People sometimes hide contraband inside body cavities. For instance, prison inmates and visitors may hide money or cell phones this way. Smugglers may carry drugs, and terrorists may conceal explosives inside the body. The paper proposed a method for detecting hidden item inside human body. It can detect both metal and non-metal objects and display them as images on a video screen.
concealed weapon detection using digital image processingKongara Sudharshan
This document proposes and describes a method for concealed weapon detection using digital image processing. The method uses both a visual RGB image and an infrared image as inputs. It resizes the images, complements the infrared image, and performs discrete wavelet transform fusion on the images. The fused image is converted to grayscale and binarized before weapon detection is attempted. Challenges include performing accurate detection from a distance while minimizing false alarms. More research is needed to improve detection when clothing is loose.
In response to an increasing threat of terrorism, personal surveillance at security checkpoints, such as airports, railways stations, metro stations etc, is becoming increasingly important. Conventional systems in place at high-security checkpoints include metal detectors for personnel and X-ray systems for hand-carried items. These systems have been very effective, but have a number of shortcomings that will need to be addressed in future systems. Metal detectors can only detect metal targets, such as ordinary handguns and knives. The effectiveness of these detectors can vary depending on the quantity, orientation, and type of metal. Furthermore, no discrimination is possible between simple innocuous items, such as glasses, belt buckles, keys, etc., and actual threats. This leads to a rather high number of nuisance alarms. Modern threats include plastic or ceramic handguns and knives, as well as extremely dangerous items such as “plastic” and liquid explosives. These items cannot be detected with metal detectors.
A fundamentally different security measure is required to handle these threats. One type of system that addresses these concerns “concealed weapon detection using image processing”, which can penetrate clothing barriers to image items concealed by common clothing. This can be accomplished using X-ray imaging systems, and by recently developed millimetre-wave imaging systems, X-ray systems are potentially effective for this purpose.
However, the perceived adverse health effects of X-ray exposure may hamper the public acceptance of these systems. Millimetre waves are high-frequency electromagnetic waves usually defined to be within the 30–300-GHz frequency band. The techniques and systems discussed here could operate at lower microwave frequency bands as well.
Millimetre-wave systems are nonionizing and, therefore, pose no known health hazard at moderate power levels. Millimeter-wave imaging systems are capable of penetrating common clothing barriers to form an image of a person as well as any concealed items. Millimetre-wave systems can be very high resolution due to the relatively short wavelength (1–10 mm).
Image processing involves the alteration and analysis of pictorial information. There are two main methods: optical processing using lenses and electronic processing. Electronic processing can be analog, controlling brightness and contrast, or digital, where images are composed of pixels that can be processed by a computer. Image processing has applications in fields like robotics, medicine, graphics, and satellite imaging. It allows for tasks like image restoration, compression, and segmentation.
A Fast Single-Pixel Laser Imager for VR/AR Headset TrackingPing Hsu
In this work we demonstrate a highly flexible laser imaging system for 3D sensing applications such as in tracking of VR/AR headsets, hands and gestures. The system uses a MEMS mirror scan module to transmit low power laser pulses over programmable areas within a field of view and uses a single photodiode to measure the reflected light...
An Approach for Object and Scene Detection for Blind Peoples Using Vocal Vision.IJERA Editor
This system help the blind peoples for the navigation without the help of third person so blind person can perform its work independently. This system implemented on android device in which object detection and scene detection implemented, so after detection there will be text to speech conversion so user or blind person can get message from that android device with the help of headphone connected to that device. Our project will help blind people to understand the images which will be converted to sound with the help of webcam. We shall capture images in front of blind peoples .The captured image will be processed through our algorithms which will enhances the image data. The hardware component will have its own database. The processed image is compare with the database in the hardware component .The result after processing and comparing will be converted into speech signals. The headphones guide the blind peoples.
3D scanning technology allows capturing the shape of physical objects and environments digitally. It works by using techniques like laser triangulation, structured light, photogrammetry, or contact-based scanning to obtain high-density 3D measurements. The results can be used for reverse engineering, rapid prototyping, inspection, and analysis. Different scanning methods have advantages and limitations depending on factors like speed, resolution, ability to scan people or outdoor environments, and sensitivity to lighting or surface properties. The document discusses several 3D scanning technologies and their applications in industries like automotive, aeronautics, and entertainment.
Vision System and its application,ProblemsNikhil Chavda
Robotic vision systems allow robots to identify objects, detect people, check quality, and gather information about their surroundings. A typical vision system includes a camera to capture images, a processor to analyze the images, and cabling to transmit the image data. Vision systems enable robots to perform tasks like facial recognition, ensure safety, locate parts, and perform quality control inspections. While lighting, deformation, backgrounds, scale, and movement present challenges, vision systems continue to advance with improvements in areas like insect-inspired design and affordable all-in-one cameras.
This document discusses machine vision and various components of machine vision systems. It describes different types of sensors used in machine vision like cameras, frame grabbers, and describes the process of sensing and digitizing image data through analog to digital conversion, image storage, and lighting techniques. It also discusses image processing and analysis techniques like segmentation, feature extraction and object recognition. Finally, it provides examples of applications of machine vision systems in inspection, identification, and navigation.
concealed weapon detection using digital image processingKongara Sudharshan
This document proposes and describes a method for concealed weapon detection using digital image processing. The method uses both a visual RGB image and an infrared image as inputs. It resizes the images, complements the infrared image, and performs discrete wavelet transform fusion on the images. The fused image is converted to grayscale and binarized before weapon detection is attempted. Challenges include performing accurate detection from a distance while minimizing false alarms. More research is needed to improve detection when clothing is loose.
In response to an increasing threat of terrorism, personal surveillance at security checkpoints, such as airports, railways stations, metro stations etc, is becoming increasingly important. Conventional systems in place at high-security checkpoints include metal detectors for personnel and X-ray systems for hand-carried items. These systems have been very effective, but have a number of shortcomings that will need to be addressed in future systems. Metal detectors can only detect metal targets, such as ordinary handguns and knives. The effectiveness of these detectors can vary depending on the quantity, orientation, and type of metal. Furthermore, no discrimination is possible between simple innocuous items, such as glasses, belt buckles, keys, etc., and actual threats. This leads to a rather high number of nuisance alarms. Modern threats include plastic or ceramic handguns and knives, as well as extremely dangerous items such as “plastic” and liquid explosives. These items cannot be detected with metal detectors.
A fundamentally different security measure is required to handle these threats. One type of system that addresses these concerns “concealed weapon detection using image processing”, which can penetrate clothing barriers to image items concealed by common clothing. This can be accomplished using X-ray imaging systems, and by recently developed millimetre-wave imaging systems, X-ray systems are potentially effective for this purpose.
However, the perceived adverse health effects of X-ray exposure may hamper the public acceptance of these systems. Millimetre waves are high-frequency electromagnetic waves usually defined to be within the 30–300-GHz frequency band. The techniques and systems discussed here could operate at lower microwave frequency bands as well.
Millimetre-wave systems are nonionizing and, therefore, pose no known health hazard at moderate power levels. Millimeter-wave imaging systems are capable of penetrating common clothing barriers to form an image of a person as well as any concealed items. Millimetre-wave systems can be very high resolution due to the relatively short wavelength (1–10 mm).
Image processing involves the alteration and analysis of pictorial information. There are two main methods: optical processing using lenses and electronic processing. Electronic processing can be analog, controlling brightness and contrast, or digital, where images are composed of pixels that can be processed by a computer. Image processing has applications in fields like robotics, medicine, graphics, and satellite imaging. It allows for tasks like image restoration, compression, and segmentation.
A Fast Single-Pixel Laser Imager for VR/AR Headset TrackingPing Hsu
In this work we demonstrate a highly flexible laser imaging system for 3D sensing applications such as in tracking of VR/AR headsets, hands and gestures. The system uses a MEMS mirror scan module to transmit low power laser pulses over programmable areas within a field of view and uses a single photodiode to measure the reflected light...
An Approach for Object and Scene Detection for Blind Peoples Using Vocal Vision.IJERA Editor
This system help the blind peoples for the navigation without the help of third person so blind person can perform its work independently. This system implemented on android device in which object detection and scene detection implemented, so after detection there will be text to speech conversion so user or blind person can get message from that android device with the help of headphone connected to that device. Our project will help blind people to understand the images which will be converted to sound with the help of webcam. We shall capture images in front of blind peoples .The captured image will be processed through our algorithms which will enhances the image data. The hardware component will have its own database. The processed image is compare with the database in the hardware component .The result after processing and comparing will be converted into speech signals. The headphones guide the blind peoples.
3D scanning technology allows capturing the shape of physical objects and environments digitally. It works by using techniques like laser triangulation, structured light, photogrammetry, or contact-based scanning to obtain high-density 3D measurements. The results can be used for reverse engineering, rapid prototyping, inspection, and analysis. Different scanning methods have advantages and limitations depending on factors like speed, resolution, ability to scan people or outdoor environments, and sensitivity to lighting or surface properties. The document discusses several 3D scanning technologies and their applications in industries like automotive, aeronautics, and entertainment.
Vision System and its application,ProblemsNikhil Chavda
Robotic vision systems allow robots to identify objects, detect people, check quality, and gather information about their surroundings. A typical vision system includes a camera to capture images, a processor to analyze the images, and cabling to transmit the image data. Vision systems enable robots to perform tasks like facial recognition, ensure safety, locate parts, and perform quality control inspections. While lighting, deformation, backgrounds, scale, and movement present challenges, vision systems continue to advance with improvements in areas like insect-inspired design and affordable all-in-one cameras.
This document discusses machine vision and various components of machine vision systems. It describes different types of sensors used in machine vision like cameras, frame grabbers, and describes the process of sensing and digitizing image data through analog to digital conversion, image storage, and lighting techniques. It also discusses image processing and analysis techniques like segmentation, feature extraction and object recognition. Finally, it provides examples of applications of machine vision systems in inspection, identification, and navigation.
Password Based Hand Gesture Controlled Robot IJERA Editor
Gesture is a most natural way of communication between human and computer in real system. Hand gesture is
one of the important methods of non-verbal communications for humans. A simulation tool, MATLAB based
colour image processing is used to recognize hand gesture. With the help of wireless communication, it is easier
to interact with the robot. The objective of this project is to build a password protected wireless gesture control
robot using Arduino, RF transmitter and receiver module. The continuous images are processed and the
command signal is sent to the Arduino Uno microcontroller and according to the number of fingers, it sends the
commands to the RF transmitter which is received by the transmitter and is processed at the receiver end which
drives the motor to a particular direction. The robot moves forward, backward, right and left when we show one,
two, three, four fingers (fingers with some red color band or tape) respectively. As soon as the hand is moved
off from the frame immediately it will stop. This can be used for physically disabled people who can’t use their
hands to move the wheel chair. And it can also be used in various military applications where radioactive
substances which can’t be touched by the human hand
Markerless motion capture for 3D human model animation using depth cameraTELKOMNIKA JOURNAL
3D animation is created using keyframe based system in 3D animation software such as Blender and Maya. Due to the long time interval and the need of high expertise in 3D animation, motion capture devices were used as an alternative and Microsoft Kinect v2 sensor is one of them. This research analyses the capabilities of the Kinect sensor in producing 3D human model animations using motion capture and keyframe based animation system in reference to a live motion performance. The quality, time interval and cost of both animation results were compared. The experimental result shows that motion capture system with Kinect sensor consumed less time (only 2.6%) and cost (30%) in the long run (10 minutes of animation) compare to keyframe-based system, but it produced lower quality animation. This was due to the lack of body detection accuracy when there is obstruction. Moreover, the sensor’s constant assumption that the performer’s body faces forward made it unreliable to be used for a wide variety of movements. Furthermore, standard test defined in this research covers most body parts’ movements to evaluate other motion capture system.
This document is a winter project report submitted by Shantanu Bharadwaj on fingerprint recognition. The objective of the project was to verify identities by comparing white and black points extracted from input fingerprints to a database of fingerprints using edge detection and image processing in MATLAB. The report describes converting images to grayscale, introducing MATLAB, presenting code to extract points and compare fingerprints, and simulated results correctly matching and not matching fingerprints. It concludes the method effectively recognizes fingerprints and future work could improve speed, storage, and usability.
Design of Image Projection Using Combined Approach for TrackingIJMER
Over the years the techniques and methods that have been used to interact with the
computers have evolved significantly. From the primitive use of punch cards to the latest touch screen
panels we can see the vast improvement in interaction with the system. There are many new ways of
projection and interaction technologies that can reshape our perception and interaction
methodologies. Also projection technology is very useful for creating various geometric displays. In
earlier generations, the projector technology was used for projecting images and videos on single
screen, using large and bulky setup. To overcome the earlier limitations we are designing “Wireless
Image Projection Tracking”, which is a system that uses IR (Infrared) technology to track the body in
the IR range and uses their movements for image orientation and manipulations like zoom, tilt/rotate,
and scale. We are presenting a method of mapping IR light source position and orientation to an
image. By using this system we can also track single and multiple IR light source positions and also it
can be used effectively to see the image projection in 3D view. Extension in this technology can further
be useful for future tracking capabilities to implement the touch screen feature for commercial
applications.
Digital Image Processing and Edge DetectionSeda Yalçın
This presentation is an introduction for digital image processing and edge detection which covers them on four topic; example of fields that use digital image processing, visibility that depends on human perception, fundamental definition of an image, analysis of edge detection algorithms such as Roberts, Prewitt, Sobel and Laplacian of a Gaussian.
This document is a final report on automation and robotics submitted by Truong Ha Anh to their advisor. The report provides an overview of automation and robotics in intelligent environments, including how robots can be used for tasks like home automation, personal assistance, cleaning, and security. It also discusses autonomous robot control and challenges like dealing with uncertainty. Key topics covered include modeling robot mechanisms, sensor-driven control, deliberative and behavior-based control architectures, and developing intuitive human-robot interfaces.
This document summarizes an industrial robot-vision seminar. It defines a robot and discusses how computer vision can provide accurate measurements for robotic manipulators in real time. It describes the main types of robotics as industrial, medical, and field robotics. Industrial robots are used mainly for automatic manipulation of rigid parts, while medical robots allow for more precise and less invasive surgery. Computer vision can help with accurate robot-object positioning, visualization, measurements, and object recognition. Common vision sensors include cameras, laser scanners, and structured light sensors. Issues include measurement frequency, uncertainty, occlusion, and sensor dimensions.
This document discusses the history and technology of digital images. It begins by defining pixels and describing the two main types of digital images: black and white and color. It then provides a timeline of key developments in digital photography from the 1950s to the 2000s. These developments include the first digital camera in 1975 and the introduction of megapixel sensors and digital cameras for consumers in the 1990s. The document also describes the two main image sensors, CMOS and CCD, and provides examples of how digital image technology is used in fields like medicine, security, and the military. It focuses on the use of infrared technology in construction for detecting moisture, describing how infrared cameras work and the advantages and disadvantages of this approach.
Motion capture is the process of recording movements of humans or objects and translating that data into digital form that can be used in films, games, and other media. It works by tracking markers placed on actors' bodies and using multiple synchronized cameras to triangulate the 3D positions over time. Early motion capture used mechanical exoskeletons connected to joints, but modern optical systems track passive reflective markers with cameras in the infrared spectrum. Optical motion capture is now commonly used in film production due to its accuracy and ability to capture complex performances without wires or sensors restricting movement.
This document summarizes a survey paper on hand gesture recognition using color hex matrices and hidden Markov models. It discusses limitations of current vision-based and data glove-based recognition methods and proposes a solution using a webcam to capture hand images, convert them to RGB matrices, and recognize gestures by comparing changes in the matrices over time using hidden Markov models. The method aims to provide low-cost real-time hand gesture recognition using commonly available hardware and software.
Digital 3D imaging can be accelerated using advances in VLSI technology. High-resolution 3D images can be captured using laser-based vision systems, which produce 3D information insensitive to background illumination and surface texture. Complete images of featureless surfaces invisible to the human eye can be generated. Sensors for 3D digitization include position sensitive detectors and laser sensors. Continuous response position sensitive detectors provide precise centroid measurement while discrete response detectors are slower but more accurate. An integrated sensor architecture is proposed using a combination of these sensors to simultaneously measure color and 3D.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IRJET- A Vision based Hand Gesture Recognition System using Convolutional...IRJET Journal
This document describes a vision-based hand gesture recognition system using convolutional neural networks. The system captures images of hand gestures using a camera, pre-processes the images, and classifies the gestures using a CNN model. The CNN architecture includes convolutional layers, max pooling layers, dropout layers, and fully connected layers. The system was trained on a dataset of images representing 7 different hand gestures. Testing achieved over 90% accuracy in recognizing the gestures. This vision-based approach allows for natural human-computer interaction without physical devices.
2D mapping using omni-directional mobile robot equipped with LiDARTELKOMNIKA JOURNAL
This document describes research on using an omni-directional mobile robot equipped with a LiDAR sensor to perform 2D mapping of indoor environments. The robot uses a Raspberry Pi single board computer to process LiDAR data from a YDLiDAR X4 sensor and send it wirelessly to another computer running ROS. The Hector SLAM algorithm is used to determine the robot's position through scan matching and represent obstacles in an occupancy grid map. Experimental results showed the robot could follow walls using PID control and autonomously construct an accurate map of a room with an error rate of 4.59%.
Mitchell Reifel (pmdtechnologies ag): pmd Time-of-Flight – the Swiss Army Kni...AugmentedWorldExpo
The document discusses 3D imaging technologies and their applications. It provides an overview of different 3D sensing techniques such as stereo vision, structured light, and time-of-flight. Time-of-flight allows for compact solutions and flexible modes. The document outlines the growth of 3D markets from mobile to augmented reality. It argues that time-of-flight will be important for applications like mobile AR as it enables gesture control through depth sensing.
Sensors on 3 d digitization seminar reportVishnu Prasad
The document discusses sensors for 3D digitization. It describes two main strategies for 3D vision - passive vision which analyzes ambient light, and active vision which structures light using techniques like laser range cameras. It then discusses an auto-synchronized scanner that can provide registered 3D surface maps and color data by scanning a laser spot across a scene and detecting the reflected light with a linear sensor, producing registered images with spatial and color information.
The Indian Dental Academy is the Leader in continuing dental education , training dentists in all aspects of dentistry and
offering a wide range of dental certified courses in different formats.for more details please visit
www.indiandentalacademy.com
IRJET- Smart Helmet for Visually ImpairedIRJET Journal
The document describes a smart helmet prototype designed to aid the visually impaired by identifying common real-life objects using computer vision and providing audio descriptions. The system uses a Raspberry Pi, Pi camera, and GPS module. The camera captures video which is processed using an object detection algorithm to identify objects, then a text-to-speech system translates the labels into audio output. It can also use OCR to identify text on road/traffic signs and provide navigation directions to home or enable an SOS function using the GPS. The goal is to help visually impaired users identify objects in real-time through computer vision and audio feedback.
IRJET- Hand Sign Recognition using Convolutional Neural NetworkIRJET Journal
1) The document presents a study on using a convolutional neural network (CNN) to recognize American Sign Language (ASL) alphabets captured in real-time via a webcam.
2) The researchers trained a CNN model on 1600 images of 5 ASL alphabets (E, F, I, L, V) and tested it on 320 unlabeled images, achieving a validation accuracy of 74.8%.
3) While the model showed potential, the researchers acknowledged limitations like overfitting due to the small dataset and noted areas for improvement like recognizing a broader range of ASL letters and full sentences.
Pixel Based Fusion Methods for Concealed Weapon DetectionIJERA Editor
Concealed Weapon Detection(CWD) is the detection of weapons underneath a person’s clothing which is an important obstacle for the security of general public as well as safety of public assets like airports and buildings. Concealed weapons such as handbags , knives and explosives are detected using manual screening procedures. It is desirable to detect the concealed weapons from a far off distance at airports and other secured places. A number of sensors with different phenomenology have been developed to observe objects underneath’s persons clothing. As no single technology provide improved performance in CWD applications, different image fusion schemes based on pixel level is proposed . Image obtained from visual camera does not reveal any information hidden under persons clothing whereas MWM image obtained from MWM (Millimeter Wave Imaging )sensor reveal clothing penetration underneath persons cloth but cannot identify the person. In this paper fusion of MWM image with visible image based on pixels is proposed. Experimental results reveal that fused image can identify the person with concealed weapons. Performance metrics such as standard deviation, entropy and cross entropy is calculated and from simulation results it is observed that PCA based fusion method is similar to DWT based fusion scheme.
The complete human body or the various limb postures are involved in human action. These days,
Abnormal Human Activity Recognition (Abnormal HAR) is highly well noticed and surveyed in many
studies. However, because of complicated difficulties such as sensor movement, positioning, and so on,
as well as how individuals carry out their activities, it continues to be a difficult process. Identifying
particular activities benefits human-centric applications such as postoperative trauma recovery, gesture
detection, exercise, fitness, and home care help. The HAR system has the ability to automate or
simplify most of the people’s everyday chores. HAR systems often use supervised or unsupervised
learning as their foundation. Unsupervised systems operate according to a set of rules, whereas
supervised systems need to be trained beforehand using specific datasets. This study conducts detailed
literature reviews on the development of various activity identification techniques currently being used.
The three methods—wearable device-based, pose-based, and smartphone sensor—are examined in this
inquiry for identifying abnormal acts (AAD). The sensors in wearable devices collect data, whereas the
gyroscopes and accelerometers in smartphones provide input to the sensors in wearable devices. To
categorize activities, pose estimation uses a neural network. The Anomalous Action Detection Dataset
(Ano-AAD) is created and improved using several methods. The study examines fresh datasets and
innovative models, including UCF-Crime. A new pattern in anomalous HAR systems has emerged,
linking anomalous HAR tasks to computer vision applications including security, video surveillance,
and home monitoring. In terms of issues and potential solutions, the survey looks at visionbased HAR.
Password Based Hand Gesture Controlled Robot IJERA Editor
Gesture is a most natural way of communication between human and computer in real system. Hand gesture is
one of the important methods of non-verbal communications for humans. A simulation tool, MATLAB based
colour image processing is used to recognize hand gesture. With the help of wireless communication, it is easier
to interact with the robot. The objective of this project is to build a password protected wireless gesture control
robot using Arduino, RF transmitter and receiver module. The continuous images are processed and the
command signal is sent to the Arduino Uno microcontroller and according to the number of fingers, it sends the
commands to the RF transmitter which is received by the transmitter and is processed at the receiver end which
drives the motor to a particular direction. The robot moves forward, backward, right and left when we show one,
two, three, four fingers (fingers with some red color band or tape) respectively. As soon as the hand is moved
off from the frame immediately it will stop. This can be used for physically disabled people who can’t use their
hands to move the wheel chair. And it can also be used in various military applications where radioactive
substances which can’t be touched by the human hand
Markerless motion capture for 3D human model animation using depth cameraTELKOMNIKA JOURNAL
3D animation is created using keyframe based system in 3D animation software such as Blender and Maya. Due to the long time interval and the need of high expertise in 3D animation, motion capture devices were used as an alternative and Microsoft Kinect v2 sensor is one of them. This research analyses the capabilities of the Kinect sensor in producing 3D human model animations using motion capture and keyframe based animation system in reference to a live motion performance. The quality, time interval and cost of both animation results were compared. The experimental result shows that motion capture system with Kinect sensor consumed less time (only 2.6%) and cost (30%) in the long run (10 minutes of animation) compare to keyframe-based system, but it produced lower quality animation. This was due to the lack of body detection accuracy when there is obstruction. Moreover, the sensor’s constant assumption that the performer’s body faces forward made it unreliable to be used for a wide variety of movements. Furthermore, standard test defined in this research covers most body parts’ movements to evaluate other motion capture system.
This document is a winter project report submitted by Shantanu Bharadwaj on fingerprint recognition. The objective of the project was to verify identities by comparing white and black points extracted from input fingerprints to a database of fingerprints using edge detection and image processing in MATLAB. The report describes converting images to grayscale, introducing MATLAB, presenting code to extract points and compare fingerprints, and simulated results correctly matching and not matching fingerprints. It concludes the method effectively recognizes fingerprints and future work could improve speed, storage, and usability.
Design of Image Projection Using Combined Approach for TrackingIJMER
Over the years the techniques and methods that have been used to interact with the
computers have evolved significantly. From the primitive use of punch cards to the latest touch screen
panels we can see the vast improvement in interaction with the system. There are many new ways of
projection and interaction technologies that can reshape our perception and interaction
methodologies. Also projection technology is very useful for creating various geometric displays. In
earlier generations, the projector technology was used for projecting images and videos on single
screen, using large and bulky setup. To overcome the earlier limitations we are designing “Wireless
Image Projection Tracking”, which is a system that uses IR (Infrared) technology to track the body in
the IR range and uses their movements for image orientation and manipulations like zoom, tilt/rotate,
and scale. We are presenting a method of mapping IR light source position and orientation to an
image. By using this system we can also track single and multiple IR light source positions and also it
can be used effectively to see the image projection in 3D view. Extension in this technology can further
be useful for future tracking capabilities to implement the touch screen feature for commercial
applications.
Digital Image Processing and Edge DetectionSeda Yalçın
This presentation is an introduction for digital image processing and edge detection which covers them on four topic; example of fields that use digital image processing, visibility that depends on human perception, fundamental definition of an image, analysis of edge detection algorithms such as Roberts, Prewitt, Sobel and Laplacian of a Gaussian.
This document is a final report on automation and robotics submitted by Truong Ha Anh to their advisor. The report provides an overview of automation and robotics in intelligent environments, including how robots can be used for tasks like home automation, personal assistance, cleaning, and security. It also discusses autonomous robot control and challenges like dealing with uncertainty. Key topics covered include modeling robot mechanisms, sensor-driven control, deliberative and behavior-based control architectures, and developing intuitive human-robot interfaces.
This document summarizes an industrial robot-vision seminar. It defines a robot and discusses how computer vision can provide accurate measurements for robotic manipulators in real time. It describes the main types of robotics as industrial, medical, and field robotics. Industrial robots are used mainly for automatic manipulation of rigid parts, while medical robots allow for more precise and less invasive surgery. Computer vision can help with accurate robot-object positioning, visualization, measurements, and object recognition. Common vision sensors include cameras, laser scanners, and structured light sensors. Issues include measurement frequency, uncertainty, occlusion, and sensor dimensions.
This document discusses the history and technology of digital images. It begins by defining pixels and describing the two main types of digital images: black and white and color. It then provides a timeline of key developments in digital photography from the 1950s to the 2000s. These developments include the first digital camera in 1975 and the introduction of megapixel sensors and digital cameras for consumers in the 1990s. The document also describes the two main image sensors, CMOS and CCD, and provides examples of how digital image technology is used in fields like medicine, security, and the military. It focuses on the use of infrared technology in construction for detecting moisture, describing how infrared cameras work and the advantages and disadvantages of this approach.
Motion capture is the process of recording movements of humans or objects and translating that data into digital form that can be used in films, games, and other media. It works by tracking markers placed on actors' bodies and using multiple synchronized cameras to triangulate the 3D positions over time. Early motion capture used mechanical exoskeletons connected to joints, but modern optical systems track passive reflective markers with cameras in the infrared spectrum. Optical motion capture is now commonly used in film production due to its accuracy and ability to capture complex performances without wires or sensors restricting movement.
This document summarizes a survey paper on hand gesture recognition using color hex matrices and hidden Markov models. It discusses limitations of current vision-based and data glove-based recognition methods and proposes a solution using a webcam to capture hand images, convert them to RGB matrices, and recognize gestures by comparing changes in the matrices over time using hidden Markov models. The method aims to provide low-cost real-time hand gesture recognition using commonly available hardware and software.
Digital 3D imaging can be accelerated using advances in VLSI technology. High-resolution 3D images can be captured using laser-based vision systems, which produce 3D information insensitive to background illumination and surface texture. Complete images of featureless surfaces invisible to the human eye can be generated. Sensors for 3D digitization include position sensitive detectors and laser sensors. Continuous response position sensitive detectors provide precise centroid measurement while discrete response detectors are slower but more accurate. An integrated sensor architecture is proposed using a combination of these sensors to simultaneously measure color and 3D.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IRJET- A Vision based Hand Gesture Recognition System using Convolutional...IRJET Journal
This document describes a vision-based hand gesture recognition system using convolutional neural networks. The system captures images of hand gestures using a camera, pre-processes the images, and classifies the gestures using a CNN model. The CNN architecture includes convolutional layers, max pooling layers, dropout layers, and fully connected layers. The system was trained on a dataset of images representing 7 different hand gestures. Testing achieved over 90% accuracy in recognizing the gestures. This vision-based approach allows for natural human-computer interaction without physical devices.
2D mapping using omni-directional mobile robot equipped with LiDARTELKOMNIKA JOURNAL
This document describes research on using an omni-directional mobile robot equipped with a LiDAR sensor to perform 2D mapping of indoor environments. The robot uses a Raspberry Pi single board computer to process LiDAR data from a YDLiDAR X4 sensor and send it wirelessly to another computer running ROS. The Hector SLAM algorithm is used to determine the robot's position through scan matching and represent obstacles in an occupancy grid map. Experimental results showed the robot could follow walls using PID control and autonomously construct an accurate map of a room with an error rate of 4.59%.
Mitchell Reifel (pmdtechnologies ag): pmd Time-of-Flight – the Swiss Army Kni...AugmentedWorldExpo
The document discusses 3D imaging technologies and their applications. It provides an overview of different 3D sensing techniques such as stereo vision, structured light, and time-of-flight. Time-of-flight allows for compact solutions and flexible modes. The document outlines the growth of 3D markets from mobile to augmented reality. It argues that time-of-flight will be important for applications like mobile AR as it enables gesture control through depth sensing.
Sensors on 3 d digitization seminar reportVishnu Prasad
The document discusses sensors for 3D digitization. It describes two main strategies for 3D vision - passive vision which analyzes ambient light, and active vision which structures light using techniques like laser range cameras. It then discusses an auto-synchronized scanner that can provide registered 3D surface maps and color data by scanning a laser spot across a scene and detecting the reflected light with a linear sensor, producing registered images with spatial and color information.
The Indian Dental Academy is the Leader in continuing dental education , training dentists in all aspects of dentistry and
offering a wide range of dental certified courses in different formats.for more details please visit
www.indiandentalacademy.com
IRJET- Smart Helmet for Visually ImpairedIRJET Journal
The document describes a smart helmet prototype designed to aid the visually impaired by identifying common real-life objects using computer vision and providing audio descriptions. The system uses a Raspberry Pi, Pi camera, and GPS module. The camera captures video which is processed using an object detection algorithm to identify objects, then a text-to-speech system translates the labels into audio output. It can also use OCR to identify text on road/traffic signs and provide navigation directions to home or enable an SOS function using the GPS. The goal is to help visually impaired users identify objects in real-time through computer vision and audio feedback.
IRJET- Hand Sign Recognition using Convolutional Neural NetworkIRJET Journal
1) The document presents a study on using a convolutional neural network (CNN) to recognize American Sign Language (ASL) alphabets captured in real-time via a webcam.
2) The researchers trained a CNN model on 1600 images of 5 ASL alphabets (E, F, I, L, V) and tested it on 320 unlabeled images, achieving a validation accuracy of 74.8%.
3) While the model showed potential, the researchers acknowledged limitations like overfitting due to the small dataset and noted areas for improvement like recognizing a broader range of ASL letters and full sentences.
Pixel Based Fusion Methods for Concealed Weapon DetectionIJERA Editor
Concealed Weapon Detection(CWD) is the detection of weapons underneath a person’s clothing which is an important obstacle for the security of general public as well as safety of public assets like airports and buildings. Concealed weapons such as handbags , knives and explosives are detected using manual screening procedures. It is desirable to detect the concealed weapons from a far off distance at airports and other secured places. A number of sensors with different phenomenology have been developed to observe objects underneath’s persons clothing. As no single technology provide improved performance in CWD applications, different image fusion schemes based on pixel level is proposed . Image obtained from visual camera does not reveal any information hidden under persons clothing whereas MWM image obtained from MWM (Millimeter Wave Imaging )sensor reveal clothing penetration underneath persons cloth but cannot identify the person. In this paper fusion of MWM image with visible image based on pixels is proposed. Experimental results reveal that fused image can identify the person with concealed weapons. Performance metrics such as standard deviation, entropy and cross entropy is calculated and from simulation results it is observed that PCA based fusion method is similar to DWT based fusion scheme.
The complete human body or the various limb postures are involved in human action. These days,
Abnormal Human Activity Recognition (Abnormal HAR) is highly well noticed and surveyed in many
studies. However, because of complicated difficulties such as sensor movement, positioning, and so on,
as well as how individuals carry out their activities, it continues to be a difficult process. Identifying
particular activities benefits human-centric applications such as postoperative trauma recovery, gesture
detection, exercise, fitness, and home care help. The HAR system has the ability to automate or
simplify most of the people’s everyday chores. HAR systems often use supervised or unsupervised
learning as their foundation. Unsupervised systems operate according to a set of rules, whereas
supervised systems need to be trained beforehand using specific datasets. This study conducts detailed
literature reviews on the development of various activity identification techniques currently being used.
The three methods—wearable device-based, pose-based, and smartphone sensor—are examined in this
inquiry for identifying abnormal acts (AAD). The sensors in wearable devices collect data, whereas the
gyroscopes and accelerometers in smartphones provide input to the sensors in wearable devices. To
categorize activities, pose estimation uses a neural network. The Anomalous Action Detection Dataset
(Ano-AAD) is created and improved using several methods. The study examines fresh datasets and
innovative models, including UCF-Crime. A new pattern in anomalous HAR systems has emerged,
linking anomalous HAR tasks to computer vision applications including security, video surveillance,
and home monitoring. In terms of issues and potential solutions, the survey looks at visionbased HAR.
Robust Motion Detection and Tracking of Moving Objects using HOG Feature and ...CSCJournals
Detection and tracking of moving objects has gained significant importance due to intense technological progress in the field of computer science dealing with video surveillance systems. Human motion is generally nonlinear and non-Gaussian and thus many algorithms are not suitable for tracking. One of the applications to maintain universal security is crowd control. The main problem of video surveillance is continuous monitoring with regard to crime prevention. For security monitoring of live surveillance systems, target identification and tracking strategies can automatically send warnings to monitoring officers. In this paper, we propose a robust tracking of a specified person using the individuals' feature. The proposed method to determine automatic detection and tracking combines Histogram of Oriented Gradient (HOG) feature detection with a particle filter. The Histogram oriented Gradient features are applied to single detection window for the identification of human area, after we use particle filters for robust specific people tracking using color and skin color based on the characteristics of a target individual. We have been improving the implementation, evaluation system of our proposed methods. In our systems, for experiments, we choose structured crowded scenes. From our experimental results, we have achieved high accuracy detection rates and robust motion tracking for specific targets.
This paper represents a survey of various methods of video surveillance system which improves the security. The aim of this paper is to review of various moving object detection technics. This paper focuses on detection of moving objects in video surveillance system. Moving body detection is first important task for any video surveillance system. Detection of moving object is a challenging task. Tracking is required in higher level applications that require the location and shape of object in every frame. In this survey,paper described about optical flow method, Background subtraction, frame differencing to detect moving object. It also described tracking method based on Morphology technique.
Keywords -- Frame separation, Pre-processing, Object detection using frame difference, Optical flow,
Temporal Differencing and background subtraction. Object tracking
A BRIEF OVERVIEW ON DIFFERENT ANIMAL DETECTION METHODSsipij
Researches based on animal detection plays a very vital role in many real life applications. Applications
which are very important are preventing animal vehicle collision on roads, preventing dangerous animal
intrusion in residential area, knowing locomotive behavioural of targeted animal and many more. There
are limited areas of research related to animal detection. In this paper we will discuss some of these areas
for detection of animals.
The main purpose of crowd sensing systems is to extract information based on the crowd in environment. . This paper briefly explains each type of sensors that were widely used in real life situations. Each type of sensors is covered from basic understanding, tools, method of algorithm, their finding, way of conducting test, and results. Such as visual sensor, acoustic sensor, capacitive, infrared, radio-frequency identification and carbon dioxide gas sensors. The review focused on existing system used on human occupancy. The goal is to summarize the existing approach from various types, guides the creation of new systems and point toward future research directions. W. A. F. W. Othman | S. S. N. Alhady | A. A. A. Wahab | M. H. A. Ahmad "Crowd Sensing Systems: A Mini Review" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18619.pdf
This paper contain the study about vibration analysis for gearbox casing using finite element analysis
(FEA).The aim of this paper is to apply ANSYS software to determine the natural frequency of gearbox casing. The
objective of the project is to analyze differential gearbox casing of tata indigo cs vehicle for modal and stress
analysis. The theoretical modal analysis needs to be validated with experimental results from Fourier frequency
transformer (FFT) analysis. The main motivation behind the work is to go for a complete FEA of casing rather than
empirical formulae and iterative procedures.
Design of algorithm for detection of hidden objects from Tera hertz imagesIOSR Journals
This document presents an algorithm for detecting hidden objects in terahertz images using a three-stage approach. The first stage applies edge-based segmentation after smoothing the image. The second stage extracts shape descriptors like Gabor and GLCM texture features from regions of interest. Finally, a Euclidean distance criterion is used to classify objects by comparing a test feature vector to vectors in a database. The algorithm was tested on gun, knife and needle images, achieving a 1.04% detection error rate and 91.9% detection rate compared to ground truths. Potential applications are in security screening to detect weapons and explosives in public areas.
This article proposes a cyber-physical framework to detect active shooters in multi-person scenarios using radio frequency (RF) micro-Doppler signatures. The framework uses convolutional neural networks (CNNs) and data augmentation to address challenges in detecting anomalies like concealed weapons among groups. Experimental RF data was collected from individuals and groups performing activities with and without concealed rifles. Synthetic multi-person signatures were generated from individual signatures and used to augment the training dataset. Results showed the augmented CNN model could accurately detect anomalies in single and multi-person scenarios, aiding security applications.
Active shooter detection in multiple-person
scenario using RF based Machine Vision.
Our proposed potential active shooter detection system
is an application of RF radars that measure micro-Doppler
signatures. As shown in Fig. 1, the micro-Doppler signals
are obtained from the radar output that operates under the
Doppler mode.For this application, we consider that a radar
sensor can be mounted at the entrance of a building or a
monitored area inside a building. g. Thus, in the scenario that
a potential active shooter carrying a rifle/shotgun is walking
toward the door at distance R, the radar transmitted signal
is reflected by the moving target and the reflected signal is
received and processed by the radar receiver (Rx) end. Two
radar output channels are sampled and collected as the I and Q
channel radar outputs BI (t) and BQ(t).
A Survey on Person Detection for Social Distancing and Safety Violation Alert...IRJET Journal
This document discusses methods for monitoring social distancing using video surveillance and deep learning techniques. It describes how faster R-CNN, single shot detector (SSD) and YOLO v3 deep learning models can be used to detect people in video frames and calculate the distance between individuals to determine if social distancing guidelines are being followed. If distances between people are found to be unsafe, the system can send alerts or cautions. The methodology is intended to help prevent the spread of COVID-19 by monitoring adherence to social distancing and triggering warnings if safety violations are detected.
Introduction to image processing-Class NotesDr.YNM
This document provides an introduction and overview of digital image processing. It discusses key concepts such as how digital images are composed of pixels and how image processing is used to enhance images by removing noise and irregularities. It then describes several fields that use digital image processing techniques, including medical imaging using X-rays, gamma rays, and infrared light, as well as applications in remote sensing, fingerprint analysis, and radar imaging.
The document summarizes several papers related to crime detection using computer vision techniques. It discusses approaches for detecting fights in videos using features like STIP and MoSIFT descriptors. It also reviews methods for detecting emotions from body movements and recognizing crowd behaviors in video sequences. Several algorithms are presented, including FSCB for real-time crowd behavior detection and a three-pronged approach using texture, color, and motion history for moving object detection. The document analyzes trajectory-based and pixel-based techniques for unsupervised abnormal event detection.
This document summarizes a student research paper on the design and development of a human following robot. The robot is designed to track and follow a person wearing a custom-made tag. Key components include a camera for visual processing to detect the tag, ultrasonic sensors for obstacle avoidance and maintaining distance, and a magnetometer and encoders for navigation. The system architecture involves separate processing and control units that communicate via serial communication. Various experiments were conducted to test tag detection, distance maintenance, and navigation. Adjustments were made to algorithms and sensor placements to improve performance.
Intelligent Video Surveillance System using Deep LearningIRJET Journal
This document discusses an intelligent video surveillance system using deep learning. It proposes a framework that first detects abnormal human activity in video streams using an effective CNN model. It then tracks detected individuals throughout the video using an ultra-fast object tracker. Feature extraction is performed on consecutive frames using a CNN, and a deep learning model is trained to recognize and detect activities based on temporal changes in frames. The system aims to allow for quick abnormal activity detection with low computational complexity compared to other methods.
Survey on video object detection & trackingijctet
This document summarizes previous work on video object detection and tracking techniques. It discusses research papers that used techniques like active contour modeling, gradient-based attraction fields, neural fuzzy networks, and region-based contour extraction for object tracking. Background subtraction, frame differencing, optical flow, spatio-temporal features, Kalman filtering, and contour tracking are described as common video object detection techniques. The challenges of multi-object data association and state estimation for tracking multiple objects are also mentioned.
Hybrid Approach for Brain Tumour Detection in Image Segmentationijtsrd
In this paper we have considered illustrating a few techniques. But the numbers of techniques are so large they cannot be all addressed. Image segmentation forms the basics of pattern recognition and scene analysis problems. The segmentation techniques are numerous in number but the choice of one technique over the other depends only on the application or requirements of the problem that is being considered. Analysis of cluster is a descriptive assignment that perceive homogenous group of objects and it is also one of the fundamental analytical method in facts mining. The main idea of this is to present facts about brain tumour detection system and various data mining methods used in this system. This is focuses on scalable data systems, which include a set of tools and mechanisms to load, extract, and improve disparate data power to perform complex transformations and analysis will be measured between the way of measuring the Furrier and Wavelet Transform distance. Sandeep | Jyoti Kataria "Hybrid Approach for Brain Tumour Detection in Image Segmentation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33409.pdf Paper Url: https://www.ijtsrd.com/medicine/other/33409/hybrid-approach-for-brain-tumour-detection-in-image-segmentation/sandeep
The technology is growing vastly. Everyone in humanity has some limitations. One of those limitations is visual disability. So we are here with a system that helps the visually disabled people. The framework here contains object detection with voice assistance within an app and a hardware part attached to the blinds stick for distance calculation. The app is designed to support the blind person to explore freely anywhere he wants. The working of the framework begins by surveilling the situations around the user and distinguishing them utilizing a camera. The app will then detect the objects present in the input video frame by using the SSD algorithm comparing it with the trained model. The video captured is partitioned into grids to detect the object obstacle. In this way, the subtleties of the object detected can be achieved and along with it distance measurement can also be calculated using specific algorithms. A Text to Speech TTS converter is utilized for changing over the data about the object detected into an audio speech format. The framework application passes on the scene which the blind people is going in his her territorial language with the snap of a catch. The technologies utilized here makes the framework execution effective. Sabin Khader | Meerakrishna M R | Reshma Roy | Willson Joseph C "Godeye: An Efficient System for Blinds" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31631.pdf Paper Url :https://www.ijtsrd.com/engineering/computer-engineering/31631/godeye-an-efficient-system-for-blinds/sabin-khader
The document presents a proposed system for human detection and rescue operations during disasters using a mobile rescue robot. The system consists of two main units:
1) A robot unit comprising sensors like PIR, gas and temperature sensors, a wireless camera, and a ZigBee module for wireless communication. It is controlled by an Arduino microcontroller.
2) A control unit with a ZigBee USB module for communicating with the robot unit. It allows an operator to manually control and monitor the robot.
The system is designed to allow the robot to autonomously detect trapped humans using its onboard sensors, and transmit the location and sensor data back to the control unit to facilitate rescue operations. The overall
Surveillance Video Based Robust Detection and Notification of Real Time Suspi...csandit
Over recent years, surveillance camera is attractin
g attention due to its wide range of
applications in suspicious activity detection. Curr
ent surveillance system focuses on analysing
past incidents. This paper proposes an intelligent
system for real-time monitoring with added
functionality of anticipating the outcome through v
arious Image processing techniques. As this
is a sensitive matter, human decisions are given pr
iority, still facilitating limited logical
intervention of human resource. This framework dete
cts risk in the area under surveillance. One
such dangerous circumstance is implemented, like a
person with a knife. Here the prediction is
that in the firm places like ATM, Banks, Offices et
c. a person possessing knife is unusual and
likely to cause harmful activities like threatening
, injuring and stabbing. The experiment
demonstrates the effectiveness of the technique on
training dataset collected from distinct
environments. An interface is developed to notify c
oncerned authority that boosts reliability and
overall accuracy.
Similar to DETECTING ITEMS HIDDEN INSIDE A BODY (20)
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Journal For Research
An Aerospace Vehicle is capable of flight both within and outside the sensible atmosphere. An Actuation System is one of the most important Systems of an Aerospace vehicle. This paper study involves detailed study of various controls Actuation System and Design of a typical Hydraulic Actuation Systems. An actuator control system concerned with electrical, electronic or electro mechanical. Actuator control systems may take the form of extremely simple, manually-operated start-and-stop stations, or sophisticated, programmable computer systems. Hydraulic Actuation System contains Electro Hydraulic Actuators, Servo Valves, Feedback Sensing elements, Pump Motor package, Hydraulic Reservoir, Accumulator, various safety valves, Filters etc. The main objective of this study involves design of Hydraulic Actuator and selection of various other components for the Actuation Systems of an Aerospace Vehicle. Design of the system includes design of Hydraulic actuator and also the Modeling and Analysis of actuator using sophisticated Software.
Experimental Verification and Validation of Stress Distribution of Composite ...Journal For Research
This document summarizes an experimental study on the stress distribution of composite beams compared to metal beams under different support conditions. The study aims to analyze and compare the stress distribution of composite and metal beams using finite element analysis software and experimental testing with strain gauges and other tools. Based on a literature review, composite materials offer advantages over metals like lower weight and improved properties. The experimental results on stress distribution of composite and metal beams under different support conditions will be analyzed and compared to the finite element analysis results.
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Journal For Research
Computerized MR of brain image binarization for the uses of preprocessing of features extraction and brain abnormality identification of brain has been described. Binarization is used as intermediate steps of many MR of brain normal and abnormal tissues detection. One of the main problems of MRI binarization is that many pixels of brain part cannot be correctly binarized due to the extensive black background or the large variation in contrast between background and foreground of MRI. Proposed binarization determines a threshold value using mean, variance, standard deviation and entropy followed by a non-gamut enhancement that can overcome the binarization problem. The proposed binarization technique is extensively tested with a variety of MRI and generates good binarization with improved accuracy and reduced error.
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016Journal For Research
The objective of this work is to assess the utility of personalized recommendation system (PRS) in the field of movie recommendation using a new model based on neural network classification and hybrid optimization algorithm. We have used advantages of both the evolutionary optimization algorithms which are Particle swarm optimization (PSO) and Bacteria foraging optimization (BFO). In its implementation a NN classification model is used to obtain a movie recommendation which predict ratings of movie. Parameters or attributes on which movie ratings are dependent are supplied by user's demographic details and movie content information. The efficiency and accuracy of proposed method is verified by multiple experiments based on the Movie Lens benchmark dataset. Hybrid optimization algorithm selects best attributes from total supplied attributes of recommendation system and gives more accurate rating with less time taken. In present scenario movie database is becoming larger so we need an optimized recommendation system for better performance in terms of time and accuracy.
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...Journal For Research
Although precision agriculture has been adopted in few countries, the greenhouse based modern agriculture industry in India still needs to be modernized with the involvement of technology for better production and cost control. In this paper we proposed a multifunction model for smart agriculture based on IoT. Due to variable atmospheric circumstances these conditions sometimes may vary from place to place in large farmhouse, which makes very difficult to maintain the uniform condition at all the places in the farmhouse manually. Soil and environment properties are sensed and periodically sent to cloud network through IoT. Analysis on cloud data is done for water requirement, total production and maintaining uniform environment conditions throughout greenhouse farm. Proposed model is beneficial for increase in agricultural production and for cost control and real time monitoring of farm.
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015Journal For Research
Recommendation system plays important role in Internet world and used in many applications. It has created the collection of many application, created global village and growth for numerous information. This paper represents the overview of Approaches and techniques generated in recommendation system. Recommendation system is categorized in three classes: Collaborative Filtering, Content based and hybrid based Approach. This paper classifies collaborative filtering in two types: Memory based and Model based Recommendation .The paper elaborates these approaches and their techniques with their limitations. The result of our system provides much better recommendations to users because it enables the users to understand the relation between their emotional states and the recommended movies.
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014Journal For Research
This paper describes a command interface for games based on hand gestures and voice command defined by postures, movement and location. The system uses computer vision requiring no sensors or markers by the user. In voice command the speech recognizer, recognize the input from the user. It stores and passes command to the game, action takes place. We propose a simple architecture for performing real time colour detection and motion tracking using a webcam. The next step is to track the motion of the specified colours and the resulting actions are given as input commands to the system. We specify blue colour for motion tracking and green colour for mouse pointer. The speech recognition is the process of automatically recognizing a certain word spoken by a particular speaker based on individual information included in speech waves. This application will help in reduction in hardware requirement and can be implemented in other electronic devices also.
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...Journal For Research
As we know the population of Chandrapur City has increased so far in this years and with that has increased the vehicles causing high traffic volume & rise in pollution. But the transportation system in Chandrapur City is still the same. To reduce the traffic volume & pollution, we have to study & design the new transportation system in Chandrapur City. The system would be as similar to Nagpur City with the implementation of Star City Buses. In this Study we would first compare the speed of various vehicles. Collection of population details of Chandrapur City, approximate number of vehicles running on road, collection of data with respect to Ticket fares in Nagpur City- whether it is according to Kilometers or places to be reached, calculation of Ticket Fares for Chandrapur City on the basis data collected. By all these, the best mode of transport in City can be studied. On the basis of above data collected from various respected fields, we will then proceed for the Design part of urban transport system in Chandrapur City. For Design purpose, firstly we have to mark the centre of the City, when the centre is decided; we will then select the Bus Terminus. From centre of the city, we would prefer to select the routes of the Buses. One route will be for the city side like Jatpura Gate, Pathanpura Gate. One route will be for Ballarpur going road. The other one for Mul going road, then next for Nagpur road. We could decide as many routes once we get the clear idea about all data. By getting all this details, the next step is to design the destination points of Buses. Then we have to design about the Bus bays, to reduce congestion in the particular intersections or Stops of bus. After the design also can suggest for Bus lanes. Implementation of Bus Rapid Transit System (BRT system) is the main aim behind to develop transportation mode of City. The design of the Transport System can be designed with the help of various software’s like AutoCAD and Revit.
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...Journal For Research
This document reviews different techniques for lifting and assembling rotary kiln tyres with shells. It discusses the current manual process using heavy cranes and labor, which is time-consuming and poses safety risks due to the heavy weights involved. The literature review covers various gripping techniques, cost-effective handling procedures, and analyses that can help design a safe lifting suspender for rotary kiln tyres. The conclusion indicates that lifting and assembly approaches as well as grasping principles need further study to develop improved solutions for safely handling the kiln components.
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012Journal For Research
Sandstones from seven different hydroelectric projects have been assessed to compare their water-related properties and engineering parameters and the comprehensive analysis has been presented. The study has been done by categorizing the sandstones in to three categories i.e. weak, moderate & strong sandstones. The study leads to four broad inferences: (1), there could be very large variation between two sandstones; e.g., here, sandstone S2, S4 & S5, vis-à-vis other two strong sandstones, is superior in all respects. (2), the four weak sandstones differ in respect of some – not all – properties and parameters. (3), none of the four weak sandstones is better than the other two in respect of all properties and parameters. (4), moderate sandstone shows higher values of shear strength parameters in comparison to all the sandstones (including stronger sandstones also) except S3 strong sandstone. In respect of individual properties, the grain density of all sandstones is similar, though their bulk densities, apparent porosity and water content show great variation. The weak, moderate and strong sandstones show qualitative difference in their uniaxial compressive strength and wave velocity (compression and shear, both); and the two are directly proportional. The study clearly demonstrates that there is no one-to-one correspondence between any two properties and parameters, but there is a diffused and/ or qualitative relationship between different sandstones, or certain properties and parameters of a particular variant.
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...Journal For Research
Need of rice transplanting machine is growing nowadays because of unique feature seeding in well sequence and well manners. This will save too much efforts of human being. Class of people who uses this kind of machine is farmers and they are having poor economic background. To feed growing population is a huge challenge. Importation of rice will lead to drain out the economy of the country. Mechanization of paddy sector will lead to higher productivity with releasing of work force to other sectors. The objective of this project is to design a paddy transplanting mechanism to transplant paddy seedling by small scale farmers in the country. Hence, this is considered as an activity that needed mechanization. For mechanization the modeling and simulation evaluated for hand operated rice seeding machine, which is help the farmers to planting more and more amount of rice in good quality with low energy consumption and less harm to the environment. India is predominately an agricultural country with rice as one of its main food crop. It Produce about 80 million tons rice annually which is about 22% of the world rice production. Culturally transplanting of young seeding is preferred over direct seeding for better yield and better crop management practice. But this operation requires large amount of manpower (about 400 Man-Hour/ha) and task is very laborious involving working in stopping posture and moving in muddy field.
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009Journal For Research
DakNet, is an ad hoc network and an internet service planted on the applied science, which uses wireless technology to provide an asynchronous digital connectivity, it is the intermediate of wireless and asynchronous service that is the beginning of a technical way to universal broadband connectivity. The major process is it provides the broadband connectivity as wider. This paper broadly describes about the technology, architecture behind and its working principles.
Line following is one of the most important aspects of Robotics. A Line Follower Robot is an autonomous robot which is able to follow either a black or white line that is drawn on the surface consisting of a contrasting color. It is designed to move automatically and follow the made plot line. The path can be visible like a black line on a white surface or it can be invisible like a magnetic field. It will move in a particular direction Specified by the user and avoids the obstacle which is coming in the path. Autonomous Intelligent Robots are robot that can perform desired tasks in unstructured environments without continuous human guidance. It is an integrated design from the knowledge of Mechanical, Electrical, and Computer Engineering. LDR sensors based line follower robot design and Fabrication procedure which always direct along the black mark on the white surface. The robot uses several sensors to identify the line thus assisting the bot to stay on the track. The robot is driven by DC motors to control the movements of the wheels.
The project is to ask college related queries and get the responses through a chatbot an Artificial Conversational Entity. This System is a web application which provides answer to the query of the student. Students just have to query through the bot which is used for chatting. Students can chat using any format there is no specific format the user has to follow. This system helps the student to be updated about the college activities.
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002Journal For Research
Coimbatore (11.0168°N,76.9558°E) is a fast developing cosmopolitan city with large number of industries and educational institutions. The development has lead to a large number of vehicles causing heavy traffic. The traffic congestion at Coimbatore has been a major problem which causes traffic jams and accidents. The major reason for traffic has been the mofussil buses that operate in the city. Around 1300 mofussil buses enter into the city, these buses play an important role in traffic congestion. The best solution is to construct a centralized bus stand at the outskirts of the city. This would reduce the traffic, accidents and also leads to development of the outskirts of the city. A suitable location near the city with sufficient road access to connecting cities has been chosen and the bus terminus has been designed, modeled with all facilities and features.
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001Journal For Research
Cyclone is the most commonly used device to separate dust particles from gas and dust flow. The performance of cyclone separator can be measured in terms of collection efficiency and pressure drop. Parameters like Inlet Flow velocity, the particle size distribution in feed, dimensions of inlet and outlet ducts and cyclone affects the performance of cyclone significantly. Various Mathematical models used for calculation of cut off diameter of separator, flow rate, target efficiency and no. of vortex inside the cyclone to design and study to check the performance of existing cyclone separator. Also new dimensions can be design with help of models. Here, in this study the efficiency achieved with Lapple model cumulatively 86.47%.
During past few years, brain tumor segmentation in CT has become an emergent research area in the field of medical imaging system. Brain tumor detection helps in finding the exact size and location of tumor. An efficient algorithm is proposed in this project for tumor detection based on segmentation and morphological operators. Firstly quality of scanned image is enhanced and then morphological operators are applied to detect the tumor in the scanned image. The problem with biopsy is that the patient has to be hospitalized and also the results (around 15%) give false negative. Scan images are read by radiologist but it's a subjective analysis which requires more experience. In the proposed work we segment the renal region and then classify the tumors as benign or malignant by using ANFIS, which is a non-invasive automated process. This approach reduces the waiting time of the patient.
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...Journal For Research
An extensive study of automotive body corrosion was conducted in Mumbai area to track corrosion performance of currently used materials of construction for automotive, especially cars with low end cost. The study consisted of a wide range of areas, starting from a closed car parking to several coastal and other humid regions such as Juhu Beach, Varsova beach and other adjoining areas. Data such as visible perforations, paint blisters, and surface rust were seen especially at vulnerable areas such as doors, mudguards, bonnet areas etc. Also, a comparison was done with low cost cars built with normal steel with those built using galvanized steels.
The main objective of our work is to deliver the goods at proper time by an unmanned drone. An Autonomous drone for delivering the goods such as bombs, medical kids, and foods mainly for military uses. This drone was used for dispatching the bombs and armed guns in battle field. And it is also used for delivering the medicines and foods for soldiers in our country borders.
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024Journal For Research
Since the population of the world is aging rapidly, how to provide appropriate health care to the elderly and unwell people becomes an important issue and draws high attention from medical, academic and industrial fields of the society. The Internet of Things (IoT) drives the evolution of the Internet and is regarded as a great potential to improve quality of life for the surging number of elderly people, significantly. As Android operating system gains immense popularity nowadays, it is a trend to make use of it for the wider access of IoT utility. This project presents a health monitoring system prototype based on IoT, with the increasing use of sensors by medical devices, remote and continuous monitoring of a patient’s health. This network of sensors and other mobile communication devices referred to as the Internet of Things for Medical Devices (IoT-MD), is poised to revolutionize the functioning of the healthcare industry. Untimed medicine administration can always show adverse effects on the health of the patients. The proposed system is designed to help these patients to take the required medicine in the right proportion at the right time. The basic ideology is integrating the principle of IoT with weight-based slot sensing on a normal pillbox. To make it more state-of-the-art, it is inbuilt with a Wi-Fi module for alerting the patient and also the chemist at the needed instant using IoT.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Diana Rendina
Librarians are leading the way in creating future-ready citizens – now we need to update our spaces to match. In this session, attendees will get inspiration for transforming their library spaces. You’ll learn how to survey students and patrons, create a focus group, and use design thinking to brainstorm ideas for your space. We’ll discuss budget friendly ways to change your space as well as how to find funding. No matter where you’re at, you’ll find ideas for reimagining your space in this session.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
1. Journal for Research| Volume 01| Issue 12 | February 2016
ISSN: 2395-7549
All rights reserved by www.journalforresearch.org 1
Detecting Items Hidden Inside a Body
Mr. Sanjay Nag Ms. Nabanita Basu
Research Scholar Research Scholar
Department of Computer Science & Engineering Department of Computer Science & Engineering
University of Calcutta University of Calcutta
Prof.(Dr.) Samir Kumar Bandyopadhyay
Professor
Department of Computer Science & Engineering
University of Calcutta
Abstract
People sometimes hide contraband inside body cavities. For instance, prison inmates and visitors may hide money or cell phones
this way. Smugglers may carry drugs, and terrorists may conceal explosives inside the body. The paper proposed a method for
detecting hidden item inside human body. It can detect both metal and non-metal objects and display them as images on a video
screen.
Keywords: Concealed Weapon Detection, Color image, and IR image
_______________________________________________________________________________________________________
I. INTRODUCTION
A weapon is any object that can do harm to another individual or group of individuals. This definition not only includes objects
typically thought of as weapons, such as knives and firearms, but also explosives, chemicals, etc. so this harmful things need to
be detect for securing general public as well as public assets like airports and buildings etc. Already used manual screening
procedure sometimes gives wrong alarm indication, and fails when the object is not in the range of security personnel as well as
when it is impossible to manage the flow of people through a controlled procedure. It also disappoints us when we try to identify
a person who is the victim of an accident in future. We have recently witnessed the series of bomb blasts in Mumbai, Delhi, and
Guwahati etc. Bombs went off in buses and underground stations. And killed many and left many injured and left the world in
shell shock and the Indians in terror. This situation is not limited to India but it can happen or already happened anywhere and
anytime in the world. People think bomb blasts can’t be predicted before handled. In all of these cases CWD by scanning the
images gives satisfactory results. But no single sensor technology can provide acceptable performance. So we try to bring the
eventual deployment of automatic detection and recognition of concealed weapons. It is a technological challenge that requires
innovative solutions in sensor technologies and image processing. The problem also presents challenges in the legal arena; a
number of sensors based on different phenomenology as well as image processing support are being developed to observe
objects underneath people’s clothing. Now image fusion has been identified as a key technology to achieve improved CWD
procedures. In our current work we focus on fusing visual and low cost IR images for CWD.
Infrared images are depends on the temperature distribution information of the target to form an image. Usually the theory
follows here is that the infrared radiation emitted by the human body is absorbed by clothing and then re-emitted by it. In the IR
image the background is almost black with little detail because of the high thermal emissivity of body. The weapon is darker than
the surrounding body due to a temperature difference between it and the body (it is colder than human body). The visual image is
a mental image that is similar to a visual perception. The resolution in the visual image is much higher than that of the IR image.
It is nothing but a RGB image that supports human visual perception. But there is no useful information on the concealed
weapon in the visual image. The human visual system is very sensitive to colours. To utilize this ability if we apply this image
with other image in fusion technique we get a better fused image that helps for detection.
People sometimes hide contraband inside body cavities. For instance, prison inmates and visitors may hide money or cell
phones this way. Smugglers may carry drugs, and terrorists may conceal explosives inside the body. A weapon is any object that
can do harm to another individual or group of individuals. This definition not only includes objects typically thought of as
weapons, such as knives and firearms, but also explosives, chemicals, etc. Contraband items include illegal drugs and any other
item that is controlled or forbidden by a particular law enforcement or corrections agency. Consequently, contraband may
include tobacco, any metallic object that can be used to defeat security constraints, drug paraphernalia, etc.
For the computer to recognize a specific weapon or threat item, the computer will have to compare the threat item with an
electronic catalog of images of uniquely-shaped threat items, and this includes images for all possible unique orientations for
each unique threat item. Only catalogued images of uniquely-shaped threat items are required for comparison because no new
information is obtained if a catalogued image is only a scaled replica of another catalogued image. Unique orientations, on the
other hand, are important because a weapon may have a significantly different appearance if viewed from the sides, the top, etc.
2. Detecting Items Hidden Inside a Body
(J4R/ Volume 01 / Issue 12 / 001)
All rights reserved by www.journalforresearch.org 2
Concealed weapons can be detected through various techniques which are Image Processing, Active and Passive millimeter -
wave sensors, Phased Antenna array, and explosives can be detected through Signal Processing and Pattern Recognition. For the
perfect effectiveness and visualization, image processing methods are generally opting.
II. REVIEW WORKS
Imaging techniques based on a combination of sensor technologies and processing will potentially play a key role in addressing
the concealed weapon detection problem. One critical issue is the challenge of performing detection at a distance with high
probability of detection and low probability of false alarm. Yet another difficulty to be surmounted is forging portable
multisensory instruments. Also, detection systems go hand in hand with subsequent response by the operator, and system
development should take into account the overall context of deployment [1]. Concealed Weapon using the radar image are
proposed by Yu-Wen Chang ET all [2, 3] in which drawbacks such as glint and specular reflection or artifacts such as coherent
interference these problems should be able to be overcome.
There are many layers in processing of image which scan out the real picture of concealed material. Sensors are also very
effective for the security. It helps to complete the aim of detection of weapons, explosive, chemical threats. A pulse synthesized,
time domain approach relaying on Stepped Frequency Continuous Wave (SFCW) radar implemented in a phased array of
antenna is proposed. Both the location of items (that support appreciable induced surface currents) concealed on the human body
and the nature of these concealed item [3].
In order to detect contraband, it is important to understand their characteristics. Gozani lists the properties that are of greatest
interest in identifying both drugs and explosives. For examples, drugs have following constitutes: carbon (high), oxygen (low),
chlorine (moderate), and density (moderate). On the other hand for the explosives we get: carbon (moderate), nitrogen
(high/moderate), oxygen (very high/ high) and density (very high). Nitrogen based explosives, rich in nitrogen (bonding agent)
and oxygen (oxidizing agent) are commonly used due to their high power. The explosives also contain carbon and sometimes
hydrogen as fuel. Usually, explosive device consist of two main components: an explosive agent and a detonating system.
The blasting material consists primarily of inorganic nitrates and carbonaceous fuels and detonators are made of metallic tubes or
shells with an initiating explosive. In case of plastic explosives, they can self -detonate due to their unstable nature. There are
more than one hundred types of military and civilian explosives and around twenty commonly used drugs. A number of
explosives characteristics can be used for their detection [4].
A new algorithms proposed by Zhiyun Xue et all[6] in which fuse a color visual image and a corresponding IR image for such
a concealed weapon detection application in which they have great success. So fusion is an important step, we use here DWT
fusion , some more improve method are there such as Chu-Hui Lee et all[13] produce a easy applications to adjust for anytime,
and anywhere you like, make sure that may work and take a photograph nicely. The DWT fusion methods provide
computationally ancient image fusion techniques various fusion rules for the selection and combination of sub band coefficients
increase the quality perceptual and quantitatively measurable of image fusion in specific applications. For binaries the fused
image there are several method[8-10] Otsu method are chosen because this method are global method and effective for this type
of image. The concept of small area removal is taken from [11-14]. However, based on biological research results, the human
visual system is very sensitive to colours. To utilize this ability, some researchers map three individual monochrome
multispectral images to the respective channels of an RGB image to produce a false color fused image. In many cases, this
technique is applied in combination with another image fusion procedure. Such a technique is sometimes called color composite
fusion. we present a new technique to fuse a color visual image with a corresponding IR image for a CWD application.
III.PROPOSED METHOD
In our proposed technique for CWD we consider two types of image – a visual image and an IR image. Visual image is nothing
but an RGB image which has three main colour components Red, Green and Blue. Since the human visual system is very
sensitive to colours this image creates a natural perception of an object to human vision but not helps so much in the detection of
concealed weapon. For this we consider IR image as second input. It basically depends on high thermal emissivity of the body.
Basically the infrared radiation emitted by the body is absorbed by clothing and then re-emitted by it, is sensed by the infrared
sensors. Due to difference in thermal emissivity we can realize the hidden object but since the background is almost black this
image cannot help in CWD alone. The prosed algorithm is given below.
Algorithm for Detecting Concealed Weapon:
Input: X Ray Image
Output: Identification of Concealed weapon
1) Step1: Read the input color or grayscale image.
2) Step2: Converts input colour image in to grayscale image which is done by forming a weighted sum of each three (RGB)
component, eliminating the saturation and hue information while retaining the luminance and the image returns a grayscale
colour map.
3) Step3: Resize this image in to 200 × 200 image matrix.
3. Detecting Items Hidden Inside a Body
(J4R/ Volume 01 / Issue 12 / 001)
All rights reserved by www.journalforresearch.org 3
4) Step4: Filters the multidimensional array with the multidimensional filter. Each element of the output an integer or in array,
then output elements that exceed the certain range of the integer type is shortened, and fractional values are rounded.
5) Step5: Add step2, step4 image and an integer value 45 and pass it in to a median filter to get the resultant enhanced image.
6) Step6: Computes a global threshold that can be used to convert an intensity image (Step5) to a binary image with a
normalized intensity value which lies in between range 0 and 1.
7) Step7: Compute watershed segmentation by mat lab command watershed (step6 image).
8) Step8: Compute the morphological operation by two mat lab command imerode and imdilate and strel with arbitrary shape.
9) Step9: Store the size of the step 8 image into var1 and var2 i.e no. Of rows and column in pixels by[var1 var2]=size(step8
image)
10) Step10: For i=1:1:var1 do
11) Step11: For j=1:1:var2 do
12) Step12: If step8 image (i,j) == 1 do
13) Step13: step2 image (i,j) = 255
14) Step14: Else do
15) Step15: step2 image (i,j) = step2 image (i,j) * 0.3
16) Step16: End If
17) Step17: End For
18) Step18: End For
19) Step19: Convert in to binary image and traces the exterior boundaries of objects, as well as boundaries of holes inside these
objects, in the binary image and into an RGB color image for the purpose of visualizing labeled regions.
20) Step20: Show only tumor portion of the image by remove the small object area.
21) Step21: Compute edge detection using sobel edge detection technique.
/*Algorithm for Area Calculation of Concealed Weapon*/
22) Step22:- Read the input color or grayscale image.
23) Step23:- Converts input colour image in to grayscale image which is done by forming a weighted sum of each three (RGB)
component, eliminating the saturation and hue information while retaining the luminance and the image returns a grayscale
colour map and store it into variable I.
24) Step24:- Compute numbers of rows and column in pixels by [r2 c2] = size (I)
25) Step25:- Initialize a variable A=0
For i=1:1:r2
Do Step4:- For j=1:1:c2
Do
If I (i,j)==255
Do A=A+0
Else
Do A=A+1
End IF
End For
End For
26) Step 26:-Display the area A and store the value in buffer for future processing.
27) Step 27: Take a visual image (basically, RGB image) and an infrared (IR) image as input from Disk
28) Step 28: Resize this two image so that they have same size.
29) Step 29: Combine i.e. add resized Visual and IR image.
30) Step 30: Complement the IR image.
31) Step 31: Combine i.e. add resized Visual image and complemented IR image.
32) Step 32: Convert the visual RGB image to its HSV format.
33) Step 33: Perform DWT fusion on Step 5’s combined image and Step 6’s converted HSV image.
34) Step 34: Convert the fused image into its gray scale format.
35) Step 35: Binarize the Fused image.
36) Step 36: Detect the weapon from that image.
It is a technique of fusing the visual and IR image after registration. We find that the body is brighter than the background in
the IR image. Also background is almost black and gives little details because of the high thermal emissivity of body. Also
weapon is darker than the surrounding body due to a temperature difference between it and the body (it is colder than human
body). The resolution in the visual image is much higher than that of the IR image, but there is no information on the weapon in
the visual image. It is shown in Figure 1.
4. Detecting Items Hidden Inside a Body
(J4R/ Volume 01 / Issue 12 / 001)
All rights reserved by www.journalforresearch.org 4
a) Visual image b) IR image c) Fused image with visible weapon d) Detected image with weapon highlighted
Fig. 1: Concealed weapon detection
Fig. 2: RGB image Fig. 3: IR image Fig. 4: Gray image
Fig. 5: Combined image Fig. 6: Complemented IR Fig. 7: Combined1 image
Fig. 8: HSV image Fig. 9: Fused image Fig. 10: Fused Gray Image
Fig. 11: Weapon in binary image Fig. 12: Weapon in visual image Fig. 13: Contour of the Weapon image
Two images in the same pose visual RGB image and IR image are shown in figure 2 and figure 3. Resize these two types of
image because image fusion and addition are not able to perform if the sizes are not same. Combine basically add visual image
and IR image and the result is shown in figure 4.
5. Detecting Items Hidden Inside a Body
(J4R/ Volume 01 / Issue 12 / 001)
All rights reserved by www.journalforresearch.org 5
Actually we want to detect the hiding details from figure 5 but image from figure 4 is hazy, so we do not get enough
information from figure4. Complement the IR image which is use full in the next operation and this complement image is shown
in figure 6. IR image lies the intensity between 0 to 255 intensity thus complement means subtracting all matrix component from
255 and we get complemented form or reverse form of the IR image. Then add visual image and complemented IR image which
is shown in figure 7.
We do these steps because in this step difference between hiding details and man are recognizable. Then we convert IR image
into HSV colour model and it is shown in figure8 because components of IR image are all correlated with the amount of light
hitting the object, and therefore with each other, image descriptions in terms of those components make object discrimination
difficult. Descriptions in terms of hue/lightness/saturation are often more relevant. After converting HSV model the image is
now three components. Now we can use fusion technique because two images have the same dimension with same size. Then we
use DWT fusion technique between HSV color image and combined image is shown in figure 9. The discrete wavelet transform
DWT is a spatial frequency decomposition that provides a flexible multi resolution analysis of an image. In wavelet
transformation due to sampling, the image size is halved in both spatial directions at each level of decomposition process thus
leading to a multi1resolution signal representation. The advantages of image fusion over visual comparison of multi-modality
are: (a) the fusion technique is useful to correct for variability in orientation, position and dimension; (b) it allows precise
anatomic1physiologic correlation; and (c) it permits regional quantisation. Many image processing like de-noising, contrast
enhancement, edge detection, segmentation, texture analysis and compression can be easily and successfully performed in the
wavelet domain. Wavelet techniques thus provide a powerful set of tools for image enhancement and analysis together with a
common framework for various fusion tasks. Applying fusion technique image sharpness and contrast enhanced. Then this fused
image converted into gray scale image is shown in figure 9.
This steps is required for the next step in which we use a binarization technique. There are several binarization techniques
among them Otsu, Bernsen, savala , th-mean, niblack and iterative partitioning as a framework method are showing good result
for this type of image. Here we use Otsu method which is a global Thresholding method i.e threshold value are calculated locally
and get the result, no extra threshold value is added here. Extract this weapon portion by calculating all connected area
component then remove too small component according to the area values. This only weapon portion binary image is shown in
figure 10. Let us we want to show the weapon in the actual RGB visual image. The weapon binary images are stored into three
different components because we want multiply it with three dimensional RGB image. Multiply individual element to element
between two matrixes. In this step we detect weapon with visual RGB image is shown in figure 11.
Contour detection is used to detect edges of weapon from the weapon binary image. Edge detection refers to the process of
identifying and locating sharp discontinuities in an image. The discontinuities are abrupt changes in pixel intensity which
characterize boundaries of objects in a scene. There is an extremely large number of edge detection operators available, each
designed to be sensitive to certain types of edges. Here we use canny edge detection techniques. The Canny edge detection
algorithm is known to many as the optimal edge detector. Canny’s edge detection algorithm is computationally more expensive
compared to Sobel, Prewitt and Robert’s operator. However, the Canny’s edge detection algorithm performs better than all these
operators under almost all scenarios. This contour detection of concealed weapon is shown in figure 12. Then this binarizes
contour image are divided into three component and multiply as before and get contour with visual RGB image which is shown
in figure 13 where we can see the concealed weapon under person clothes easily.
IV.CONCLUSION
In this paper we introduce a color image fusion technique for CWD where we fuse a visual RGB image and IR image. We can
able to detect the weapon concealed under person’s clothes and bags. But infrared radiation can be used to show the image of a
concealed weapon only when the clothing is tight, thin, and stationary. For normally loose clothing, the emitted infrared radiation
will be spread over a larger clothing area, thus decreasing the ability to image a weapon.
REFERENCES
[1] Hua-Mei Chen, Seungsin Lee, Raghuveer M. Rao, Mohamed-Adel Slamani, and Pramod K. Varshney. : A tutorial overview of development in imaging
sensors and processing. IEEE SIGNAL PROCESSING MAGAZINE, pp.52-61, MARCH 2005.
[2] Yu-Wen Chang ; Michael Johnson. : Portable Concealed Weapon Detection Using Millimeter Wave FMCW Radar Imaging. Federal funds provided by the
U.S. Department of Justice August 30, 2001.
[3] Z. Xue, R. S. Blum, and Y. Li. : Fusion of Visual and IR Images for Concealed Weapon Detection1. U. S. Army Research Office under grant number
DAAD19-00-1-0431, pp 1198-1205.
[4] Sudipta Roy and Prof. Samir K. Bandyopadhyay. : Visual Image Based Hand Recognitions. Asian JournalOf Computer Science And Information
Technolog(AJCSIT)y1:4 (2011), pp.106 – 110. http://innovativejournal.in/index.php/ajcsit/article/view/94
[5] Mohamed-Adel Slamani , Pramod K. Varshney , David D. Ferris. : Survey of Image Processing Techniques Applied to the Enhancement and Detection of
Weapons in MMW Data. SPIE Vol. 4719 (2002).
[6] Zhiyun Xue, Rick S. Blum. : Concealed Weapon Detection Using Color Image Fusion. ISIF, pp-622-627,2003.
[7] R. C. Gonzalez, R. E. Woods. : Digital Image Processing. Second Edition, Prentice Hall, New Jersey 2002.
[8] Otsu, N.: A threshold selection method from gray-level histogram. IEEE Trans. Syst. Man Cybern. 9, 62–66 (1979)
[9] Niblack,W.: An Introduction to Digital Image Processing. pp. 115–116. Prentice Hall, Eaglewood Cliffs (1986)
[10] Sauvola, J., Pietikainen, M.: Adaptive document image binarization. Pattern Recogn. 33(2), 225–236 (2000)
6. Detecting Items Hidden Inside a Body
(J4R/ Volume 01 / Issue 12 / 001)
All rights reserved by www.journalforresearch.org 6
[11] Manjusha Deshmukh, Udhav Bhosale.: Image Fusion and Image Quality Assessment of Fused Images. International Journal of Image Processing (IJIP), pp.
484-508, Volume (4): Issue (5).
[12] M. Aguilar, and J. R. New. : Fusion of multi-modality volumetric medical imagery. ISIF 2002, pp. 1206-1212.
[13] Sudipta Roy, Prof. Samir K. Bandyopadhyay, “Contour Detection of Human Knee”, International Journal of Computer Science Engineering and
Technology (IJCSET) ,September 2011 , Vol 1, Issue 8,pp. 484-487.
[14] Chu-Hui Lee and Zheng-Wei Zhou . : Comparison of Image Fusion based on DCT-STD and DWT-STD. Proceedings of the International Multiconference
of Engineers and computer scientists 2012, vol me, IMECS 2012, Hong Kong.