This document describes a senior project to develop a system for real-time emotion detection from videos. The system detects faces in video frames using OpenCV and identifies facial regions like the eyes, mouth and nose using Active Shape Models. Local Binary Pattern is used to extract features from each region. A k-Nearest Neighbors classifier then determines the emotion based on the features. The system was tested on 259 images from the Cohn-Kanade dataset, achieving 91.7% accuracy on training data and 80.2% on test data. The document provides background on facial expression recognition and discusses challenges like processing speed, data size and dynamic expressions.
This document describes a dissertation that aims to improve 3D stereo reconstruction of human faces by combining it with a generic morphable face model. The dissertation first discusses background topics like facial landmark annotation, 3D morphable face models, texture representation, stereo reconstruction and face model deformation. It then describes the proposed scheme which involves steps like landmark annotation, pose estimation, shape fitting, texture extraction, stereo reconstruction from image pairs and deformation of the face model. The results show that fusing the stereo reconstruction with a single image reconstruction using a morphable model leads to a more accurate 3D face model compared to using either method alone. Finally, the deformed face model is visualized on a smartphone using a cardboard viewer.
This document describes a project that aims to estimate full-body demographics from images using computer vision and machine learning techniques. The project proposes a novel method to automatically annotate images with categorical labels for a wide range of body features, like height, leg length, and shoulder width. The method explores using common computer vision algorithms to extract features from images and video frames and compare them to a database of subjects with labeled body features. The document outlines the requirements, approaches considered, design and implementation of the project, and evaluates the results in estimating demographics and identifying individuals.
Android Application for American Sign Language RecognitionVishisht Tiwari
This document describes a final year project that developed an Android application for American Sign Language (ASL) recognition. The application uses image processing techniques like skin color segmentation, morphological operations, and contour analysis to locate the hand and fingertips in images. Pattern recognition is then used to compare extracted fingertip positions to a dataset of ASL letters and identify the sign. The project aims to provide an affordable and portable solution for ASL recognition. Testing showed the application could correctly identify several ASL letters with reasonable accuracy.
This document is the thesis submitted by Jiří Danihelka to the Faculty of Electrical Engineering at Czech Technical University in Prague for the degree of Doctor of Philosophy. The thesis focuses on distributed mobile graphics, including rendering of facial models, collaborative distributed computer graphics, and generating virtual cities on mobile devices. It presents research conducted from 2010 to 2015 and supported by several grants and organizations. The thesis is divided into four parts covering introduction, rendering of facial models, collaborative graphics, and generating virtual cities on mobile devices.
This document provides a final report on an embedded systems project to build an autonomous line-following buggy. It summarizes the key components of the buggy, including the mechanical design, electronic circuits for line and speed sensing, use of an ultrasonic sensor and RF link, and software programming. It describes the group's organization, budget, testing process, and performance at races, where the buggy placed fifth. Detailed diagrams and the pseudo code used are included in appendices.
This document provides a project report on developing a bike sharing Android application. It includes an introduction describing the motivation for the project, a literature survey reviewing papers on related topics like bike and public transport integration, a software requirements specification outlining the requirements, a system design section with diagrams, and plans for system implementation and testing. The report was submitted by students to fulfill the requirements for a degree in computer engineering.
This document is a minor project report submitted by Shahrukh Mohd Ayyaz Khan to the Department of Computer Engineering at SSBT's College of Engineering and Technology in partial fulfillment of the requirements for a Bachelor of Engineering degree. The report details the development of a Local Area Network Manager application. It includes sections on system analysis, requirements specification, system design, implementation, testing, results and analysis, and conclusions. Diagrams and screenshots are provided to illustrate various aspects of the system architecture, design, and functionality.
This document describes a dissertation that aims to improve 3D stereo reconstruction of human faces by combining it with a generic morphable face model. The dissertation first discusses background topics like facial landmark annotation, 3D morphable face models, texture representation, stereo reconstruction and face model deformation. It then describes the proposed scheme which involves steps like landmark annotation, pose estimation, shape fitting, texture extraction, stereo reconstruction from image pairs and deformation of the face model. The results show that fusing the stereo reconstruction with a single image reconstruction using a morphable model leads to a more accurate 3D face model compared to using either method alone. Finally, the deformed face model is visualized on a smartphone using a cardboard viewer.
This document describes a project that aims to estimate full-body demographics from images using computer vision and machine learning techniques. The project proposes a novel method to automatically annotate images with categorical labels for a wide range of body features, like height, leg length, and shoulder width. The method explores using common computer vision algorithms to extract features from images and video frames and compare them to a database of subjects with labeled body features. The document outlines the requirements, approaches considered, design and implementation of the project, and evaluates the results in estimating demographics and identifying individuals.
Android Application for American Sign Language RecognitionVishisht Tiwari
This document describes a final year project that developed an Android application for American Sign Language (ASL) recognition. The application uses image processing techniques like skin color segmentation, morphological operations, and contour analysis to locate the hand and fingertips in images. Pattern recognition is then used to compare extracted fingertip positions to a dataset of ASL letters and identify the sign. The project aims to provide an affordable and portable solution for ASL recognition. Testing showed the application could correctly identify several ASL letters with reasonable accuracy.
This document is the thesis submitted by Jiří Danihelka to the Faculty of Electrical Engineering at Czech Technical University in Prague for the degree of Doctor of Philosophy. The thesis focuses on distributed mobile graphics, including rendering of facial models, collaborative distributed computer graphics, and generating virtual cities on mobile devices. It presents research conducted from 2010 to 2015 and supported by several grants and organizations. The thesis is divided into four parts covering introduction, rendering of facial models, collaborative graphics, and generating virtual cities on mobile devices.
This document provides a final report on an embedded systems project to build an autonomous line-following buggy. It summarizes the key components of the buggy, including the mechanical design, electronic circuits for line and speed sensing, use of an ultrasonic sensor and RF link, and software programming. It describes the group's organization, budget, testing process, and performance at races, where the buggy placed fifth. Detailed diagrams and the pseudo code used are included in appendices.
This document provides a project report on developing a bike sharing Android application. It includes an introduction describing the motivation for the project, a literature survey reviewing papers on related topics like bike and public transport integration, a software requirements specification outlining the requirements, a system design section with diagrams, and plans for system implementation and testing. The report was submitted by students to fulfill the requirements for a degree in computer engineering.
This document is a minor project report submitted by Shahrukh Mohd Ayyaz Khan to the Department of Computer Engineering at SSBT's College of Engineering and Technology in partial fulfillment of the requirements for a Bachelor of Engineering degree. The report details the development of a Local Area Network Manager application. It includes sections on system analysis, requirements specification, system design, implementation, testing, results and analysis, and conclusions. Diagrams and screenshots are provided to illustrate various aspects of the system architecture, design, and functionality.
The document presents a complete Android-based framework for automatically identifying a user's transportation mode using GPS trajectories and accelerometer measurements from a smartphone. The framework includes an architecture, design, implementation, user interface, and algorithms for transportation mode identification. It applies segmentation, simplification, and machine learning classification techniques to collected GPS and accelerometer data to identify modes like walking, running, and in-vehicle transportation. The system was evaluated on real and simulated data, achieving an overall accuracy of around 85% for identifying transportation modes, outperforming the Google Activity Recognition API.
This doctoral thesis by Juan Luis Jerez focuses on developing more efficient computational methods and custom hardware architectures for real-time optimal decision making and control applications. The thesis proposes techniques to exploit synergies between digital hardware, numerical algorithms, and algorithm design. These include custom storage schemes, parallel optimization approaches, tailored linear algebra methods for fixed-point arithmetic, and finite-precision analysis of first-order optimization methods. The techniques are demonstrated on examples such as a hardware-in-the-loop setup for model predictive control of a large airliner.
This master's thesis document outlines a proposed social networking web app called "Go Green" that aims to promote environmentally friendly behaviors through gamification. The document provides background on relevant topics like gamification, recommender systems, social networks and carbon footprint analysis. It then describes the proposed "Go Green" concept and contributions, including an overview, use case diagram, entity relationship diagram, proposed game elements and design. Evaluation methods and future work are also discussed. The goal of "Go Green" is to motivate green behaviors through a gamified social app that provides personalized recommendations and tracks users' environmental impact.
This document summarizes Philip Engström's master's thesis project on interactive GPU-based volume rendering. The project investigated two approaches - one based on textured slices of proxy geometry and one based on ray casting. It was found that the ray casting implementation provided far superior image quality. Most of the project work focused on improving ray casting performance through an empty space skipping method using a complex bounding geometry. The report provides background on volume rendering and GPU technology to make the project accessible to readers with basic computer graphics knowledge.
This document summarizes a project that implements function call parallelism within the LLVM compiler framework. The project analyzes serial programs at compile time and automatically adds parallelism by running certain function calls in separate threads while speculatively continuing the main thread. This speculation is made safe using software transactional memory to roll back threads if memory conflicts occur between threads. The implementation finds suitable functions and call sites, parallelizes the calls using pthreads and STM, and includes a merging procedure to enforce correct commit ordering. Evaluation shows the implementation provides performance gains of up to 3.5x on some benchmarks.
This document describes a project to design and implement an OFDM-based wireless transmitter compliant with the IEEE 802.11g standard on an FPGA. The transmitter was modeled using Simulink and the model was tested through cosimulation and using EDA tools. Testing showed the design met timing requirements and error measurements were satisfactory, demonstrating a successful OFDM transmitter design using a model-based approach.
The document discusses migrating a mobile core application from its native infrastructure to a simplified infrastructure (SI). It aims to analyze whether the SI can maintain the same level of availability as the native infrastructure without major architecture changes. The author conducted a theoretical study of the native infrastructure and identified functions relying on non-IP interfaces. The study analyzed how these functions could become unavailable on the SI. Laboratory tests were performed on an SI prototype to verify proposals for maintaining availability. The results confirmed the SI could achieve higher availability than the native infrastructure if the proposals are successfully implemented.
This document is a dissertation submitted by A. Cemal Özlük for the degree of Doktoringenieur (Dr.-Ing.) at Technische Universität Dresden. The dissertation proposes new methods for the automated creation of optimized designs for building automation systems. It introduces concepts like a component model to represent devices and functions, algorithms to generate and improve designs, and an optimization framework to validate the performance of the approaches. The goal is to coordinate engineering tasks, leverage the variety of available devices, and generate high-quality design solutions automatically based on given requirements.
This document is a master's thesis submitted by Jérémy Pouech at KTH Royal Institute of Technology in Stockholm, Sweden in 2015. The thesis proposes an algorithm to make failure detection and classification for industrial robots more generic and semi-automatic. The algorithm uses machine learning to analyze sensory data recorded during robot operations and learn to differentiate between success and failure scenarios. It clusters the training data using OPTICS clustering and extracts labels to learn a classification function to detect failures in new data. The goal is to allow operators without programming skills to teach failure detection to robots. The thesis applies this framework to detect failures in an assembly task performed by an ABB YuMi robot.
This document summarizes a master's thesis project that aimed to implement an object tracking system in Matlab using a single webcam. The system uses both fast and advanced algorithms to achieve better accuracy and speed than either approach alone. It tracks a person's hand placed in front of the webcam mounted on a computer screen. While not real-time, it serves as an initial step towards a real-time capable system. The thesis discusses background on object tracking approaches, related work, the specific problem and hardware, methods used including adaptive filtering, motion detection and pattern recognition, implementation details, results of simulations and tracking tests, and ideas for future work.
This document is a thesis submitted by Ian Dewancker to the University of British Columbia in partial fulfillment of a Master of Science degree in Computer Science. The thesis describes the development of a mobile health research platform called MobiSense that aims to improve mobility analysis for both ambulating and wheelchair users through the use of smartphones. MobiSense is capable of generating lifespace summaries relating to indoor and outdoor mobility as well as activity trends and behaviors by using algorithms for WiFi indoor localization, activity recognition from accelerometer and GPS data, and presenting the analyses via a web application with visualization tools.
- UNU/IIST is a research center of the United Nations University located in Macau that focuses on assisting developing countries in applying software technology.
- It conducts advanced development projects, research projects, curriculum development, university development, courses, conferences, and disseminates information on software technology progress.
- Fellows from developing countries participate in projects to be trained in software techniques like formal methods, which is currently the main technical focus.
- UNU/IIST produces various report types to document its activities and achievements.
This document is the project report for a Crime Portal System submitted for a Master's degree. It describes the development of an online portal that allows citizens to report crimes, search for missing persons, and view details on criminals. The system will facilitate communication between stakeholders like citizens, police departments, and the defense. It includes modules for administration, user complaints, criminal records, news, and more. The report discusses the existing system, proposed new system, feasibility analysis, design of the portal using data flow diagrams and ER modeling, and implementation using Java and related technologies.
A 16-year-old girl named Alice ran away from home after her Ba-xi broke and she thought she lost all her progress. She regretted her decision and tried to make her way back home. When she arrived, she found the police at her house and learned that it had been broken into while her parents were searching for her. The police officer took her to the station where she was reunited with her shocked parents. They were lucky to have their house refurbished after the burglary.
Los hechos sucedieron en la China antigua. Un príncipe anunció que escogería a su esposa entre las pretendientes del palacio basándose en quién le trajera la flor más bonita cultivada a partir de una semilla que les daría. A los seis meses, todas llevaron hermosas flores menos una joven cuya semilla no brotó. Aun así, el príncipe la escogió por ser la única honesta al no engañar con otra flor.
El documento presenta un juego de preguntas y respuestas sobre las concepciones éticas de tres tradiciones religiosas orientales: el hinduismo, el budismo y el islam. El juego explica brevemente algunos de los principios fundamentales de cada religión como la reencarnación en el hinduismo, Sidarta Gautama como fundador del budismo y el deseo como causa del sufrimiento según esta última doctrina.
Nuevas tendencias en la publicidad del siglo 21 martinez requeroBelen Juarez
Este documento presenta una introducción a las nuevas tendencias en publicidad en el siglo XXI. En primer lugar, analiza cómo la publicidad ha evolucionado de enfocarse en la venta de productos a vender marcas y valores emocionales. También discute cómo los públicos y medios han cambiado, requiriendo que la publicidad se adapte. Por último, resalta el papel creciente de la creatividad publicitaria a la luz de las nuevas tendencias de consumo. El documento ofrece una visión general de los cambios clave que ha experimentado la public
Growth monitoring is used to assess whether a child's growth is normal or indicates potential health issues. It involves regularly measuring a child's height, weight, and other factors and plotting them on standardized growth charts. Abnormal growth may signal problems like malnutrition or disease. Key aspects of growth monitoring include using accurate measuring techniques and growth charts, identifying growth patterns outside the normal range, and taking appropriate actions like counseling or referral for further evaluation if issues are suspected.
Este documento resume las principales disposiciones del nuevo Código de Policía en Colombia en relación con el microcomercio. Explica que el Código busca promover la convivencia y el cumplimiento de deberes como el respeto al espacio público. Describe los comportamientos contrarios a la convivencia, los deberes de la policía, y cómo se regulan aspectos como la actividad económica, horarios, perímetros para establecimientos que venden licor, y requisitos para estar al día. También cubre temas como el préstamo
Este documento presenta un resumen de la obra literaria "La Divina Comedia" de Dante Alighieri. Describe los personajes principales como Dante y Virgilio, e incluye un breve resumen de la trama que narra el viaje de Dante a través del Infierno, Purgatorio y Paraíso. También resume la estructura de cada uno de estos tres reinos descritos en la obra, incluyendo los diferentes círculos y terrazas por los que Dante transita durante su recorrido.
El documento resume las charlas y actividades realizadas en un instituto durante el segundo trimestre del curso 2016-2017. En enero, se impartieron charlas sobre el cuidado de animales y una campaña por la paz. En febrero, hubo charlas sobre drogadicción, VIH/SIDA, labores humanitarias en África y salud mental. En marzo, las charlas trataron sobre ludopatía, higiene dental y las fuerzas de seguridad del estado.
Este documento contiene comentarios y descripciones de varios muebles de fibra contemporáneos. Se discuten una cama inspirada en el estilo Directorio del siglo XVIII, una camarera de ratán típica de los años 80, y una silla de mimbre que recuerda el diseño de Verner Panton. También se mencionan un espejo con marco de cuerda, una silla bistró versátil y una pieza más contemporánea de líneas rectas, todas ellas fabricadas con mimbre y estructura de ratán.
The document presents a complete Android-based framework for automatically identifying a user's transportation mode using GPS trajectories and accelerometer measurements from a smartphone. The framework includes an architecture, design, implementation, user interface, and algorithms for transportation mode identification. It applies segmentation, simplification, and machine learning classification techniques to collected GPS and accelerometer data to identify modes like walking, running, and in-vehicle transportation. The system was evaluated on real and simulated data, achieving an overall accuracy of around 85% for identifying transportation modes, outperforming the Google Activity Recognition API.
This doctoral thesis by Juan Luis Jerez focuses on developing more efficient computational methods and custom hardware architectures for real-time optimal decision making and control applications. The thesis proposes techniques to exploit synergies between digital hardware, numerical algorithms, and algorithm design. These include custom storage schemes, parallel optimization approaches, tailored linear algebra methods for fixed-point arithmetic, and finite-precision analysis of first-order optimization methods. The techniques are demonstrated on examples such as a hardware-in-the-loop setup for model predictive control of a large airliner.
This master's thesis document outlines a proposed social networking web app called "Go Green" that aims to promote environmentally friendly behaviors through gamification. The document provides background on relevant topics like gamification, recommender systems, social networks and carbon footprint analysis. It then describes the proposed "Go Green" concept and contributions, including an overview, use case diagram, entity relationship diagram, proposed game elements and design. Evaluation methods and future work are also discussed. The goal of "Go Green" is to motivate green behaviors through a gamified social app that provides personalized recommendations and tracks users' environmental impact.
This document summarizes Philip Engström's master's thesis project on interactive GPU-based volume rendering. The project investigated two approaches - one based on textured slices of proxy geometry and one based on ray casting. It was found that the ray casting implementation provided far superior image quality. Most of the project work focused on improving ray casting performance through an empty space skipping method using a complex bounding geometry. The report provides background on volume rendering and GPU technology to make the project accessible to readers with basic computer graphics knowledge.
This document summarizes a project that implements function call parallelism within the LLVM compiler framework. The project analyzes serial programs at compile time and automatically adds parallelism by running certain function calls in separate threads while speculatively continuing the main thread. This speculation is made safe using software transactional memory to roll back threads if memory conflicts occur between threads. The implementation finds suitable functions and call sites, parallelizes the calls using pthreads and STM, and includes a merging procedure to enforce correct commit ordering. Evaluation shows the implementation provides performance gains of up to 3.5x on some benchmarks.
This document describes a project to design and implement an OFDM-based wireless transmitter compliant with the IEEE 802.11g standard on an FPGA. The transmitter was modeled using Simulink and the model was tested through cosimulation and using EDA tools. Testing showed the design met timing requirements and error measurements were satisfactory, demonstrating a successful OFDM transmitter design using a model-based approach.
The document discusses migrating a mobile core application from its native infrastructure to a simplified infrastructure (SI). It aims to analyze whether the SI can maintain the same level of availability as the native infrastructure without major architecture changes. The author conducted a theoretical study of the native infrastructure and identified functions relying on non-IP interfaces. The study analyzed how these functions could become unavailable on the SI. Laboratory tests were performed on an SI prototype to verify proposals for maintaining availability. The results confirmed the SI could achieve higher availability than the native infrastructure if the proposals are successfully implemented.
This document is a dissertation submitted by A. Cemal Özlük for the degree of Doktoringenieur (Dr.-Ing.) at Technische Universität Dresden. The dissertation proposes new methods for the automated creation of optimized designs for building automation systems. It introduces concepts like a component model to represent devices and functions, algorithms to generate and improve designs, and an optimization framework to validate the performance of the approaches. The goal is to coordinate engineering tasks, leverage the variety of available devices, and generate high-quality design solutions automatically based on given requirements.
This document is a master's thesis submitted by Jérémy Pouech at KTH Royal Institute of Technology in Stockholm, Sweden in 2015. The thesis proposes an algorithm to make failure detection and classification for industrial robots more generic and semi-automatic. The algorithm uses machine learning to analyze sensory data recorded during robot operations and learn to differentiate between success and failure scenarios. It clusters the training data using OPTICS clustering and extracts labels to learn a classification function to detect failures in new data. The goal is to allow operators without programming skills to teach failure detection to robots. The thesis applies this framework to detect failures in an assembly task performed by an ABB YuMi robot.
This document summarizes a master's thesis project that aimed to implement an object tracking system in Matlab using a single webcam. The system uses both fast and advanced algorithms to achieve better accuracy and speed than either approach alone. It tracks a person's hand placed in front of the webcam mounted on a computer screen. While not real-time, it serves as an initial step towards a real-time capable system. The thesis discusses background on object tracking approaches, related work, the specific problem and hardware, methods used including adaptive filtering, motion detection and pattern recognition, implementation details, results of simulations and tracking tests, and ideas for future work.
This document is a thesis submitted by Ian Dewancker to the University of British Columbia in partial fulfillment of a Master of Science degree in Computer Science. The thesis describes the development of a mobile health research platform called MobiSense that aims to improve mobility analysis for both ambulating and wheelchair users through the use of smartphones. MobiSense is capable of generating lifespace summaries relating to indoor and outdoor mobility as well as activity trends and behaviors by using algorithms for WiFi indoor localization, activity recognition from accelerometer and GPS data, and presenting the analyses via a web application with visualization tools.
- UNU/IIST is a research center of the United Nations University located in Macau that focuses on assisting developing countries in applying software technology.
- It conducts advanced development projects, research projects, curriculum development, university development, courses, conferences, and disseminates information on software technology progress.
- Fellows from developing countries participate in projects to be trained in software techniques like formal methods, which is currently the main technical focus.
- UNU/IIST produces various report types to document its activities and achievements.
This document is the project report for a Crime Portal System submitted for a Master's degree. It describes the development of an online portal that allows citizens to report crimes, search for missing persons, and view details on criminals. The system will facilitate communication between stakeholders like citizens, police departments, and the defense. It includes modules for administration, user complaints, criminal records, news, and more. The report discusses the existing system, proposed new system, feasibility analysis, design of the portal using data flow diagrams and ER modeling, and implementation using Java and related technologies.
A 16-year-old girl named Alice ran away from home after her Ba-xi broke and she thought she lost all her progress. She regretted her decision and tried to make her way back home. When she arrived, she found the police at her house and learned that it had been broken into while her parents were searching for her. The police officer took her to the station where she was reunited with her shocked parents. They were lucky to have their house refurbished after the burglary.
Los hechos sucedieron en la China antigua. Un príncipe anunció que escogería a su esposa entre las pretendientes del palacio basándose en quién le trajera la flor más bonita cultivada a partir de una semilla que les daría. A los seis meses, todas llevaron hermosas flores menos una joven cuya semilla no brotó. Aun así, el príncipe la escogió por ser la única honesta al no engañar con otra flor.
El documento presenta un juego de preguntas y respuestas sobre las concepciones éticas de tres tradiciones religiosas orientales: el hinduismo, el budismo y el islam. El juego explica brevemente algunos de los principios fundamentales de cada religión como la reencarnación en el hinduismo, Sidarta Gautama como fundador del budismo y el deseo como causa del sufrimiento según esta última doctrina.
Nuevas tendencias en la publicidad del siglo 21 martinez requeroBelen Juarez
Este documento presenta una introducción a las nuevas tendencias en publicidad en el siglo XXI. En primer lugar, analiza cómo la publicidad ha evolucionado de enfocarse en la venta de productos a vender marcas y valores emocionales. También discute cómo los públicos y medios han cambiado, requiriendo que la publicidad se adapte. Por último, resalta el papel creciente de la creatividad publicitaria a la luz de las nuevas tendencias de consumo. El documento ofrece una visión general de los cambios clave que ha experimentado la public
Growth monitoring is used to assess whether a child's growth is normal or indicates potential health issues. It involves regularly measuring a child's height, weight, and other factors and plotting them on standardized growth charts. Abnormal growth may signal problems like malnutrition or disease. Key aspects of growth monitoring include using accurate measuring techniques and growth charts, identifying growth patterns outside the normal range, and taking appropriate actions like counseling or referral for further evaluation if issues are suspected.
Este documento resume las principales disposiciones del nuevo Código de Policía en Colombia en relación con el microcomercio. Explica que el Código busca promover la convivencia y el cumplimiento de deberes como el respeto al espacio público. Describe los comportamientos contrarios a la convivencia, los deberes de la policía, y cómo se regulan aspectos como la actividad económica, horarios, perímetros para establecimientos que venden licor, y requisitos para estar al día. También cubre temas como el préstamo
Este documento presenta un resumen de la obra literaria "La Divina Comedia" de Dante Alighieri. Describe los personajes principales como Dante y Virgilio, e incluye un breve resumen de la trama que narra el viaje de Dante a través del Infierno, Purgatorio y Paraíso. También resume la estructura de cada uno de estos tres reinos descritos en la obra, incluyendo los diferentes círculos y terrazas por los que Dante transita durante su recorrido.
El documento resume las charlas y actividades realizadas en un instituto durante el segundo trimestre del curso 2016-2017. En enero, se impartieron charlas sobre el cuidado de animales y una campaña por la paz. En febrero, hubo charlas sobre drogadicción, VIH/SIDA, labores humanitarias en África y salud mental. En marzo, las charlas trataron sobre ludopatía, higiene dental y las fuerzas de seguridad del estado.
Este documento contiene comentarios y descripciones de varios muebles de fibra contemporáneos. Se discuten una cama inspirada en el estilo Directorio del siglo XVIII, una camarera de ratán típica de los años 80, y una silla de mimbre que recuerda el diseño de Verner Panton. También se mencionan un espejo con marco de cuerda, una silla bistró versátil y una pieza más contemporánea de líneas rectas, todas ellas fabricadas con mimbre y estructura de ratán.
Purple parrots westing game character profilesajroets
This document contains character profiles from The Westing Game that are mostly blank. It provides some initial information about a few characters: Samuel Westing is described as being old and dead; Turtle Wexler's physical description includes a still blank face with pale skin and blue eyes, and that she is getting married to Dr. Deere; Chris Theodorakis dared his little brother Theo to go in the Westing house. However, most of the profiles do not include any physical descriptions, information on what is initially learned about the characters, or what is learned about them throughout the story.
O documento discute o climatério, definindo-o como o período de transição da mulher entre a fase reprodutiva e não reprodutiva. Descreve as fases do climatério, incluindo a perimenopausa, menopausa e pós-menopausa, e os principais sintomas e mudanças fisiológicas associadas a cada uma delas, como irregularidade menstrual, queda dos níveis de estrogênio e aumento de risco de doenças cardiovasculares e osteoporose na pós-menopausa
This document provides information about purchasing a 3Com 56K/3CCM756 PCMCIA network adapter from Launch 3 Telecom. It includes details on payment methods, same-day shipping and tracking, warranty, and additional services offered like repairs, maintenance contracts, and equipment deinstallation. Launch 3 Telecom is a telecom equipment supplier that has served customers for over 15 years with competitive pricing, product expertise, and quality customer service.
Ringkasan dokumen tersebut adalah:
1. Good Corporate Governance mulai dikenal di Indonesia setelah krisis ekonomi 1997 untuk meningkatkan akuntabilitas perusahaan.
2. Pemerintah mendorong implementasi GCG melalui peraturan dan organisasi pendukung.
3. Komitmen GCG diberlakukan pada sektor swasta non-BUMN melalui peraturan bursa efek.
Tarea 7 angustia y ansiedad darioparedesDario Paredes
La ansiedad y la angustia son emociones negativas que comparten algunos síntomas físicos y psicológicos. La ansiedad se caracteriza por una tensión emocional y correlatos somáticos como taquicardia, mientras que la angustia produce un efecto de inmovilización y sobrecogimiento. Mientras la ansiedad conlleva una reacción de búsqueda de soluciones, la angustia paraliza al individuo. Ambas pueden estar asociadas a trastornos psíquicos y somáticos y su manifestación requ
Al Abbasi Enterprises is a recruitment agency established in 1988 that recruits candidates for jobs in the Middle East. It has recruited over 55,000 personnel for over 75 clients. The agency provides recruitment services including staff recruitment, manpower recruitment, and headhunting across various industries. It guarantees candidates will be professionally and medically fit and able to work, replacing candidates if needed within 90 days. The agency also offers training programs and human resources services to support clients.
Berrikuntza eta proiektuak aldaketak 2016 lucilalarraga
El documento describe varios proyectos de innovación que se llevan a cabo en el Centro Arangoya para garantizar un proceso de enseñanza-aprendizaje actualizado y que responda a las necesidades de las alumnas. Entre los proyectos se encuentran la utilización de estrategias de gamificación en Bachillerato, el proyecto Erasmus que permite la movilidad de estudiantes, proyectos para fomentar el euskera, el proyecto Agenda 21 Escolar sobre sostenibilidad ambiental, y un proyecto para desarrollar
Coates Hire - Water Treatment Engineering Solutions Rafi Tchopourian
Coates Hire provides a range of water treatment equipment and engineering services to address various types of water contamination. Their experts can design customized solutions and provide equipment like sediment tanks, siltstoppers, chemical dosing units, and chemically enhanced primary treatment systems. Coates Hire also offers monitoring equipment, data logging, and technical support to ensure water treatment systems meet safety, environmental, and productivity needs.
El documento presenta los resultados de un examen sobre teorías de relaciones internacionales. El examen contiene 10 preguntas y el estudiante respondió incorrectamente a 6 preguntas y correctamente a 4 preguntas, obteniendo una calificación de 30%. El estudiante luego vuelve a realizar el examen y esta vez responde correctamente a 5 preguntas e incorrectamente a 5 preguntas, manteniendo la misma calificación de 30%.
Una página web es un documento electrónico que forma parte de Internet y se construye en HTML. Puede contener enlaces que redirigen a otras páginas y sirve para compartir documentos de manera pública o privada. Las páginas web se pueden clasificar como públicas, extranet o intrainternet dependiendo de su acceso, e incluyen blogs, páginas personales y foros.
This thesis presents an approach for non-rigid multi-modal object tracking using Gaussian mixture models (GMM). The target is represented by a GMM with each ellipsoid corresponding to a different fragment of the target. A region growing algorithm is used to automatically adapt the fragment set and extract accurate boundaries. Tracking performance is improved by incorporating joint Lucas-Kanade feature tracking to handle large motions. Experimental results demonstrate the effectiveness of the approach on challenging sequences.
Im-ception - An exploration into facial PAD through the use of fine tuning de...Cooper Wakefield
This document is a thesis submitted by Cooper Wakefield to the University of Queensland for the degree of Bachelor of Engineering. The thesis proposes developing a presentation attack detection (PAD) system through fine tuning a deep convolutional neural network. It aims to leverage pre-trained networks and fine tune the upper layers to differentiate between real and fake facial images with a high degree of accuracy. The thesis outlines the problem of presentation attacks on facial recognition systems, reviews prior approaches to PAD, and describes the proposed solution of using transfer learning on a CNN to classify images as real or fake.
A Mobile and Web application for time measurement intended to get an accurate picture of the productive time in a production environment in order to reveal the root causes behind ineffective/idle time and to eliminate non-added activities/tasks .
Technical Key-words : Ionic 2, Angular 2, PouchDB, CouchDB ,
DB Replication Protocol, Django, Python NvD3 charts .
ML guided User Assistance for 3D CAD Surface Modeling: From Image to
Customized 3D Mouse Model
MSc Advanced Product Design Engineering & Manufacturing
By
GEORGIOS KONSTANTINOS KOURTIS
Abstract
The design of 3D CAD surfaces, notably in mouse design, often necessitates a specialized
understanding and expertise. This thesis presents an innovative approach that harnesses machine learning
(ML) to facilitate 3D CAD surface modeling. The primary objective is to develop a demonstration
platform that uses ML to process user input, identify the most similar pre-existing design from a database,
and guide the user in modifying the chosen design to meet their specific requirements. The demonstration
platform will offer step-by-step guidance, assisting users in adapting the suggested mouse surface design
to match their design preferences. This ML-guided approach aims to inspire users to explore more
inventive designs while saving both time and costs by streamlining the design process. The pivotal
project objectives encompass the development of a machine learning model capable of interpreting user
input and identifying the closest match from an existing database of designs, the construction of an
interactive demo that integrates with 3D CAD software, and the preparation of a comprehensive report
documenting all stages of the project. The implementation of the proposed demo will yield a more
efficient and streamlined surface modeling experience for users. The machine learning model, trained on
a robust dataset of user inputs and mouse designs, will facilitate the identification and modification of an
existing design, effectively assisting users in achieving their design goals. In summary, this thesis seeks
to synergize ML and CAD surface modeling, offering enhanced assistance to users. The anticipated
outcome includes a demo and machine learning model that are poised to significantly advance the process
of 3D CAD surface design, particularly for mouse design, optimizing creativity, efficiency, and user
satisfaction.
This master's thesis presents a framework for simulating socio-technical systems (STS) based on goal models. The framework allows modeling STS goals and actors, generating potential solution processes, and simulating process execution under different events. Solution processes are expressed using a business process notation for easy visualization and simulation. Simulation results provide metrics to help analyze system behavior and support decision-making. The framework was implemented as an Eclipse modeling tool and evaluated on a case study.
This document describes a study submitted for a Master's degree in Information Technology. The study focuses on generating IEEE/ISO 42010-2011 compliant views of URDAD platform-independent models with a graphical syntax. Quality requirements for the graphical syntax are defined based on principles of effective visual notation design. Graphical modelling tools are developed and evaluated based on these principles to implement views for URDAD service contract and data structure specifications. The tools aim to make the URDAD language more accessible for practitioners.
This document is a master's thesis submitted by Milan Tepić to the University of Stuttgart exploring host-based intrusion detection to enhance cybersecurity in real-time automotive systems. The thesis was supervised by Dr.-Ing. Mohamed Abdelaal and examined by Prof. Dr. Kurt Rothermel. It explores using timing elements of control unit functions to detect anomalies and intrusions. The goal is to develop a host-based intrusion detection system called AutoSec that can detect anomalies while keeping false alarms close to zero, in compliance with the AUTOSAR automotive software standard.
This document describes an FPGA-based graphics pipeline and three advanced 3D rendering effects implemented in VHDL as part of a diploma thesis. The graphics pipeline includes vertex processing, rasterization, shading, and texture mapping. The three effects implemented are Perlin noise mapping to create a ramp texture, a particle system, and displacement mapping using Perlin noise. The project aims to understand how a simple GPU works at a low level and implement graphics algorithms in a hardware description language for FPGA. Evaluation of the implemented graphics pipeline and effects is also discussed.
A simple report on implementation of an Optical Character Recognition (ORC) as a Handwritten Digit Recognition Machine. It is basically tested on a single neural network using 3 methods: K-Nearest Neighbor (KNN), Support Vector Machine (SVM) and Random Forest Classifier (RFC) Algorithm.
This document summarizes a dissertation titled "Augmented Reality for Space Applications". The dissertation proposes introducing in-field-of-view head mounted display systems in spacesuits to give astronauts the ability to access digital information and operate robots during extravehicular activities. The proposed system would be capable of feeding task-specific information on request and recognizing objects in the real world to overlay augmented reality information for error checking and status purposes. This would increase situational awareness and task accuracy while reducing human error risk. The dissertation focuses on preliminary design and testing of an experimental head mounted display and its integration and testing in a spacesuit analogue.
This document presents a final report for a single machine scheduling problem with sequence dependent setup times at an aluminum powder coating plant. The report begins with background on the company, Wispeco Aluminum, which has been producing aluminum extrusion and powder coating since the 1920s. It then describes the project aim to develop an optimization model to improve scheduling at the plant. The report includes a literature review on single machine scheduling and heuristic techniques, an analysis of the current scheduling problem and plant data, the development of a conceptual model and genetic algorithm based solution model in MATLAB, testing and validation of the solution model, and proposed improvements and applications for the plant.
This document is a project report for a blood donation application called Quick Blood Donate (QBD). It was created by four computer engineering students at S.V.I.T. Nashik as part of their Bachelor's degree. The report includes an abstract, introduction, problem definition, project plan, software requirements specification, design documents, implementation details, testing approach, screenshots of the application, and plans for deployment and maintenance. It aims to address the issue of connecting blood donors and hospitals in real-time to ensure blood is available when needed.
This document summarizes a student project on predicting malicious activity using real-time video surveillance. The project applies techniques like super-resolution, face and object recognition using HOG features, and neural networks to enhance video quality, identify objects and faces, and semantically describe scenes to detect unusual activity. Algorithms were implemented in MATLAB and results were stored in a MongoDB database. Key techniques included super-resolution, PCA-based face recognition, HOG-based object detection, and neural networks like CNNs and RNNs for image captioning. The project aims to help detect criminal activity and track convicted individuals in public spaces.
This document provides an overview of the systems engineering process used to develop an autonomous mining robot called Surus for the NASA Robotic Mining Competition. It describes establishing objectives, defining stakeholders and their expectations, analyzing failures from a previous robot design, setting system requirements, developing subsystem designs through various reviews, finalizing the overall design, and plans for assembly, integration, testing and launch. The document outlines the phases of conceptual design, preliminary design, detailed design, and implementation. It also discusses project management aspects like scheduling, reviews, and financial planning. The aim is to describe the full systems engineering approach used to optimize performance while meeting the competition requirements.
In this thesis, I make as a first attempt a
mode choice model with smartphone data when data collection is passive. My research
consists in identifying and solving arising issues, due to the nature of the data, in order
to derive a dataset suitable for mode choice analysis. The key components of the
proposed methodology concern the detection of trips, activities and identication of the
trip purpose based on smarthphone data, and common issues to mode choice modeling,
such as the determination of the chosen mode and missing attributes of the unchosen
alternative, are addressed as well. The derived dataset is further enriched by complementary
datasets including socio-economic and meteorological information.
This document is a thesis that examines automated detection of short-lived websites. It presents the design and evaluation of discovery, identification, and classification engines to analyze websites and determine if they are short-lived or replicated across multiple domains. The tools crawl websites to gather content and metadata, calculate similarity metrics, and visualize relationships. Evaluation of the tools found they could successfully identify similar websites and classify pages as likely, unlikely, or partially replicated. The thesis also discusses non-functional requirements like architecture, anonymization techniques, and improving performance. Overall, the document outlines an approach for automatically detecting short-lived or replicated pharmaceutical websites.
This thesis proposes a novel way to introduce self-configuration and self-optimization autonomic characteristics to algorithmic skeletons using event-driven programming techniques. By leveraging event-driven programming, the approach is not tied to a specific application architecture and allows for structural changes at runtime. It also enables estimates of future work to be calculated on-the-fly rather than relying on pre-calculated estimates. The thesis focuses on guaranteeing a given execution time for a skeleton by optimizing the number of threads. It contributes a novel event-based separation of concerns for skeletons and evaluates strategies for estimating execution times and parallelism levels.
Similar to Real time emotion_detection_from_videos (20)
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Transcat
Join us for this solutions-based webinar on the tools and techniques for commissioning and maintaining PV Systems. In this session, we'll review the process of building and maintaining a solar array, starting with installation and commissioning, then reviewing operations and maintenance of the system. This course will review insulation resistance testing, I-V curve testing, earth-bond continuity, ground resistance testing, performance tests, visual inspections, ground and arc fault testing procedures, and power quality analysis.
Fluke Solar Application Specialist Will White is presenting on this engaging topic:
Will has worked in the renewable energy industry since 2005, first as an installer for a small east coast solar integrator before adding sales, design, and project management to his skillset. In 2022, Will joined Fluke as a solar application specialist, where he supports their renewable energy testing equipment like IV-curve tracers, electrical meters, and thermal imaging cameras. Experienced in wind power, solar thermal, energy storage, and all scales of PV, Will has primarily focused on residential and small commercial systems. He is passionate about implementing high-quality, code-compliant installation techniques.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELijaia
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Software Engineering and Project Management - Software Testing + Agile Method...Prakhyath Rai
Software Testing: A Strategic Approach to Software Testing, Strategic Issues, Test Strategies for Conventional Software, Test Strategies for Object -Oriented Software, Validation Testing, System Testing, The Art of Debugging.
Agile Methodology: Before Agile – Waterfall, Agile Development.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Accident detection system project report.pdfKamal Acharya
The Rapid growth of technology and infrastructure has made our lives easier. The
advent of technology has also increased the traffic hazards and the road accidents take place
frequently which causes huge loss of life and property because of the poor emergency facilities.
Many lives could have been saved if emergency service could get accident information and
reach in time. Our project will provide an optimum solution to this draw back. A piezo electric
sensor can be used as a crash or rollover detector of the vehicle during and after a crash. With
signals from a piezo electric sensor, a severe accident can be recognized. According to this
project when a vehicle meets with an accident immediately piezo electric sensor will detect the
signal or if a car rolls over. Then with the help of GSM module and GPS module, the location
will be sent to the emergency contact. Then after conforming the location necessary action will
be taken. If the person meets with a small accident or if there is no serious threat to anyone’s
life, then the alert message can be terminated by the driver by a switch provided in order to
avoid wasting the valuable time of the medical rescue team.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Real time emotion_detection_from_videos
1. REPUBLIC OF TURKEY
YILDIZ TECHNICAL UNIVERSITY
FACULTY OF ELECTRICAL AND ELECTRONICS
DEPARTMENT OF COMPUTER ENGINEERING
REAL TIME EMOTION DETECTION FROM VIDEOS
10011082 − Cafer YILDIZ
10011015 − Musa GÖKMEN
SENIOR PROJECT
Advisor
Assoc. Prof. Mine Elif KARSLIG˙IL
January, 2017
2. c All rights reserved to Yıldız Technical University, Computer Engineering Department.
3. ACKNOWLEDGEMENTS
This study was prepared in scope of Senior Project in the Yildiz Technical University
Computer Engineering Department. We appreciate to our family always supporting
and being with us, and to our supervisors, Associate Professor Mine Elif KARSLIG˙IL,
guiding us with her knowledge and leading us with her experience during the project.
Cafer YILDIZ
Musa GÖKMEN
ii
6. LIST OF ABBREVIATIONS
ASM Active Shape Model
BSD Berkeley Software Distribution
CPU Central Processing Unit
FACS Facial Action Coding System
FER Facial Expression Recognition
GB Gigabyte
GHZ Gigahertz
HCI Human Computer Interaction
HDD Hard Disk Drive
IDE Integrated Development Environment
JDK Java Development Kit
KNN K Nearest Neighbour
LBP Local Binary Pattern
MB Megabyte
PC Personal Computer
PCA Principal Component Analysis
RAM Random-Access Memory
TB Terabyte
TRY Turkish Lira(New)
v
8. LIST OF TABLES
Table 3.1 System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Table 3.2 Software cost . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Table 3.3 Hardware cost . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Table 3.4 Employee cost . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Table 6.1 Results of experiments with training dataset and k=1 . . . . . . . 25
Table 6.2 Results of experiments with training dataset and k=3 . . . . . . . 26
Table 6.3 Results of experiments with training dataset and k=5 . . . . . . . 26
Table 6.4 Results of experiments with test dataset and k=1 . . . . . . . . . 26
Table 6.5 Results of experiments with test dataset and k=3 . . . . . . . . . 26
Table 6.6 Results of experiments with test dataset and k=5 . . . . . . . . . 27
vii
9. ABSTRACT
REAL TIME EMOTION DETECTION FROM VIDEOS
Cafer YILDIZ
Musa GÖKMEN
Department of Computer Engineering
Senior Project
Advisor: Assoc. Prof. Mine Elif KARSLIG˙IL
Machines recognize and analyze emotions in real time has become a necessity with
technology entering into every space people live. Nowadays, many researchers are
working on this subject to recognize face expressions. In the work done; face and eye
area were determined using OpenCV. Once these areas have been identified, Active
Shape Models algorithm has been used to detect other important regions such as
mouth, nose, and so on. After finding all areas, feature extraction for each region
was performed using Local Binary Pattern algorithm for emotion recognition. Finally,
the emotion was determined by the K-NN classification algorithm. The results of this
study were tested on 259 objects. Success rate was 91.7% on training data and 80.2%
on test data.
Keywords: Facial expression, real-time, face detection, active shape models
YILDIZ TECHNICAL UNIVERSITY
FACULTY OF ELECTRICAL AND ELECTRONICS
DEPARTMENT OF COMPUTER ENGINEERING
viii
10. ÖZET
V˙IDEO GÖRÜNTÜLERDEN GERÇEK ZAMANLI DUYGU
TESP˙IT˙I
Cafer YILDIZ
Musa GÖKMEN
Bilgisayar Mühendisli˘gi Bölümü
Bitirme Projesi
Danı¸sman: Doç. Dr. Mine Elif KARSLIG˙IL
Teknolojinin insanların hayatlarındaki her alana girmesiyle beraber makinelerin
gerçek zamanlı olarak duyguları tanıyıp analiz etmesi bir ihtiyaç haline gelmi¸stir.
Günümüzde de yüz ifadelerinin tanınması için bir çok ara¸stırmacı bu konu üzerinde
çalı¸smalar yapmaktadır. Yapılan çalı¸smada; OpenCV kullanılarak yüz ve göz bölgesi
tespit edilmi¸stir. Bu bölgeler tespit edildikten sonra Aktif ¸Sekil Modelleri algoritması
ile yüzün a˘gız, burun gibi di˘ger önemli bölgeleri tespit edilmi¸stir. Tüm bölgeler
bulunduktan sonra duygu tanıma için LBP algoritması kullanılarak her bölgeye
ait özellik çıkarımı yapılmı¸stır. Son olarak, KNN sınıflandırma algoritması ile de
duygunun tespiti yapılmı¸stır. Bu çalı¸smanın sonuçları 259 tane nesne üzerinde test
edilmi¸stir. E˘gitim verileri üzerinde %91.7 ba¸sarı sa˘glanırken test verileri üzerinde
%80.2 oranında ba¸sarı sa˘glanmı¸stır.
Anahtar Kelimeler: Duygu analizi, gerçek zamanlı, yüz tanıma, aktif ¸sekil modelleri
YILDIZ TEKN˙IK ÜN˙IVERS˙ITES˙I
ELEKTR˙IK - ELEKTRON˙IK FAKÜLTES˙I
B˙ILG˙ISAYAR MÜHEND˙ISL˙I˘G˙I BÖLÜMÜ
ix
11. 1
Introduction
Emotions are related to the different forms of face regions.It plays an important role
in ensuring proper communication between individuals. The recognition of facial
expression by the machine can contribute significantly to the communication between
the user and the computer. Thus, in the future, the computer will be able to find
recommendations according to the emotional state that the users are in. Because
the face structure for humans is the same in a certain place, the face expressions are
close to each other in great order. Thus, a system can be determined better emotional
expression is trained with a certain group of facial expression. This is the basic thing
to be done in this study.
In this project, it is aimed to automatically determine the basic emotional expressions
from 2D images taken from the videos.
The system receives the captured video frame by frame, and then detects the existed
faces in each frame using OpenCV library. The used training datasets in our study
are MUCT database which consists of 3755 faces with 76 manual landmarks[1] and
Cohn-Kanade database which is for research in automatic facial image analysis and
synthesis and for perceptual studies. We apply Active Shape Models (ASM)[2] over
MUCT in order to calculate a profile by averaging the profile gradients of all the
shapes in the dataset. The generated profile is used to detect the suitable face shape.
We use Local Binary Pattern[3] to extract the face’s features. At the end, using the
classification algorithm KNN[4], we classify the facial expressions into happiness,
anger, surprise, disgust, fear, sadness and discussed classes.
1
12. 2
Literature Review
The human face has an important place in recognizing emotions. Because, significant
features are emerging among with different forms of face for each emotion. The
emotional state can be analyzed by looking at these characteristics. Facial Expression
Recognition(FER)[5][6][7] is used in different areas. Some of them are Computer
Vision, Digital Image Processing and Artificial Intelligence[8]. In recent years, emotion
recognition has become a necessity with the increasing interaction between the
computer and the human[9]. That’s why we can say it’s a popular topic.
The aim of the work is to develop an interactive computer vision system for recognition
of facial expressions from videos. The need for interaction with the machine is
increasing day by day in image processing in parallel to the progress in technology.
Different techniques are presented for the classification of emotions with increased
need.
In previous studies on emotion recognition, some of the difficulties are listed below:
• Not real time
• The small number of face combination for performance
• Use of geometric and visual techniques to extract features in face expression
• Generalization of classification algorithms in classification of face expression
• Processing large data
• Large size images
• Dynamics of face expressions
In this section, we focus on various feature extraction methods using appearance based
features for recognizing human facial expression. There are different approaches
2
13. have been developed for extracting features from face images are Gabor Filter[10],
Principal Component Analysis (PCA), Linear Discriminate Analysis (LDA)[11], Local
Binary Pattern (LBP), with different classifier Support Vector Machine(SVM)[12], KNN
(K Nearest Neighbour).
2.1 Steps Facial Expression Recognition
Facial Expression Recognition proceed in mainly three steps: Creating Shape and
Profile Model, Feature Extraction, Classification.
2.1.1 Creating Shape and Profile Model
The first step in the figure model is aligning the shapes in the data set. In the next
step, the shape model is created using PCA. As a final step, a profile model is created
for each point of each shape in dataset. When the profile model is created, the gray
level values of the pixels around each point are used.
2.1.2 Feature Extraction
Feature is extracted for each area after the determination of meaningful areas of the
image taken from the video. The step of extracting the features is important for the
emotion recognition is detected by comparison of the features. In this study, the
feature extraction was made with texture base.
2.1.3 Classification
After the feature extraction of the face and facial components of the input image, the
next step is to classified according to their closeness. KNN (K Nearest Neighbour)[13]
is used for classification.
As a result, similar applications which uses the same research has been compared and
found to be lacking in certain properties. This application will attempt to improve and
add the missing features as they are found.
3
14. 3
Feasibility Studies
To analyze the project, we made some studies, in terms of labor, technical, legal and
economic sides.
3.1 Technical Feasibility
There are two feasibilities to choose the suitable software and hardware.
3.1.1 Software Feasibility
Microsoft Visual Studio was used as a software structure. Because other options are
limited. Windows 10 was used as an operating system. C++ programming language
has been selected as programming language for this project.
3.1.1.1 Microsoft Visual Studio
Microsoft Visual Studio is an integrated development environment (IDE) from
Microsoft.[14] Visual Studio supports different programming languages and allows
the code editor and debugger to support (to varying degrees) nearly any programming
language, provided a language-specific service exists. So it is preferred.
3.1.1.2 C++
C++ is a general-purpose programming language. It has imperative, object-oriented
and generic programming features, while also providing facilities for low-level
memory manipulation. It was designed with a bias toward system programming and
embedded, resource-constrained and large systems, with performance, efficiency and
flexibility of use as its design highlights.[15]
4
15. 3.1.1.3 OpenCV
OpenCV (Open Source Computer Vision) is a library of programming functions mainly
aimed at real-time computer vision, originally developed by Intel’s research center in
Nizhny Novgorod (Russia), later supported by Willow Garage and now maintained
by Itseez. The library is cross-platform and free for use under the open-source BSD
license[16].
3.1.1.4 Windows 10
Windows 10 is an operating system that is put on the market by Microsoft Windows.
Windows 10 is used in Personal Computer, Notebook, Net-book, Tablet PC and Media
Center. Microsoft Windows put Windows 10 on market at 29 July 2015. The most
advantage is that it is easy to use.
3.1.2 Hardware Feasibility
The table was created to calculate hardware requirement. The requirements were
calculated with the help of Table 3.1.
Table 3.1 System requirements
Software RAM HDD CPU Graphic Card
Microsoft Visual Studio 1 GB 4 GB 1.6 GHZ 256 MB
JDK 64 MB 396 MB - -
Windows 10 2 GB 20 GB 1 GHZ 128 MB
Total 3.05 GB 24.4 GB 2.6 GHZ 384 MB
According the Table 3.1, the minimum requirement of system that 3.05 GB RAM, 24.4
GB HDD, 2.6 GHZ CPU and 384 MB graphic card. The notebook was used that have
8 GB RAM, 1.5 TB HDD, 2.6 GHZ CPU and 2 GB graphic card in this project.
3.2 Legal Feasibility
All rights reserved to Yıldız Technical University, Computer Engineering Department.
3.3 Schedule Feasibility
In the Schedule Feasibility, a Gantt diagram has been created to determine duration
and milestones of the project. Starting the senior Project 30 September 2016 and it
was decided to completed to 30 December 2016 as shown by Gantt diagram in Figure
3.1.
5
17. 3.4 Financial Feasibility
Financial analysis was made in Financial Feasibility. Total cost is under this part.
3.4.1 Software Costs
To be purchased and free software: Microsoft Visual Studio and Windows 10 are
purchased. Windows 10 just has cost 900 TRY and Microsoft Visual Studio has cost
1875 TRY per a year. On the other hand, JDK is used to free. As a result, there is about
cost 2775 TRY for software. All used software is shown in Table 3.2.
Table 3.2 Software cost
Program License Price(TRY)
Microsoft Visual Studio BSD license 1875
JDK BSD license Free
Windows 10 OEM license 900
Total - 2775
Refer to the Microsoft Visual Studio price[17] and the Windows 10 price[18].
3.4.2 Hardware Costs
There is no device that have minimum requirement in market. So, notebook and
server was used that point in the feasibility part. Their costs are shown in Table 3.3.
Table 3.3 Hardware cost
Hardware Price(TRY)
Laptop x 2 2000 + 4700
Total 6700
3.4.3 Employee Costs
All employee salaries are shown in Table 3.4.
Table 3.4 Employee cost
Employee Price(TRY)
Employee 1 3000(4 months)
Employee 2 3000(4 months)
Total 24000
7
18. 4
System Analysis
Since this study is concern with the face recognition, and since ASM model is one of
the most popular methods in this domain. This project is decided to be concerned as
an ASM project. In this section the ASM model and its processing steps have been
discussed in details.
4.1 Active Shape Model
ASM is one of the model based approaches. It is created using profile and shape
models. Shape model defines the variations of shapes inside the training set. One the
other hand, the profile model generates statistical data to represent the gray-level’s
texture for each landmark point. The shape and profile model which has been created
in the training step, is used to position the figures in the test images in the search step.
4.1.1 Creating The Shape Model
The shape model is created in three steps: Manually marking the landmark points in
the training set, marking the marks, then alimenting the marked shapes (removing the
differences of scale, position, and rotation angle), and finally obtaining the statistical
data related to the shape changes.
4.1.1.1 Marking The Shapes
The shape of an object is formed by a set of N points; each point has d-dimensional.
These points should be selected on or around the unchanged regions for all images in
the training set. These regions should generally reflect the general shape and character
of the object. For example, for the face, points on the facial boundary, eyes, nose, and
corner points can be used to create face shapes. 76-point face shape is shown in Figure
4.1.
8
19. Figure 4.1 76-point face shape example(modified from [19])
An object is described by points, referred to as landmark points. The landmark
points are (manually) determined in a set of training images. From these collections
of landmark points, a point distribution model [28] is constructed as follows. The
landmark points (x1, y1),...,(xn, yn) are stacked in shape vectors as Equation 4.1
S = (x1, x2,.., xn, y1, y2,.., yn)T
(4.1)
The shape vectors is defined for the k image in the training set (Sj; j = 1,2,3,..., k).
4.1.1.2 Aligning a Set of Shapes
During training we need to align not just two shapes but a set of shapes. By definition,
alignment means that the total distance from the aligned shapes to the mean shape is
minimized. The mean shape is the average of the aligned shapes. If we knew the mean
shape beforehand, we could simply align all the shapes to the mean shape and be done.
Since we don’t have this prior knowledge, we instead create an initial provisional mean
shape from a reference shape and iterate using the following algorithm. The reference
shape can be any shape in the set of shapes.
9
20. 1. Translate all shape to the center point (0,0)
2. Fix one shape S and scale ||S||=1
3. Hide S to S0
4. Align all shape to the shape S
5. Find the average shape of the aligned shapes
6. Align new average shape to S0 and scale it to ||¯S||=1
7. Repeat steps 4-6 until the mean shape converges
Before alignment begins, it may be beneficial to position the reference shape on the
origin and presale its size to unity. However, this isn’t essential the absolute position.
Figure 4.2 shows the difference between shapes before and after alignment.
Figure 4.2 Before and after alignment
4.1.1.3 Shape Model
To create the shape model, we use a standard principal components approach to
generate a set of directions, or axes, along which the mean shape can be flexed in
shape space to best represent the way the faces vary in the training set. This is done
as described below. Figure 4.3 is an overview.
10
21. Figure 4.3 How the shape model is genrated and used (modified from [20])
Principal component analysis(PCA) is applied to the shape vectors x by computing the
mean shape as Equation 4.2
¯S =
1
n
n
i=1
Si (4.2)
The covariance as Equation 4.3
C =
1
(n − 1)
n
i=1
(Si − ¯S)(Si − ¯S)T
(4.3)
11
22. The Eigen system of the covariance matrix. The eigenvectors corresponding to the t
largest eigenvalues λi are retained in a matrix φ = (φ1|φ2|...|φt). A shape can now
be approximated by Equation 4.4
S ∼= ¯S + φb (4.4)
Where b is a vector of t elements containing the model parameters, computed by
Equation 4.5
b = φT
(S − ¯S) (4.5)
When fitting the model to a set of points, the values of are constrained to lie within
the range m λi, where m usually has a value between two and three.
The number t of eigenvalues to retain is chosen so as to explain a certain proportion
fv of the variance in the training shapes, usually ranging from 90% to 99.5%. The
desired number of modes is given by the smallest for which as Equation 4.6
t
i=1
λi ≥ f v
n
i=1
λi (4.6)
Show different shapes generated by using different b values in Figure 4.4.
Figure 4.4 Different shapes generated by using different b values
12
23. 4.1.2 Creating the Profile Model
The profile model is created to define the attributes of the texture around the landmark
points. In other words, profile model is used to determine how the texture and the
look around a point should be. In the test images, when the shape is aligned, the
texture information around the sample points are extracted. These information is
compared with the texture information obtained from profile model. Then, according
to the comparison result the point’s position is updated. Thus, the points are moved
to the most appropriate position at each step and the most similar shape to the object
is obtained.
To create the profile model, suppose for a given point we sample along a profile k
pixels either side of the model point in the i-th training image. For the j-th landmark
in the m-th image, a grey-level vector is obtained by sampling pixels along the normal
line of the connecting line between j-th and (j-1)-th landmarks, gray level information
can be recorded as Equation 4.7
gnj = [gnj1, gnj2, gnj3,..., gnj(2k+1)] (4.7)
To reduce the effects of global intensity changes we sample the derivative grey values
rather than the grey values as Equation 4.8
gnj
= [(gnj1 − gnj2),(gnj2 − gnj3),...,(gnj2k − gnj(2k+1))] (4.8)
In order to reduce the impact of illumination and so on, gray vectors are normalized
as as Equation 4.9
Pnj =
gnj
2k
i=1
|gnji|
(4.9)
To the j- th landmark for each image in the training set, sample gray information to
use the same sampling method, then we can build the profile model of the j-th labeled
point, the mean gray-scale information and the covariance matrix are expressed as:
The average of a point as Equation 4.10
¯Pn =
1
K
K
j=1
Pnj, n = 1,2,3,..., N (4.10)
13
24. The covariance matrix of a point as Equation 4.11
Spn =
1
K − 1
K
j=1
(Pnj − ¯Pn)(Pnj − ¯Pn)T
, n = 1,2,3,..., N (4.11)
4.1.3 Model Searching
Based on above methods, we can obtain the shape model and the profile shape model,
then use the profile model to search an unknown image. The ASM starts the search for
landmarks from the mean shape aligned to the position and size of the face determined
by a global face detector. It then repeats the following two steps until convergence
• suggest a tentative shape by adjusting the locations of shape points by template
matching of the image texture around each point .
• conform the tentative shape to a global shape model.
During training on manually landmarked faces, at each landmark we calculate the
mean profile vector ¯Pn and the profile covariance matrix Spn.
During searching, For each landmark, we find the best fit along the profile where the
best profile gradient Psn gives the minimum Mahalanobis distance(dmn) with the model
as Equation 4.12
dmn = (Psn − ¯Pn)T
S−1
pn
(Psn − ¯Pn) (4.12)
Searching algorithm is shown in Figure 4.5.
Figure 4.5 Search profile
14
25. Before starting the search operation, it must be determined in the location where the
image of the desired object in the shape. The Viola Jones (VJ) face detection method
is widely used for the face [21]. After the face position is determined, the initial shape
is created. The average figure recorded generated in the training phase (¯S) is carried
out using face scaling object’s location and width information. Figure 4.6 shows the
face region and initial shape found with the VJ face detector.
Figure 4.6 Initial shape
15
26. Profile comparison process is performed to find the best shape. Each landmark created
to average Profile on the (Pn) (2k + 1) in length and a test image obtained profiles on
(Psn), (2m + 1) Suppose that the vectors of length (m > k). For any point, the average
profile is shifted over the sampled profile. In each translation step (total (2m - 2k
+ 1) shift) the corresponding part of the sampled profile is compared with the mean
figure. The comparison is made by calculating the Mahalonobis distance between the
vectors. The new position of the landmark point is determined by the shift step has
the smallest Mahalanobis distance. Any landmark profiles sampled for the test image,
the average profile and profile comparison results are shown in Figure 4.7.
Figure 4.7 Search along the sampled profile and best fit location. Modified from[22]
Profile comparison process is performed for all the landmarks, the point position is
updated. Thus a new shape is obtained. This shape is called as candidate shape (Sc).
When creating the candidate shape, the landmark points move independently of each
other. Therefore, the candidate shape is less likely to be similar to the object. For
example, a landmark on the face boundary can be stay a weak edge on the image
and it can not go to the location should be in reality.To prevent such a situation
from occurring, the candidate shape is adapted to the shape model. This process
is carried out by finding the closest model shape (produced by the shape model)
with the candidate shape. A model can be aligned in any way with various geometric
transformations (translation, scaling, rotation). Therefore, the b vector and exposure
parameters (Xt: the amount of displacement along the x-axis, Yt: the amount of
displacement along the y-axis, s: scale, θ: rotation angle) must be determined to
produce the model shape closest to the proposed shape. The vector b and the exposure
parameters take values that make the distance between the candidate shape and the
model shape at least.
16
27. The algorithm shown below is used to find the most suitable vector b and exposure
parameters.
1. Initialize b = 0
2. Generate model points S = ¯S+Qb
3. Find s, Xt, Yt, θ to best fit Sc to S, Sc = M (S)
Sc is candidate shape after profile matching
M is aligning function which finding s, Xt, Yt, θ parameters
4. Project Sc into S space Sp = M−1
(Sc)
5. Update model parameters b = QT
( Sp - ¯S)
6. Go to step 2, iterate until convergence.
The candidate shape and model shape are shown in Figure 4.8.
Figure 4.8 (Right): Candidate shape. (Left): Candidate shape modeled on the shape
model.
17
28. After detecting all the effective areas of the emotion of face, it is difficult to work on
the fields of RGB[23] format first for every related area in the face. So all fields are
processed in the YCBCR[24] format. Local Binary Pattern Uniform (LBP) is applied
after obtaining the Y value image. A feature vector is generated using image histogram
of LBP applied. Created this vector previously identified anger, disgust, fear, happy,
sad, neatural, surprise that corresponds to whichever of the class KNN (K Nearest
Neighbour) was determined using classification algorithms.
4.2 Local Binary Pattern Uniform (LBP)
The LBP is created from binary scales that are gaussian to the intensity values of the
pixels around a point. That is, the value of each pixel is compared individually with
the values of its neighbors. If the value of the neighboring comparison is greater than
its own value during comparison, it gives the neighbor value 1 as the label. If the value
of the neighbor is smaller than its value, it gives the label 0 for the neighbor. Show
Figure 4.9. The resulting decimal counterpart of the binary sequence will update itself
as the new value. If the transitions between "0" and "1" are small than or equal to two,
the patterns are uniform. For example 11100011,00001000 are uniform pattern but
11010111 is not uniform. The histogram of uniform patterns in each region will be
the feature vector.
Figure 4.9 An example of LBP operator(modified from [25])
18
29. Multiresolution analysis can be achieved by choosing different values of m and R,
where m denotes the number of neighboring pixels with respect to the center pixel,
and R represents the Distance from the center pixel to each of the neighboring pixels.
Figure 4.10 illustrates circularly symmetric neighbor sets for different values of m and
R.[25]
Figure 4.10 Circularly symmetric neighbor sets for different values of m and
R(modified from [25])
In order to fully describe the dominant patterns contained in the face images, we
extend the conventional LBP. Each Pattern in the image is assigned a unique label by
the following equation[26] as Equation 4.13
LBP(m,R) =
p−1
i=0
u(ti − tc)2i
(4.13)
where tc is the intensity of the center pixel, ti is the intensity of the neighbor i,
and u(x) is the step function. It is clear that the LBP defined in equation 1 is not
rotation-invariant as the intensity value of ti changes when the circle is rotated by a
specific angle. Two patterns should be treated as the same type if one can be obtained
from the other through rotating by a certain angle.[25]
The results obtained after Local Binary Pattern application and the results obtained
after applying Local Binary Pattern Uniform are shown in Figure 4.11.
19
30. Figure 4.11 (Left): Performed Local Binary Pattern, (Right): Performed Local Binary
Patter 58 Uniform
4.3 Compare Histogram with the Histograms of Emotions
In pattern recognition, the k-Nearest Neighbors algorithm (or k-NN for short) is a
non-parametric method used for classification and regression. In both cases, the input
consists of the k closest training examples in the feature space. The output depends
on whether k-NN is used for classification or regression.[27]
In this study, the regions related to the Active Shape Models algorithm were found, and
after the feature was extracted for each region with Local Binary Patter 58 Uniform, the
K-NN algorithm was used in the classification phase. First, the feature vector for each
image in the data set is subtracted. This extracted feature vector is stored in the class of
the relevant affect. Then, during the sensory testing phase, the corresponding regions
of the face in the image coming from the video are detected and the feature vector is
extracted for each region. The extracted feature vector is the distance between each
vector in each class. The nearest k neighbors are looked at. The closest k neighbors
belong to that class, whichever class is the most, the emotion that is tested.
20
31. 5
System Architecture Design
Firstly, all the pictures and shape of pictures are read in the main class. Later, these
shapes are sent to the GeneralizedProcrustesAnalysis class. In this class, all shapes
are aligned using the ProcrustesAnlysis and PointList classes. Then the shape model is
generated with applying PCA to the aligned shapes. Profile model is created by using
each shape of figure. Using the figure model and profile model, the shape of the image
is produced in the search process. The class diagram of the system is given on Figure
5.1.
Figure 5.1 Class Diagram
21
32. Firstly ASM’s need to be trained. For this, a data set consisting of pictures and shapes
of pictures is created. Then a shape model is created during the education phase. All
images are grayed for creating a profile. In the testing phase, it is determined eye first.
according to the position of the eye, the starting shape is created. In the image being
searched, gray translation is performed. In the last step, the ASM search algorithm is
applied to find the shape of the image. The block diagram of the system is given on
Figure 5.2.
Figure 5.2 Block diagram
5.1 Cohn-Kanade Dataset
The proposed algorithm was trained and tested on the Cohn-Kanade Facial Expression
Database. This database consists of 100 university students in age from 18 to 30 years,
of which 65% were female, 15% were African-American, and 3 were Asian or Latino.
Subjects were instructed to perform a series of 23 facial displays, seven of which were
based on descriptions of prototype emotions (i.e., anger, disgust, fear, happy, neutral,
sadness, and surprise). Image sequences from neutral to target display were digitized
into 640x490 pixel arrays. For our experiments, we selected 320 image sequences
from the database for basic emotional expression recognition. The sequences come
from 96 subjects, with 1 to 6 emotions per subject. For each sequence, the neutral
face and three peak frames of each sequence were used. To evaluate generalization
performance, a 10-fold cross-validation test scheme was adopted.[28]
22
33. Figure 5.3 The sample face expression images from the Cohn–Kanade
database(modified from [28])
23
34. 6
Experimental Results
The experimental results of the project are given below. Some pictures were used for
the experiment. The progressive results of these images are presented in Figure 6.1,
Figure 6.2 and Figure 6.3 visually. The result in Figure 6.1 is successful, the result in
Figure 6.2 is very successful and the result in Figure 6.3 fails.
Figure 6.1 (Left): Initial, (Middle): Candidate, (Right): Result
Figure 6.2 (Left): Initial, (Middle): Candidate, (Right): Result
24
35. Figure 6.3 (Left): Initial, (Middle): Candidate, (Right): Result
Most facial algorithms aim to find expressions of high resolution faces. However,
most images taken in the real world are low resolution. So, the faces in the image
and the expressions they are in are in low resolution. Studies have shown that LBP
algo- rithm is not affected by different resolution images. In this work, we use the
LBP algorithm because it is not affected by different resolution images. Experimental
observations made it possible to observe that the areas of the mouth, nose, eyes,
forehead and eyebrows most affected the change of emotion. Local feature vectors
have been derived from the corresponding regions with LBP algorithm. Today, most
of the images taken from the camera have a size of 480/640. We used the John-Kanade
database to train our system because the John-Kanade dataset is also 490/640. When
we are using the K-NN algorithm at the classification stage, we compare the results
obtained from the system by giving different values to k when testing the system.
The results obtained in the tests are given in Table 6.1 for the training dataset and in
Table 6.2 for the test dataset.
Table 6.1 Results of experiments with training dataset and k=1
Anger Disgust Fear Happy Natural Sad Surprise Accuracy (%)
Anger 23 0 0 0 0 0 0 100
Disgust 0 21 0 0 0 1 0 95,5
Fear 0 0 30 2 0 0 0 93,75
Happy 0 0 1 72 0 0 0 98,6
Natural 0 0 0 0 47 0 0 100
Sad 2 0 0 0 0 35 0 94.5
Surprise 0 0 0 0 0 0 27 100
25
38. 7
Conclusion
In this study, first a data set (MUCT) consisting of previously manually manipulated
faces was used. The shapes used are first aligned with the PCA algorithm in a common
reference manner. A shape model and a profile model were created from the aligned
shapes. The PCA algorithm was used to construct the shape model. Random new
shapes were created by using eigenvectors and eigenvalues obtained by using PCA
algorithm. A profile model was created for points representing each shape. Using the
generated profile model, the randomly generated shape was matched to the desired
shape. Briefly, the ASM algorithm’s shape model and the profile model were used to
determine meaningful regions.
In the stage of facial expression recognition, the method based on Local Binary Pattern
58 Uniform algorithm and K-NN is introduced. Local Binary Pattern 58 Uniform
algorithm is used for local texture feature extraction and K-NN is used for expression
classification and recognition. Experimental results show that the method adopted
in this article is robust in different expressions. Finally, If everyone is doing special
training in the test phase, we get the best result when k = 1. If the person does not
have special training, we get the best result when k = 5.
28
39. References
[1] S. Milborrow, J. Morkel, and F. Nicolls, “The muct landmarked face database,”
Pattern Recognition Association of South Africa, 2010, http://www.milbo.
org/muct.
[2] T. F. Cootes, C. J. Taylor, D. H. Cooper, and J. Graham, “Active shape
models-their training and application,” Computer vision and image understand-
ing, vol. 61, no. 1, pp. 38–59, 1995.
[3] Z. Guo, L. Zhang, and D. Zhang, “A completed modeling of local binary pattern
operator for texture classification,” IEEE Transactions on Image Processing, vol.
19, no. 6, pp. 1657–1663, 2010.
[4] M.-L. Zhang and Z.-H. Zhou, “A k-nearest neighbor based algorithm for
multi-label classification,” in 2005 IEEE international conference on granular
computing, IEEE, vol. 2, 2005, pp. 718–721.
[5] Z. Zhang, M. Lyons, M. Schuster, and S. Akamatsu, “Comparison between
geometry-based and gabor-wavelets-based facial expression recognition using
multi-layer perceptron,” in Automatic Face and Gesture Recognition, 1998. Pro-
ceedings. Third IEEE International Conference on, IEEE, 1998, pp. 454–459.
[6] C. Shan, S. Gong, and P. W. McOwan, “Facial expression recognition based on
local binary patterns: A comprehensive study,” Image and Vision Computing,
vol. 27, no. 6, pp. 803–816, 2009.
[7] I. Cohen, N. Sebe, A. Garg, L. S. Chen, and T. S. Huang, “Facial expression
recognition from video sequences: Temporal and static modeling,” Computer
Vision and image understanding, vol. 91, no. 1, pp. 160–187, 2003.
[8] J. R. Jensen, “Introductory digital image processing: A remote sensing
perspective,” Univ. of South Carolina, Columbus, Tech. Rep., 1986.
[9] A. Dix, Human-computer interaction. Springer, 2009.
[10] W. K. Kong, D. Zhang, and W. Li, “Palmprint feature extraction using 2-d gabor
filters,” Pattern recognition, vol. 36, no. 10, pp. 2339–2347, 2003.
[11] A. J. Izenman, “Linear discriminant analysis,” in Modern multivariate statistical
techniques, Springer, 2013, pp. 237–280.
[12] J. A. Suykens and J. Vandewalle, “Least squares support vector machine
classifiers,” Neural processing letters, vol. 9, no. 3, pp. 293–300, 1999.
[13] P. Horton and K. Nakai, “Better prediction of protein cellular localization sites
with the it k nearest neighbors classifier.,” in Ismb, vol. 5, 1997, pp. 147–152.
[14] MS Windows microsoft visual studio wikipedia, https://en.wikipedia.org/
wiki/Microsoft_Visual_Studio, Accessed: 2016-10-29.
29
40. [15] MS Windows microsoft visual studio wikipedia, https://en.wikipedia.org/
wiki/C%2B%2B, Accessed: 2016-10-29.
[16] G. Bradski and A. Kaehler, Learning OpenCV: Computer vision with the OpenCV
library. " O’Reilly Media, Inc.", 2008.
[17] MS Windows NT pricing and purchasing options | visual studio, https://www.
visualstudio.com/tr/vs/pricing/, Accessed: 2016-10-28.
[18] MS Windows windows 10 pro: Yükselt veya satın al - microsoft ma˘gazası türkiye,
https : / / www . microsoftstore . com / store / msmea / tr _ TR / pdp /
productID . 320421400 ? VID = 320421600 & s _ kwcid = AL ! 4249 ! 3 !
157215759337 ! ! ! g ! 18283950120 ! &WT . mc _ id = tr _ datafeed _
pla _ google _ pointitsem _ office & ef _ id = WJHaOwAABaNV0ub8 :
20170201125315:s, Accessed: 2016-10-28.
[19] Ö. Ayhan, “Yüz öznitelik çıkarımı için geli¸stirilmi¸s aktif ¸sekil modeli,” PhD
thesis, Fen Bilimleri Enstitüsü, 2013.
[20] S. Milborrow, T. Bishop, and F. Nicolls, “Multiview active shape models with sift
descriptors for the 300-w face landmark challenge,” in Proceedings of the IEEE
International Conference on Computer Vision Workshops, 2013, pp. 378–385.
[21] P. Viola and M. Jones, “Rapid object detection using a boosted cascade of simple
features,” in Computer Vision and Pattern Recognition, 2001. CVPR 2001. Pro-
ceedings of the 2001 IEEE Computer Society Conference on, IEEE, vol. 1, 2001,
pp. I–511.
[22] I. Ari, A. Uyar, and L. Akarun, “Facial feature tracking and expression
recognition for sign language,” in Computer and Information Sciences, 2008.
ISCIS’08. 23rd International Symposium on, IEEE, 2008, pp. 1–6.
[23] G. E. Gunbas, A. Durmus, and L. Toppare, “Could green be greener?
novel donor–acceptor-type electrochromic polymers: Towards excellent neutral
green materials with exceptional transmissive oxidized states for completion of
rgb color space,” Advanced Materials, vol. 20, no. 4, pp. 691–695, 2008.
[24] D. Chai and A. Bouzerdoum, “A bayesian approach to skin color classification in
ycbcr color space,” in TENCON 2000. Proceedings, IEEE, vol. 2, 2000, pp. 421–
424.
[25] S. Liao, W. Fan, A. C. Chung, and D.-Y. Yeung, “Facial expression recognition
using advanced local binary patterns, tsallis entropies and global appearance
features,” in Image Processing, 2006 IEEE International Conference on, IEEE,
2006, pp. 665–668.
[26] T. Ahonen, J. Matas, C. He, and M. Pietikäinen, “Rotation invariant image
description with local binary pattern histogram fourier features,” in Scandina-
vian Conference on Image Analysis, Springer, 2009, pp. 61–70.
[27] N. S. Altman, “An introduction to kernel and nearest-neighbor nonparametric
regression,” The American Statistician, vol. 46, no. 3, pp. 175–185, 1992.
[28] P. Lucey, J. F. Cohn, T. Kanade, J. Saragih, Z. Ambadar, and I. Matthews,
“The extended cohn-kanade dataset (ck+): A complete dataset for action unit
and emotion-specified expression,” in Computer Vision and Pattern Recognition
Workshops (CVPRW), 2010 IEEE Computer Society Conference on, IEEE, 2010,
pp. 94–101.
30
41. Curriculum Vitae
PERSONAL INFORMATION MEMBER OF 1
Name-Surname: Cafer YILDIZ
Birthdate and Place of Birth: 07.07.1988, Diyarbakır
E-mail: caferyildiz3@gmail.com
Phone: 0545 494 11 48
Practical Training: Evren Bilgisayar
PERSONAL INFORMATION MEMBER OF 2
Name-Surname: Musa GÖKMEN
Birthdate and Place of Birth: 24.11.1989, Diyarbakır
E-mail: musagokmen21@gmail.com
Phone: 0544 934 72 21
Practical Training: Inoart Bili¸sim Hizmetleri A.¸S.
Project System Informations
System and Software: Windows ˙I¸sletim Sistemi, C++
Required RAM: 3GB
Required Disk: 25GB
31