Drone is designed to inspect whether the rule of wearing the facemask is practiced strictly or not in crowded place and to predict ripening stage of banana.
Face Mask Detection And Attendance SystemDarsh Jain
The Current COVID-19 pandemic has got the world to a halt and took everyones attention, as it was a global pandemic the world knew about it. But some underdeveloped nations suffer from viral outbreaks every year. To protect ourselves from these viral outbreaks there is a need for a continuous supply of Sanitizers and face masks to maintain personal hygiene. To help such nations and give some contribution to the world, a novel idea of Face Mask Detection and Attendance System has been proposed in this paper. Also, the various techniques that can be used for facial recognition and object detection, like the HAAR cascade method, Machine learning Algorithms, Deep Learning, etc. are discussed.
Face mask detection using convolutional neural networks articleSkillPracticalEdTech
This project explains a method of building a Face Mask Detector using Convolutional Neural Networks (CNN) Python, Keras, Tensorflow, and OpenCV. With further improvements, these types of models could be integrated with CCTV or other types of cameras to detect and identify people without masks. With the prevailing worldwide situation due to the COVID-19 pandemic, these types of systems would be very supportive for many kinds of institutions around the world.
People Monitoring and Mask Detection using Real-time video analyzingvivatechijri
People Counting and mask detection based on video is an important field in a Computer Vision. There is growing interest in video-based solutions for people monitoring and counting in business and security applications using Computer Vision technology. It has been effectively used in many Artificial Intelligence fields. Compareing to normal sensor based solutions the one with video based allows more flexible performance, improved functionalities with lower costs. The system with people counter program requires more processing because that deals with real-time video, so this particular proposed technique converts a color image into binary in order to minimize data of image. Reducing processing time is an important term in Software Engineering to build a good working system. People counting methods based on head detection and tracking to evaluate the total number of people who move under an overhead camera and check whether that people are wearing a mask or not. There basically four main features in this proposed system: People counting, Mask detection, Alarm alert and Scan ID. Based on tracking of head, this method uses the crossing-line judgment to determine whether the particular head object will get counted or not to be counted. The two main challenges overcome in this system are: tough estimation of the background scene and the number of persons in merge split scenarios. A technique for masked face detection using three different steps of estimating eye line detection, facial part detection and eye detection is used in this system. On exceeding the count of people or in case mask is not worn then alarm gets alerted
Face Mask Detection And Attendance SystemDarsh Jain
The Current COVID-19 pandemic has got the world to a halt and took everyones attention, as it was a global pandemic the world knew about it. But some underdeveloped nations suffer from viral outbreaks every year. To protect ourselves from these viral outbreaks there is a need for a continuous supply of Sanitizers and face masks to maintain personal hygiene. To help such nations and give some contribution to the world, a novel idea of Face Mask Detection and Attendance System has been proposed in this paper. Also, the various techniques that can be used for facial recognition and object detection, like the HAAR cascade method, Machine learning Algorithms, Deep Learning, etc. are discussed.
Face mask detection using convolutional neural networks articleSkillPracticalEdTech
This project explains a method of building a Face Mask Detector using Convolutional Neural Networks (CNN) Python, Keras, Tensorflow, and OpenCV. With further improvements, these types of models could be integrated with CCTV or other types of cameras to detect and identify people without masks. With the prevailing worldwide situation due to the COVID-19 pandemic, these types of systems would be very supportive for many kinds of institutions around the world.
People Monitoring and Mask Detection using Real-time video analyzingvivatechijri
People Counting and mask detection based on video is an important field in a Computer Vision. There is growing interest in video-based solutions for people monitoring and counting in business and security applications using Computer Vision technology. It has been effectively used in many Artificial Intelligence fields. Compareing to normal sensor based solutions the one with video based allows more flexible performance, improved functionalities with lower costs. The system with people counter program requires more processing because that deals with real-time video, so this particular proposed technique converts a color image into binary in order to minimize data of image. Reducing processing time is an important term in Software Engineering to build a good working system. People counting methods based on head detection and tracking to evaluate the total number of people who move under an overhead camera and check whether that people are wearing a mask or not. There basically four main features in this proposed system: People counting, Mask detection, Alarm alert and Scan ID. Based on tracking of head, this method uses the crossing-line judgment to determine whether the particular head object will get counted or not to be counted. The two main challenges overcome in this system are: tough estimation of the background scene and the number of persons in merge split scenarios. A technique for masked face detection using three different steps of estimating eye line detection, facial part detection and eye detection is used in this system. On exceeding the count of people or in case mask is not worn then alarm gets alerted
This paper presents the development of a camera-based assistive text reading framework to help blind persons read text labels and product packaging from hand-held objects in their daily lives. Recent developments in computer vision, digital cameras, and portable computers make it feasible to assist these individuals by developing camera-based products that combine computer vision technology with other existing commercial products such optical character recognition (OCR) systems. To automatically extract the text regions from the object, we propose a artificial neural network algorithm by learning gradient features of stroke orientations and distributions of edge pixels in an Adaboost model. Text characters in the localized text regions are binarized for processing the algorithm and the text characters are recognized by off-the-shelf OCR (Optical Character Recognition) and other process involved . Now the binarized signals are converted to audible signal. The working principle is as follows first the respected image will be captured and then it is converted to binary signals. Now the image is diagnosed to find whether the text is present in the image. Secondly, if the text is present, then the object of interest is detected. The respected text of the image is recognized and then converted to audible signals. Thus the recognized text codes are given as speech to the user.
Development of a Secured Door Lock System Based on Face Recognition using Ras...ijtsrd
Security is an important part of everyday life. The main aim of the system is to develop a secured door lock system. The system consists of three sections. The first section is the face recognition system that is based on Haar like features detection method and Local Binary Pattern LBP recognition algorithm. The second section is the password security system. And the last section is the alert system through GSM module. The system is composed by the combination of face recognition security system, password security system and the alert system through the GSM module. In this system, the iteration used in face recognition system is reduced by using Local Binary Pattern LBP algorithm. In saving time, the processing time of this system, therefore, is better than that of the normal system. Soe Sandar | Saw Aung Nyein Oo "Development of a Secured Door Lock System Based on Face Recognition using Raspberry Pi and GSM Module" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25280.pdfPaper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/25280/development-of-a-secured-door-lock-system-based-on-face-recognition-using-raspberry-pi-and-gsm-module/soe-sandar
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...YogeshIJTSRD
This paper proposes a Smartphone based system for the detection of drowsiness in automotive drivers. The proposed system uses three stage drowsiness detection technique. The first stage uses the percentage of eyelid closure PERCLOS which is obtained by capturing images with the front camera of the Smartphone with a modified eye state classification method. The system uses near infrared lighting for illuminating the face of the driver during night driving. The second step uses the voiced to the unvoiced ratio VUR obtained from the speech data from the microphone, in the event PERCLOS crosses the threshold. The VUR is also compared with a threshold and if it is a value greater than that of the threshold, it moves on to the next verification stage. In the final verification stage, touch response is required within the stipulated time to declare whether the driver is drowsy or not and subsequently sound an alarm. To awake the driver, a vibrating mechanism is done and also the live GPS location is also sent to an emergency contact. We have studied eight other reference papers for the literature review. The system has three advantages over existing drowsiness detection systems. First, the three stage verification process makes the system more reliable. The second advantage is its implementation on an Android smart phone, which is readily available to most drivers or cab owners as compared to other general purpose embedded platforms. The third advantage is the use of SMS service to inform the control room as well as the passenger regarding the loss of attention of the driver. Abishek K Biju | Godwin Jolly | Asif Mohammed C A | Dr. Paul P Mathai | Derek Joseph "A New Proposal for Smartphone-Based Drowsiness Detection and Warning System for Automotive Drivers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45083.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/45083/a-new-proposal-for-smartphonebased-drowsiness-detection-and-warning-system-for-automotive-drivers/abishek-k-biju
Iot attendance system using fingerprint module AjinkyaMore29
An Internet of Things (IoT) based portable biometric
attendance system can prove to be of great value to educational institutions in
this regard as it proves to be highly efficient and secure. The cost involved in
making this system is quite less, when compared to conventional biometric
attendance system. The use of cloud computing to store the attendance records
makes all the data easy to access and retrieve as end when required by the
teachers. The use of fingerprint scanner ensures the reliability of the attendance
record.
INTRODUCTION
FACE RECOGNITION
CAPTURING OF IMAGE BY STANDARD VIDEO CAMERAS
COMPONENTS OF FACE RECOGNITION SYSTEMS
IMPLEMENTATION OF FACE RECOGNITION TECHNOLOGY
PERFORMANCE
SOFTWARE
ADVANTAGES AND DISADVANTAGES
APPLICATIONS
CONCLUSION
This application was design with help of OpenCv and C#.
Facial recognition (or face recognition) is a type of bio-metric application that can identify a specific individual in a digital image by analysing and comparing patterns.
Face recognition software is based on the ability to first recognize faces, which is a technological feat in itself. If we look at the mirror, we can see that your face has certain distinguishable landmarks. These are the peaks and valleys that make up the different facial features.
This application take picture of your face and after storing it.
Then it start identifying all face which are store in database.
Face Detection and Recognition System (FDRS) is a physical characteristics recognition technology, using the inherent physiological features of humans for ID recognition. The technology does not need to be carried about and will not be lost, so it is convenient and safe for use
This paper presents the development of a camera-based assistive text reading framework to help blind persons read text labels and product packaging from hand-held objects in their daily lives. Recent developments in computer vision, digital cameras, and portable computers make it feasible to assist these individuals by developing camera-based products that combine computer vision technology with other existing commercial products such optical character recognition (OCR) systems. To automatically extract the text regions from the object, we propose a artificial neural network algorithm by learning gradient features of stroke orientations and distributions of edge pixels in an Adaboost model. Text characters in the localized text regions are binarized for processing the algorithm and the text characters are recognized by off-the-shelf OCR (Optical Character Recognition) and other process involved . Now the binarized signals are converted to audible signal. The working principle is as follows first the respected image will be captured and then it is converted to binary signals. Now the image is diagnosed to find whether the text is present in the image. Secondly, if the text is present, then the object of interest is detected. The respected text of the image is recognized and then converted to audible signals. Thus the recognized text codes are given as speech to the user.
Development of a Secured Door Lock System Based on Face Recognition using Ras...ijtsrd
Security is an important part of everyday life. The main aim of the system is to develop a secured door lock system. The system consists of three sections. The first section is the face recognition system that is based on Haar like features detection method and Local Binary Pattern LBP recognition algorithm. The second section is the password security system. And the last section is the alert system through GSM module. The system is composed by the combination of face recognition security system, password security system and the alert system through the GSM module. In this system, the iteration used in face recognition system is reduced by using Local Binary Pattern LBP algorithm. In saving time, the processing time of this system, therefore, is better than that of the normal system. Soe Sandar | Saw Aung Nyein Oo "Development of a Secured Door Lock System Based on Face Recognition using Raspberry Pi and GSM Module" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25280.pdfPaper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/25280/development-of-a-secured-door-lock-system-based-on-face-recognition-using-raspberry-pi-and-gsm-module/soe-sandar
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...YogeshIJTSRD
This paper proposes a Smartphone based system for the detection of drowsiness in automotive drivers. The proposed system uses three stage drowsiness detection technique. The first stage uses the percentage of eyelid closure PERCLOS which is obtained by capturing images with the front camera of the Smartphone with a modified eye state classification method. The system uses near infrared lighting for illuminating the face of the driver during night driving. The second step uses the voiced to the unvoiced ratio VUR obtained from the speech data from the microphone, in the event PERCLOS crosses the threshold. The VUR is also compared with a threshold and if it is a value greater than that of the threshold, it moves on to the next verification stage. In the final verification stage, touch response is required within the stipulated time to declare whether the driver is drowsy or not and subsequently sound an alarm. To awake the driver, a vibrating mechanism is done and also the live GPS location is also sent to an emergency contact. We have studied eight other reference papers for the literature review. The system has three advantages over existing drowsiness detection systems. First, the three stage verification process makes the system more reliable. The second advantage is its implementation on an Android smart phone, which is readily available to most drivers or cab owners as compared to other general purpose embedded platforms. The third advantage is the use of SMS service to inform the control room as well as the passenger regarding the loss of attention of the driver. Abishek K Biju | Godwin Jolly | Asif Mohammed C A | Dr. Paul P Mathai | Derek Joseph "A New Proposal for Smartphone-Based Drowsiness Detection and Warning System for Automotive Drivers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45083.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/45083/a-new-proposal-for-smartphonebased-drowsiness-detection-and-warning-system-for-automotive-drivers/abishek-k-biju
Iot attendance system using fingerprint module AjinkyaMore29
An Internet of Things (IoT) based portable biometric
attendance system can prove to be of great value to educational institutions in
this regard as it proves to be highly efficient and secure. The cost involved in
making this system is quite less, when compared to conventional biometric
attendance system. The use of cloud computing to store the attendance records
makes all the data easy to access and retrieve as end when required by the
teachers. The use of fingerprint scanner ensures the reliability of the attendance
record.
INTRODUCTION
FACE RECOGNITION
CAPTURING OF IMAGE BY STANDARD VIDEO CAMERAS
COMPONENTS OF FACE RECOGNITION SYSTEMS
IMPLEMENTATION OF FACE RECOGNITION TECHNOLOGY
PERFORMANCE
SOFTWARE
ADVANTAGES AND DISADVANTAGES
APPLICATIONS
CONCLUSION
This application was design with help of OpenCv and C#.
Facial recognition (or face recognition) is a type of bio-metric application that can identify a specific individual in a digital image by analysing and comparing patterns.
Face recognition software is based on the ability to first recognize faces, which is a technological feat in itself. If we look at the mirror, we can see that your face has certain distinguishable landmarks. These are the peaks and valleys that make up the different facial features.
This application take picture of your face and after storing it.
Then it start identifying all face which are store in database.
Face Detection and Recognition System (FDRS) is a physical characteristics recognition technology, using the inherent physiological features of humans for ID recognition. The technology does not need to be carried about and will not be lost, so it is convenient and safe for use
Real-time eyeglass detection using transfer learning for non-standard facial...IJECEIAES
The aim of this paper is to build a real-time eyeglass detection framework based on deep features present in facial or ocular images, which serve as a prime factor in forensics analysis, authentication systems and many more. Generally, eyeglass detection methods were executed using cleaned and fine-tuned facial datasets; it resulted in a well-developed model, but the slightest deviation could affect the performance of the model giving poor results on real-time non-standard facial images. Therefore, a robust model is introduced which is trained on custom non-standard facial data. An Inception V3 architecture based pre-trained convolutional neural network (CNN) is used and fine-tuned using model hyper-parameters to achieve a high accuracy and good precision on non-standard facial images in real-time. This resulted in an accuracy score of about 99.2% and 99.9% for training and testing datasets respectively in less amount of time thereby showing the robustness of the model in all conditions.
A hybrid approach for face recognition using a convolutional neural network c...IAESIJAI
Facial recognition technology has been used in many fields such as security,
biometric identification, robotics, video surveillance, health, and commerce
due to its ease of implementation and minimal data processing time.
However, this technology is influenced by the presence of variations such as
pose, lighting, or occlusion. In this paper, we propose a new approach to
improve the accuracy rate of face recognition in the presence of variation or
occlusion, by combining feature extraction with a histogram of oriented
gradient (HOG), scale invariant feature transform (SIFT), Gabor, and the
Canny contour detector techniques, as well as a convolutional neural
network (CNN) architecture, tested with several combinations of the
activation function used (Softmax and Segmoïd) and the optimization
algorithm used during training (adam, Adamax, RMSprop, and stochastic
gradient descent (SGD)). For this, a preprocessing was performed on two
databases of our database of faces (ORL) and Sheffield faces used, then we
perform a feature extraction operation with the mentioned techniques and
then pass them to our used CNN architecture. The results of our simulations
show a high performance of the SIFT+CNN combination, in the case of the
presence of variations with an accuracy rate up to 100%.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Quadcopter for Monitoring and Detection
1. QUADCOPTER FOR MONITORING AND DETECTION
(SOFTWARE)
B.E Stage II Project Presentation Submitted in fulfillment of the requirements of the degree of
Bachelor of Engineering
By
Under the guidance of
Dr. Pandharinath Ghonge
Department of Electronics & Telecommunication Engineering
St. John College of Engineering and Management
Mumbai University
2020-2021
1
TEJAS A. DALVI EU1173011
SHIVAM R. SHARMA EU1173014
MOHINI D. DHAWALE EU1173021
2. Presentation Flow
• Problem Statement
• Literature Review
• Block Diagram
• Components
• Flowchart
• Results
• Paper Publishment
• References
2
3. Problem Statement
To develop Machine Learning Models using Tensorflow, Keras
and OpenCV that will serve the task of easing the conventional
methods followed for the circumstances enlisted below:
• Detecting mask’s of people in a crowded situation and, to
inspect whether the rule of wearing the mask is practiced
strictly or not.
• Predicting the ripening condition of a Banana.
3
5. IoT-based System for COVID-19 Indoor SafetyMonitoring
For Face Mask Detection Algorithm three libraries are used in this project:
haarcascade_frontalface_default, haarcascade_mcs_mouth and
haarcascade_mcs_nose to detect human face , human mouth and nose with
provided frame.
Advantage:
• Using Raspberry pi3, accuracy was 84-91%.
Disadvantages:
• Despite the acceptable accuracy of mask detection algorithm, it is not
designed to detect transparent masks and face shields
• Frame rate was 0.76/2.83 fps
5
6. COVID-19 Face Mask Detection With Deep Learning and Computer
Vision
The proposed system uses a transfer learning approach to performance
optimization with a deep learning algorithm and a computer vision to
automatically monitor people in public places with a camera integrated with a
raspberry pi4 and to detect people with mask or no mask.
Advantages:
• outperforming Faster than R-CNN model
• The system detects the social distancing and masks with a precision score of
91.7% with confidence score 0.7, precision value 0.91 and the recall value
0.91 with FPS = 28.07.
6
7. Face Mask Detection at the Fog Computing Gateway
The system used two binary classifier based on MobileNetV2. Classifier-1 is
trained with Data-set which contain 770 facial images which is of classes mask
and without mask.Classifier-2 is also trained with data-sets which contains
images with classes proper and improper mask wear.
Advantages:
• Accuracy for model1 was ranging from 0.75 - 0.83
• Accuracy for model2 was ranging from 0.8 - 0.92
Disadvantages:
• fluctuations in the accuracy and loss values due to model over fitting
7
8. Development of an Effective System for Remote Monitoring of
Banana Ripening Process
In This Paper Author has completed an easy monitoring system to monitor the color indices of
the bananas and to identify ripening stage of banana. Bascom code has been used for the
programming Of the Microcontroller and AVR dude has been used To burn the hex file into the
microcontroller. The MATLAB software is responsible to take the image Periodically and to
identify the ripening stage of the Bananas.
Advantages
• System has been working effectively as 93% On find the colors.
• Temperature and ripening stage Directly sent to the monitoring person mobile number via
GSM module.
Disadvantages
• microcontroller ATMEGA16 due to this Interfacing with high-power devices cannot possible
8
9. Design and development of a portable instrument for the detection
of artificial ripening of banana fruit
The given paper proposes a conceptual method to detect artificially ripened banana fruit using
image processing technique. Thus they had design and development of such device to detect
whether given banana is artificially or naturally ripened. The device consists of banana holder
mechanism along with motor for its rotation as well as the inbuilt camera to capture the surface
image of placed banana.
Advantages
• Only the portion of banana image to be captured, this reduceses the memory required for
image storing and processing.
Disadvantages
• They used CMYK that Doesn’t shift well from RGB.
• Cannot properly display all colors.
9
10. Multi-spectral imaging for artificial ripened banana Detection
In This Paper Author has completed multi-spectral imaging in eight narrow
spectrum bands across VIS and NIR range to detect the artificial ripened
banana. To present the qualitative and quantitative analysis on the sample size
of 5760 images, they has been repeated the experiment for 10 different
iterations of randomly selected training and testing banana samples such that
the final average classification accuracy can be computed.
Advantages
• The obtained average classification accuracy of 97.5%.
• BSIF-SVM, LG-SVM, and LPQ-SVM have consistently Indicated the highest
average classification accuracy.
Disadvantages
• VIS spectrometer is the time it takes to prepare to use one.
10
16. Results
After summing up all the research done in development phase we conclude that
the, ‘Quadcopter for Monitoring and Detection,’ stands for an efficient
surveillance-cum-analyzer, which would definitely stand on its terms; for the
applications assigned to it.
Which are:
1.Face mask detection.
2. Ripening of Banana.
It provides a wholesome environment which is driven for reducing the excess
labour work and risk bagged with it. GUI provides a perfect man- machine
interface which will be easily adaptable to the user to understand the
technology. It tends to make its presence where, humans are unreachable until
and unless backed up with some equipments.
16
20. Future Scope
• High Resolution Camera
• Hardware Upgradation
• Replacing Dongle with LORA Module
20
21. Paper Publishment
• Shivam Sharma, Tejas Dalvi, Mohini Dhawale,
Dr. Pandharinath Ghonge, “Face Mask Detection using
MobileNetV2”, Submitted at International Journal for
Research in Applied Science and Engineering Technology
(IJRASET) Research Publication, Volume 9 Issue V May
2021
21
22. References
• Nenad Petrović, Đorđe Kocić, “IoT-based System for COVID-19 Indoor SafetyMonitoring”, 2020.
• Vinitha.V, Velantina.V, “COVID-19 Face Mask Detection With Deep Learning and Computer Vision”,
Department of Master of Computer Application, AMC Engineering College Bangalore, August 2020.
• Srinivasa Raju Rudraraju, Nagender Kumar Suryadevara, Atul Negi, “Face Mask Detection at the Fog
Computing Gateway”, School of Computer and Information Sciences University of Hyderabad, 2020.
• Amit Verma, Rajendra Hegadi, Kamini Sahu, "Development of an Effective System for Remote
Monitoring of Banana Ripening Process", Department of ET&T, KITE Raipur, CG, India, December
2015.
• Veena Hallur, Bhagyashree Atharga, Amruta Hosur, Bhagyashree Binjawadagi, K. Bhat, "Design and
development of a portable instrument for the detection of artificial ripening of banana fruit", Students,
Department of E&CE, Basaveshwar Engineering College, Bagalkot, Karnataka, India, November
2014.
22
23. References
• Narayan Vetrekar, Raghavendra Ramachandra, Kiran B. Raja, R. S. Gad, "Multi-spectral imaging for
artificial ripened banana Detection", Department of Electronics, Goa University, Taleigao Plateau, Goa,
India, 2019.
• Ahmed AboBakr, Menna Mohsen, Lobna A. Said, Ahmed H. Madian, Ahmed S. Elwakil, and Ahmed G.
Radwan, "Banana Ripening and Corresponding Variations in Bio-Impedance and Glucose Levels",
NISC Research Center, Nile University, Cairo, Egypt,2019.
• Darvin M. Taghoy, Jocelyn Flores Villaverde, "A Fuzzy Logic Approach for the Determination of
Cavendish Banana Shelf Life " School of Electrical, Electronics and Computer Engineering, Mapúa
University Manila, Philippines, October 2018.
23