1
0
2
),()(
G
m
G
n
yy nmpm
1
0
1
0 1(
),(G
m
G
n nm
nmp
Homogenity
--------------- (2.8)
Gobor Features
Gabor filters have frequency and orientation representations similar to human visual system. They are
are most appropriate for texture representation and for object discrimination. Results of symmetric and
4. Design of algorithm for detection of hidden objects from Tera hertz images
www.iosrjournals.org 28 | Page
asymmetric Gobor filter are combined in a single quantity, called Gabor-energy. The Gabor-energy is closely
related to the local power spectrum and it is associated with a pixel in an image. It is calculated as the squared
modulus of the Fourier transform of the product between the image and a window function. Here, Gaussian
window is used as a neighborhood function. Transformation is applied on the image with different orientations
and scales. The resultant magnitude represents the energy ),( nmE present in the image at different scales and
is given: (2.9). From the magnitude, homogenous texture m is calculated using: (2.10) and (2.11).
1...,.........2,1,0
1..,.........2,1,0
),(),(
Nn
Mm
yxGnmE
x y
m
-------- (2.9)
QP
nmE
m
),(
------ (2.10)
imagesizeQP
QP
yxG
x y
mm
m
2
)),((
- ------ (2.11)
2.3. Algorithm
Read search image;
img=imread('humen.jpg');/ h
Divide the image into overlapping sub images
For each sub image,
function[X1,map1]=edg(R,R1);
Compute edge features;
function [X,map]=shpe(RGB,RGB1);
Compute Shape descriptors;
function[X1,map1]=txtre1(R1,R2);
Compute GLCM feature
edg(img,img1);
shpe(img,img1);
txtre1(img,img1);
function gb=gabor_fn(sigma,theta,lambda,psi,gamma)
Compute Gabor features;
Compute entropy features
Compute a combined feature vector;
Train for gun images;
Train for knife images;
Train for needle images;
Create a feature database;
Read test image(gun/ knife/needle)
R=imread('gun.jpg');
R2=imread('1knife.jpg');
R3=imread(‗needle.jpg‘);
Create a test feature vector;
Classify using Euclidean criteria
III. ANALYSIS OF EXPERIMENTAL RESULTS
This paper has been investigated a feature based technique for detection of hidden objects from tera
hertz images. It is implemented on Intel Dual Core Processor in Windows XP platform using MAT Lab 6.5. It is
tested with images that consisted of gun, knife, needle etc. Here, edge features, shape descriptors, Gabor, GLCM
texture features are computed to form a strong feature vector. Sample images used for search and test images in
the experimentation are shown in figure 3.1 and 3.2. Since edges are less prone to noises, edge features alone
are not sufficient to detect complex objects. Transform invariant shape descriptors and texture features are
computed. GLCMs provide a quantitative picture of a spatial pattern of pixels. Pixels of same object have a
higher correlation value compared to adjacent objects. Also, they are highly correlated with neighboring pixels
than with distant pixels. Correlation co efficient is highly dependent on image window size. GLCM values are
normalized to remove the image dependencies. Detection rate and accuracy are performance indicators for any
5. Design of algorithm for detection of hidden objects from Tera hertz images
www.iosrjournals.org 29 | Page
detection algorithm. Experiments are conducted with individual feature vector and with combined feature
vector. The following observations are made: Gradient energy is found to be larger near the edges and smaller in
smooth areas of the image. Shape descriptors provide valuable information about intricate objects. Gobor
features together with GLCM features provide robustness and stability to the system. Contour-based methods
are sensitive to noise; region-based methods able to detect shape defections also. Pixel processing and connected
component analysis are adopted to extract the object.
Experimental results are better for the combined feature compared to the individual feature vector.
Detection error is found to be very less 0% for knife image. Similarly, detection error is 1.1% using combined
feature than shape features for gun images. Detection errors for various images using combined feature vector
are tabulated in Table 3.1., Table 3.2 and Table 3.3.Yet, overall performance is good for combined feature
vector. An extensive search is carried out at various resolutions for multiple occurrences of same or different
object. Due to limited availability of tera hertz images, we are able to conduct experiments only with a limited
set of images that were taken from various scenes at different angles. For blurred and occluded images,
detection error is poor. It is also found that detection rate is 94.4 % for knife images and 88.8% for needle
images. Computation of detection rate for various images is shown in Table 3.4. Experimental outputs for gun
image are shown in figure 3.3.Experimental outputs for knife image are shown in figure 3.4. Experimental
outputs for needle image are shown in figure 3.5.
Figure 3.1.Sample search
images
7. Design of algorithm for detection of hidden objects from Tera hertz images
www.iosrjournals.org 31 | Page
TABLE 3.1
Computation of Detection Error (Combined Feature)
No Test Images Test Images Actual pixels Estimated pixels
(detected)
%Detection error
E-A/Ax100
1 Gun 32x32 91 90 1.1
2 Knife 32x32 32 32 0
4 Needle (24x55) 99 97 2.02
Average error 1.04
TABLE 3.2
Computation of Detection Error
For shape feature
S.No
Test Images Image
Size
Shape features %Detection
error
Actual pixels Estimated pixels
(detected)
E-A/Ax100
1 Gun 32x32 91 89 2.1
2 Knife 32x32 32 32 0
4 Needle (24x55) 99 94 5.05
Average 2.38
TABLE 3.3
Computation of Detection error for Texture Features
Sno
Test Images Test Images
Texture features %Detection error
Actual pixels Estimated
pixels
(detected)
E-A/Tx100
1 Gun 32x32 315 310 1.58
2 Knife 32x32 91 90 1.09
4 Needle (24x55) 220 211 4.09
Average 2.25
TABLE 3.4
Computation of Detection rate
S,No Test images Number of instances
tested
Number of
Successful
detection
Number of
Failures
Detection
rate in %
1 Gun 27 25 2 92.5
2 Knife 18 17 1 94.4
3 Needle 18 16 2 88.8
Average 91.9
IV. CONCLUSION
This paper has explored the use of feature based technique for distinguishing interested regions in the
sample tera hertz images. From the detection error, we have observed that combined feature vector makes the
classification more stable and robust. Also, we have achieved 1.04% detection error for combined feature and
91.9% detection rate from the experiments. Future work may consist of using additional metrics to compare the
experimental results and testing the algorithm with different image sets. This new brand of detection system
may enable more applications in security and safety.
REFERENCE
Journal papers:
[1]. Jan Flusser , Moment Invariants in Image Analysis, World Academy of Science, Engineering and Technology 11 , 2005,pp:376-
381.
[2] KapilevichB.,Detecting Hidden Objects on Human Body Using Active Millimeter Wave Sensor, Sensors Journal, IEEE, Volume:
10, Issue: 11, On Page(s): 1746 – 1752.
[3]. Xilin,Shencharles R Dietlein, Erich Grossman, Zoya Popvic and Francois G Meyer, Detection & Segmentation of concealed objects
in Terahertz Images, IEEE Transactions on Image Processing, 17 (12), pp 2465-2475, 2008.
[4]. Federici, John F.; Schulkin, Brian; Huang, Feng; Gary, Dale; Barat, Robert; Oliveira, Filipe; Zimdars, David , THz imaging and
sensing for security applications—explosives, weapons and drugs, ,Semiconductor Science and Technology, Volume 20, Issue 7, pp.
S266-S280 (2005).
[5]. Hai-Bo Liu, Yunqing Chen, Glenn J. Bastiaans, and X.-C. Zhang, Detection and identification of explosive RDX by THz diffuse
reflection spectroscopy, Optics Express, Vol. 14, Issue 1, pp. 415-423 (2006)
Magazine:
[6]. H. Chen, S. Lee, R. Rao, M.-A. Slamani, and P. Varshney, Imaging for concealed weapon detection,” IEEE Signal Processing
Magazine, pp. 52–61, March 2005.
8. Design of algorithm for detection of hidden objects from Tera hertz images
www.iosrjournals.org 32 | Page
[7]. Dr Alan J. Lipton, Craig H. Heartwell, Dr Niels Haering, and Donald Madden, Critical Asset Protection, Perimeter Monitoring, and
Threat Detection Using automated Video Surveillance , IEEE AESS systems magazine , 2003
Books:
[8]. Milan Sonaka, Vaclav Hlavac, Roger Boyle, Image processing, Analysis, and Machine Vision (Thomson learning Inc. ISBN : 981-
240-061-3, 1998).
[9]. Rafael C.Gonzalez, Richard E.Woods, Digital Image processing ( PHI Learning Private Ltd. New Delhi, ISBN: 978-81-203-3640-
7. 2008).
Proceedings:
[10]. A. Agurto, Y. Li, G. Tian, N. Bowring, and S. Lockwood, ―A review of Concealed weapon detection and research in perspective,‖
in Proceedings of the 2007 IEEE International Conference on MonE02 Networking, Sensing and Control, 2007, pp. 443– 448 .
[11]. Appleby, Roger; Anderton, Rupert N.; Price, Sean; Sinclair, Gordon N.; Coward, Peter R. , Whole-body 35-GHz security scanner,
Radar Sensor Technology VIII and Passive Millimeter-Wave Imaging Technology VII.Proceedings of the SPIE, Volume 5410, pp.
244-251 (2004).
[12]. Yunqing Chen, Haibo Liu, X.-C. Zhang, etc, ―Spectroscopic characterization of explosives in the far infrared region‖, Proceedings
of SPIE, 5411, pp1-7, 2004
[13]. Michael C Kemp , Millimetre Wave and Terahertz Technology for the Detection of Concealed Threats – A Review, , Iconal
Technology Ltd, St John‘s Innovation Centre, Cambridge, United Kingdom, Optics and Photonics for Counter-Terrorism and Crime
Fighting II Proc. of SPIE Vol. 6402, 64020D, · 0277-786X/06/$15 · doi: 10.1117/12.692612, 2006
Reports:
[14]. Peter Baines, Hazardous Materials: Chemical Biological Radiological and Nuclear – A Review: 2004 to 2007, Detective Report –,
National Institute of Forensic Science, Australia.
[15]. Wai Lam Chan, Jason Deibel and Daniel M Mittleman, Imaging with terahertz radiation, IOP Publishing, Reports On Progress In
Physics, Rep. Prog. Phys. 70 (2007) 1325–1379, doi:10.1088/0034-4885/70/8/R02.