An electronic Medical record (EHR) is a of a computerized version of a patient's paper record. Our reality
has been drastically changed by advanced innovation like – PDAs, tablets, and web-empowered gadgets
have changed our day to day lives and the manner in which we impart. Medication is a data rich enterprise.
EHR incorporate the clinical and treatment chronicles of patients, an EHR framework is worked to go past
standard clinical information gathered in a supplier's office and can be a more extensive perspective on a
patient's consideration. Electronic Health Record (EHR) frameworks face issues with respect toinformation
security, honesty and the board. We could execute blockchain innovation to change the EHR frameworks
and could be an answer of these issues. The main goal of our proposed structure is to implement and
execute blockchain innovation for EHR and furthermore to give secure capacity of electronic records by
characterizing granular access rules for the clients of the proposed framework. Thus this structure furnishes
the EHR framework with the advantages of having a versatile, secure and necessary integral chain-based
arrangement
Abstract: - Data Mining is a process used to extract the usable data from a larger set of any raw data. It involves
analyzing data patterns in large batches of data using one or more software. R is a programming language for the
purpose of statistical computations and data analysis. The R language is widely used by the data miners and
statisticians on high dimensional pattern extraction. R is freely available under the GNU General Public Licenses
and the source code is written in FORTAN, C and R.It is a GNU project. The pre-compiled binary versions are
freely available for various flavours of operating system. R is basically command line interface (CLI) and various
GUI interfaces are also available now a day. In this articlefocuses the concept of R like; getting data into and out of
R and packages related to data mining and data visualization.
Online Bus pass generation is useful for user who are facing problems with the current manual work of bus pass
registration and renewal. The user need to register by submitting their details through online .The administrator will
verify the user details and if they are satisfied they will approve bus pass. The pass will be generated and send to
userid. The user can login with their user idno and password and then renewal can be performed
Nowadays the smart phones are equipped with touch based screens, enabling the user to interact in an easier and
efficient way, compared to standard buttons. However, such screens require visual navigation, apparently different
to access for the visually impaired.One of the technologies which aid the blind person to call in android mobile is
Virtual Reality. Even though virtual reality is employed to carry out operations the blind person attention is one of
the most important parameter. If the user commits any mistake to use the application it leads to a wrong call. So, in
this paper we suggest technology to reduce the burdens of a blind person “Haptic Technology”. Haptic is the
science of applying tactile sensation to human interaction with computers. In our paper we have discussed the basic
concepts behind haptic along with the haptic devices and how these devices are interacted to produce sense of touch
and force feedback mechanisms. Also the implementation of this mechanism by means of haptic rendering and
contact detection were discussed. Further we explained the storage and retrieval of haptic data while working with
haptic devices.
Women’s security is a critical issue in today’s world and its very much needed for every
individual to be acting over such an issue. This paper describes a “GPS and GSM based vehicle
tracking and women employee security system” that provides the combination of GPS device
and specialized software to track the vehicle’s location as well as provide alerts and messages
with an emergency button trigger. Now a days due to recently happened cases such as rape by
drivers or colleagues, burglary etc., employee security, especially women employee security has
become the foremost priority of the companies. System uses the Global Positioning System
technology to find out the location of vehicle. The information of vehicle position provided by
the device can be viewed on Google maps using Internet or specialized software. The IT
companies are looking forward to the security problem and require a system that will efficiently
evaluate the problem of women employees security working in nightshifts. This paper focuses on
the proposed model that can be used to deal with the problem of security issue of women
employees using GPS and GSM based vehicle tracking.
A mobile application which can save time, effort and money by giving technical video explanation based on the recognized image for learners. The collected video information contains all the detailed explanation of the scanned image done by the user. This application groups Augmented reality , 3d objects , sound , video , AI for image recognition into an easy and compact application for the benefit of the every learner. This web application is built C#, UNITY, VUFORIA with the help of Vuforia server connected by asserts. This mobile application serves as an easier way to access details and documentaries related to recognized object. It includes an automatic AR Camera and image target along with the video player which makes it easier for recognizing the image and to learn. The database is done with Vuforia cloud database. The UI provides an excellent user friendly environment that makes the communication more interactive.
Typically an IDS refers to a software application that monitors a network for intrusion or malicious
activity. It signals an alarm once an intrusion is detected. In this paper, an IDS based on Distributed
Machine Learning that detects phishing attacks and issues an alarm when the intrusion is detected has
been discussed. This is done by using SVM as the base algorithm. More on why SVM is used and how the
IDS can be applied to detect other types of intrusion has been discussed.
In this engaged life, people tend to forget
scheduling their meetings and events that are very
important in their day to day life. They wish to have
someone who keeps on prompting them to lineup the work
and to make sure that they accomplished the scheduled
task on time. The solution to this problem is proposed
through an Android Application named “Nudge” using
artificial intelligence. This application is built using
Android Studio IDE 3.3 released by the Google. The
application is used to trigger alarms based on locations,
where the user can set a reminder to a location and select a
range within which the alarm should be triggered. Once
the user move into that range, the alarm goes on. This
application is also used to set reminders based on the mails
the user receives. Suppose, if a user receives a mail
containing any schedule for a meeting or an event, this
application will automatically set a reminder to that
particular event in the OS calendar. This application also
includes facility to directly set a reminder to the OS
calendar.
Keywords-Location, reminder, alarm, calendar, gmail, date
Taking into consideration the drivers’ state might be a serious challenge for designing new advanced driver
assistance systems. During this paper we present a driver assistance system strongly coupled to the user. Driver
Assistance by Augmented Reality for Intelligent Automotive is an augmented reality interface informed by a several
sensors. Communicating the presence of pedestrians or bicyclists to vehicle drivers may end up in safer interactions
with these vulnerable road users. Advanced knowledge about the presence of these users on the roadway is
particularly important when their presence isn't expected or when these users are out of range of the advanced safety
systems that are becoming a daily feature in vehicles today. For example, having advanced knowledge of a pedestrian
walking along a rural roadway is important to increasing driver awareness through in-vehicle warning messages that
provide an augmented version of the roadway ahead. Voice recognition system through an android platform adds
some good flavour during this project. The strategy of voice recognition through this platform is achieved by
converting the input voice signal into text of string and subsequently it's transmitted to embedded system which
contains an arduino atmega328 microcontroller through Bluetooth as a technique of serial communication between an
android application and a control system. The received text string on an arduino is also displayed on the AR Glass. As
connected vehicles start to enter the market, it's conceivable that when the vehicle sensors detect a pedestrian on a
rural roadway, the pedestrian presence is also communicated to vehicles upstream of the pedestrian location that
haven't reached the destination. This paper presents a survey of studies related to perception and cognitive attention
of drivers when this information is presented on Augmented Reality
Abstract: - Data Mining is a process used to extract the usable data from a larger set of any raw data. It involves
analyzing data patterns in large batches of data using one or more software. R is a programming language for the
purpose of statistical computations and data analysis. The R language is widely used by the data miners and
statisticians on high dimensional pattern extraction. R is freely available under the GNU General Public Licenses
and the source code is written in FORTAN, C and R.It is a GNU project. The pre-compiled binary versions are
freely available for various flavours of operating system. R is basically command line interface (CLI) and various
GUI interfaces are also available now a day. In this articlefocuses the concept of R like; getting data into and out of
R and packages related to data mining and data visualization.
Online Bus pass generation is useful for user who are facing problems with the current manual work of bus pass
registration and renewal. The user need to register by submitting their details through online .The administrator will
verify the user details and if they are satisfied they will approve bus pass. The pass will be generated and send to
userid. The user can login with their user idno and password and then renewal can be performed
Nowadays the smart phones are equipped with touch based screens, enabling the user to interact in an easier and
efficient way, compared to standard buttons. However, such screens require visual navigation, apparently different
to access for the visually impaired.One of the technologies which aid the blind person to call in android mobile is
Virtual Reality. Even though virtual reality is employed to carry out operations the blind person attention is one of
the most important parameter. If the user commits any mistake to use the application it leads to a wrong call. So, in
this paper we suggest technology to reduce the burdens of a blind person “Haptic Technology”. Haptic is the
science of applying tactile sensation to human interaction with computers. In our paper we have discussed the basic
concepts behind haptic along with the haptic devices and how these devices are interacted to produce sense of touch
and force feedback mechanisms. Also the implementation of this mechanism by means of haptic rendering and
contact detection were discussed. Further we explained the storage and retrieval of haptic data while working with
haptic devices.
Women’s security is a critical issue in today’s world and its very much needed for every
individual to be acting over such an issue. This paper describes a “GPS and GSM based vehicle
tracking and women employee security system” that provides the combination of GPS device
and specialized software to track the vehicle’s location as well as provide alerts and messages
with an emergency button trigger. Now a days due to recently happened cases such as rape by
drivers or colleagues, burglary etc., employee security, especially women employee security has
become the foremost priority of the companies. System uses the Global Positioning System
technology to find out the location of vehicle. The information of vehicle position provided by
the device can be viewed on Google maps using Internet or specialized software. The IT
companies are looking forward to the security problem and require a system that will efficiently
evaluate the problem of women employees security working in nightshifts. This paper focuses on
the proposed model that can be used to deal with the problem of security issue of women
employees using GPS and GSM based vehicle tracking.
A mobile application which can save time, effort and money by giving technical video explanation based on the recognized image for learners. The collected video information contains all the detailed explanation of the scanned image done by the user. This application groups Augmented reality , 3d objects , sound , video , AI for image recognition into an easy and compact application for the benefit of the every learner. This web application is built C#, UNITY, VUFORIA with the help of Vuforia server connected by asserts. This mobile application serves as an easier way to access details and documentaries related to recognized object. It includes an automatic AR Camera and image target along with the video player which makes it easier for recognizing the image and to learn. The database is done with Vuforia cloud database. The UI provides an excellent user friendly environment that makes the communication more interactive.
Typically an IDS refers to a software application that monitors a network for intrusion or malicious
activity. It signals an alarm once an intrusion is detected. In this paper, an IDS based on Distributed
Machine Learning that detects phishing attacks and issues an alarm when the intrusion is detected has
been discussed. This is done by using SVM as the base algorithm. More on why SVM is used and how the
IDS can be applied to detect other types of intrusion has been discussed.
In this engaged life, people tend to forget
scheduling their meetings and events that are very
important in their day to day life. They wish to have
someone who keeps on prompting them to lineup the work
and to make sure that they accomplished the scheduled
task on time. The solution to this problem is proposed
through an Android Application named “Nudge” using
artificial intelligence. This application is built using
Android Studio IDE 3.3 released by the Google. The
application is used to trigger alarms based on locations,
where the user can set a reminder to a location and select a
range within which the alarm should be triggered. Once
the user move into that range, the alarm goes on. This
application is also used to set reminders based on the mails
the user receives. Suppose, if a user receives a mail
containing any schedule for a meeting or an event, this
application will automatically set a reminder to that
particular event in the OS calendar. This application also
includes facility to directly set a reminder to the OS
calendar.
Keywords-Location, reminder, alarm, calendar, gmail, date
Taking into consideration the drivers’ state might be a serious challenge for designing new advanced driver
assistance systems. During this paper we present a driver assistance system strongly coupled to the user. Driver
Assistance by Augmented Reality for Intelligent Automotive is an augmented reality interface informed by a several
sensors. Communicating the presence of pedestrians or bicyclists to vehicle drivers may end up in safer interactions
with these vulnerable road users. Advanced knowledge about the presence of these users on the roadway is
particularly important when their presence isn't expected or when these users are out of range of the advanced safety
systems that are becoming a daily feature in vehicles today. For example, having advanced knowledge of a pedestrian
walking along a rural roadway is important to increasing driver awareness through in-vehicle warning messages that
provide an augmented version of the roadway ahead. Voice recognition system through an android platform adds
some good flavour during this project. The strategy of voice recognition through this platform is achieved by
converting the input voice signal into text of string and subsequently it's transmitted to embedded system which
contains an arduino atmega328 microcontroller through Bluetooth as a technique of serial communication between an
android application and a control system. The received text string on an arduino is also displayed on the AR Glass. As
connected vehicles start to enter the market, it's conceivable that when the vehicle sensors detect a pedestrian on a
rural roadway, the pedestrian presence is also communicated to vehicles upstream of the pedestrian location that
haven't reached the destination. This paper presents a survey of studies related to perception and cognitive attention
of drivers when this information is presented on Augmented Reality
In the context of Information Societies, a tremendous amount of information is daily exchanged or
released. Among various information-release cases, medical document release has gained significant attention for its
potential in improving healthcare service quality and efficacy. However, integrity and origin authentication of
released medical documents is the priority in subsequent applications. Moreover, sensitive nature of much of this
information also gives rise to a serious privacy threat when medical documents are uncontrollably made available to
untrusted third parties. Redactable signatures allow any party to delete pieces of an authenticated document while
guaranteeing the origin and integrity authentication of the resulting (released) subdocument. Nevertheless, most of
existing redactable signature schemes (RSSs) are vulnerable to dishonest redactors or illegal redaction detection. To
address the above issues, we propose two distinct RSSs with flexible release control (RSSs-FRC). We also analyse
the performance of our constructions in terms of security, efficiency and functionality. The analysis results show
that the performance of our construction has significant advantages over others, from the aspects of security and
efficiency
These days heart diseases are
considered as the major health issue. It
includes heart attack and cardiac arrest.
Heart attack is the global leading cause
of death for both the genders and
occurrence is not always know.
Sometimes heart attack is often
compared with other type of pain and
not often dealt with it. Hence, this
project is to implement the heart rate
monitoring using IOT. The patients are
expected to carry or wear a hardware
sensor. The sensor with note the heart
rate and transmits it through internet.
The patient may be expected to set the
high and low heart rate individually. On
reaching the high rate or going below
the expected heart rate, an emergency
alert notification is sent to the patient’s,
guardian, doctor and
ambulance(optional) android devices.
Augmented reality application for chemical bonding based on androidIJECEIAES
Augmented Reality can provide information that can be more easily understood by the user. Because of its advantages, Augmented Reality can be utilized to create learning applications that can support teaching and learning process. Chemical learning about chemical reactions is usually boring by students. This is because students only know the theory of the book and the explanation of teachers only. This research utilized Augmented Reality to be able to see 3D model of each chemical element and also can see animation of merging between elements. In order to bring up 3D objects of chemical elements then made a card that will be used as a marker / tracker. In addition, there can be a combination of several chemical elements based on several cards detected from the camera. The test is performed for chemical elements with periodic table such as H, Ca, Na, K, C, Cl, Br, O, S, SO2, CO2, OH. Testing the application by performing several merge elements such as HCl, NaCl, H20, CO2, MgS, SO2, O2, CaCl2, HCN, N2, and others. The results of this study will be tested on several students to see the benefits of student learning.
GROUP MEMBER :
MOHD.AIRIL SOLEHAN BIN JOHARI 043911
MUHAMMAD AIMAN BIN ABD GHANI 043959
MUHAMMAD NAUFAL BIN FARID 043953
MUHAMMAD NURAZRUL AMRI BIN NOOR AZLAN 044416
MUHAMMAD NUR ATHARI BI SHAFIEE 044439
Attendance Management System using Face RecognitionNanditaDutta4
The project ppt presentation is made for the academic session for the completion of the work from Bharati Vidyapeeth Deemed University(IMED) MCA department
Accessing remote android mobile contentseSAT Journals
not only used for calling purpose. Today all mobile Users are using
android phone and can store images, videos, files, contacts etc. Mobile phones now a day are not only for calling purpose but also
for important work like banking, corporate, education etc. In case, if user forgets mobile at home and wants some important data
from it remotely from one place to another place. For this there are several android applications available for smart phones today
that can help one to get it. This paper is presenting an android app for the same “Accessing Remote Android Mobile Contents”.
This app will take user requirement as input and retrieve it. This application requires internet connection first, if it is connected it
will open login prompt. In which user has to provide unique user id and password which is decided during installation of app.
Once the user is validated by remote mobile phone, user will see a menu on his/her screen. User has to select menu option form
that and send it to remote phone. User will receive data (contacts) from remote mobile.
Keywords: Android, Remote Mobile, Local Mobile, Eclipse.
Designing the Process of Stores Management for Implementing ERP in Manufactur...sushil Choudhary
This paper describes the importance of ERP in manufacturing industries and examines the various articles
published by eminent Researchers in the field of ERP. Enterprise Resource Planning (ERP) software presents a
frame work for organizations to better utilize their processes. The report is about windows based application.
The main idea of this paper is to handle the all details of stores management system. In this project software
package has been developed to smoothen the processing of item transaction in stores such as item receive, item
issue & report generation such as stock statement, issue register & receive register etc. This Software will help in
automating all the process like receiving and issuing application in stores.
Human Data Acquisition through Biometrics using LabVIEW Yayah Zakaria
Human Data Acquisition is an innovative work done based on fingerprints of a particular person. Using the fingerprints we can get each and every detail of any individual. Through this, the data acquired can be used in many applications such as Airport Security System, Voting System, and Employee login System, in finding the thieves etc. We in our project have implemented
in Voting System. In this we use the components such as MyDAQ which is data acquisition device. The coding here is in done in a Graphical Programming language named LabVIEW where the execution of any program is done in a sequential way or step by step according to the data received.
Biometric authentication is one of the most popular and accurate technology. Now a days, it is used in many real time applications. However, recognizing finger prints in Linux based embedded computers (raspberry pi) is still a very complex problem. This entire work is done on the Linux based embedded computer called raspberry pi, in which database creation, fingerprint reader access, authentication and recognition using python were entirely done on raspberry pi This paper discusses on the standardized authentication model which is capable of extracting the finger prints of individual and store that in database . Then the use of final finger print to match with others in finger prints present in the database to show the capability of this model and also updating the database obtained to the organisation by creating an application through cloud. Pradeep Kumar M S | Dr. K. Suresh | Indumati T | Kishor kumar R"Smart Attendance System using Raspberry Pi" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-5 , August 2017, URL: http://www.ijtsrd.com/papers/ijtsrd2306.pdf http://www.ijtsrd.com/computer-science/bioinformatics/2306/smart-attendance-system-using-raspberry-pi/pradeep-kumar-m-s
In the context of Information Societies, a tremendous amount of information is daily exchanged or
released. Among various information-release cases, medical document release has gained significant attention for its
potential in improving healthcare service quality and efficacy. However, integrity and origin authentication of
released medical documents is the priority in subsequent applications. Moreover, sensitive nature of much of this
information also gives rise to a serious privacy threat when medical documents are uncontrollably made available to
untrusted third parties. Redactable signatures allow any party to delete pieces of an authenticated document while
guaranteeing the origin and integrity authentication of the resulting (released) subdocument. Nevertheless, most of
existing redactable signature schemes (RSSs) are vulnerable to dishonest redactors or illegal redaction detection. To
address the above issues, we propose two distinct RSSs with flexible release control (RSSs-FRC). We also analyse
the performance of our constructions in terms of security, efficiency and functionality. The analysis results show
that the performance of our construction has significant advantages over others, from the aspects of security and
efficiency
These days heart diseases are
considered as the major health issue. It
includes heart attack and cardiac arrest.
Heart attack is the global leading cause
of death for both the genders and
occurrence is not always know.
Sometimes heart attack is often
compared with other type of pain and
not often dealt with it. Hence, this
project is to implement the heart rate
monitoring using IOT. The patients are
expected to carry or wear a hardware
sensor. The sensor with note the heart
rate and transmits it through internet.
The patient may be expected to set the
high and low heart rate individually. On
reaching the high rate or going below
the expected heart rate, an emergency
alert notification is sent to the patient’s,
guardian, doctor and
ambulance(optional) android devices.
Augmented reality application for chemical bonding based on androidIJECEIAES
Augmented Reality can provide information that can be more easily understood by the user. Because of its advantages, Augmented Reality can be utilized to create learning applications that can support teaching and learning process. Chemical learning about chemical reactions is usually boring by students. This is because students only know the theory of the book and the explanation of teachers only. This research utilized Augmented Reality to be able to see 3D model of each chemical element and also can see animation of merging between elements. In order to bring up 3D objects of chemical elements then made a card that will be used as a marker / tracker. In addition, there can be a combination of several chemical elements based on several cards detected from the camera. The test is performed for chemical elements with periodic table such as H, Ca, Na, K, C, Cl, Br, O, S, SO2, CO2, OH. Testing the application by performing several merge elements such as HCl, NaCl, H20, CO2, MgS, SO2, O2, CaCl2, HCN, N2, and others. The results of this study will be tested on several students to see the benefits of student learning.
GROUP MEMBER :
MOHD.AIRIL SOLEHAN BIN JOHARI 043911
MUHAMMAD AIMAN BIN ABD GHANI 043959
MUHAMMAD NAUFAL BIN FARID 043953
MUHAMMAD NURAZRUL AMRI BIN NOOR AZLAN 044416
MUHAMMAD NUR ATHARI BI SHAFIEE 044439
Attendance Management System using Face RecognitionNanditaDutta4
The project ppt presentation is made for the academic session for the completion of the work from Bharati Vidyapeeth Deemed University(IMED) MCA department
Accessing remote android mobile contentseSAT Journals
not only used for calling purpose. Today all mobile Users are using
android phone and can store images, videos, files, contacts etc. Mobile phones now a day are not only for calling purpose but also
for important work like banking, corporate, education etc. In case, if user forgets mobile at home and wants some important data
from it remotely from one place to another place. For this there are several android applications available for smart phones today
that can help one to get it. This paper is presenting an android app for the same “Accessing Remote Android Mobile Contents”.
This app will take user requirement as input and retrieve it. This application requires internet connection first, if it is connected it
will open login prompt. In which user has to provide unique user id and password which is decided during installation of app.
Once the user is validated by remote mobile phone, user will see a menu on his/her screen. User has to select menu option form
that and send it to remote phone. User will receive data (contacts) from remote mobile.
Keywords: Android, Remote Mobile, Local Mobile, Eclipse.
Designing the Process of Stores Management for Implementing ERP in Manufactur...sushil Choudhary
This paper describes the importance of ERP in manufacturing industries and examines the various articles
published by eminent Researchers in the field of ERP. Enterprise Resource Planning (ERP) software presents a
frame work for organizations to better utilize their processes. The report is about windows based application.
The main idea of this paper is to handle the all details of stores management system. In this project software
package has been developed to smoothen the processing of item transaction in stores such as item receive, item
issue & report generation such as stock statement, issue register & receive register etc. This Software will help in
automating all the process like receiving and issuing application in stores.
Human Data Acquisition through Biometrics using LabVIEW Yayah Zakaria
Human Data Acquisition is an innovative work done based on fingerprints of a particular person. Using the fingerprints we can get each and every detail of any individual. Through this, the data acquired can be used in many applications such as Airport Security System, Voting System, and Employee login System, in finding the thieves etc. We in our project have implemented
in Voting System. In this we use the components such as MyDAQ which is data acquisition device. The coding here is in done in a Graphical Programming language named LabVIEW where the execution of any program is done in a sequential way or step by step according to the data received.
Biometric authentication is one of the most popular and accurate technology. Now a days, it is used in many real time applications. However, recognizing finger prints in Linux based embedded computers (raspberry pi) is still a very complex problem. This entire work is done on the Linux based embedded computer called raspberry pi, in which database creation, fingerprint reader access, authentication and recognition using python were entirely done on raspberry pi This paper discusses on the standardized authentication model which is capable of extracting the finger prints of individual and store that in database . Then the use of final finger print to match with others in finger prints present in the database to show the capability of this model and also updating the database obtained to the organisation by creating an application through cloud. Pradeep Kumar M S | Dr. K. Suresh | Indumati T | Kishor kumar R"Smart Attendance System using Raspberry Pi" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-5 , August 2017, URL: http://www.ijtsrd.com/papers/ijtsrd2306.pdf http://www.ijtsrd.com/computer-science/bioinformatics/2306/smart-attendance-system-using-raspberry-pi/pradeep-kumar-m-s
Facial image classification and searching –a surveyZac Darcy
Recent developments in the area of image mining have shown the way for incredible growth in
extensively large and detailed image databases. The images which are available in these
databases, if checked, can endow with valuable information to the human users. As one of the
most successful applications of image analysis and understanding, fac
e recognition has
recently gained important attention particularly throughout the past many years. Though
tracking and recognizing face objects is a routine task, building such a system is still an active
research. Among several proposed face rec
ognition schemes, shape based approaches are
possibly the most promising ones. This paper provides an overview of various
classification and retrieval methods that were proposed earlier in literature. Also, this paper
provides a margina
l summary for future research and enhancements in face detection
Facial Image Classification And Searching - A SurveyZac Darcy
Recent developments in the area of image mining have shown the way for incredible growth in
extensively large and detailed image databases. The images which are available in these
databases, if checked, can endow with valuable information to the human users. As one of the
most successful applications of image analysis and understanding, face recognition has
recently gained important attention particularly throughout the past many years. Though
tracking and recognizing face objects is a routine task, building such a system is still an active
research. Among several proposed face recognition schemes, shape based approaches are
possibly the most promising ones. This paper provides an overview of various
classification and retrieval methods that were proposed earlier in literature. Also, this paper
provides a marginal summary for future research and enhancements in face detection.
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Profile Identification through Face Recognitionijtsrd
This project is Profile identification through facial recognition system using machine learning, based on K neighbors algorithm. The K neighbours algorithm has high detection rate and fast processing time. Once the face is detected, feature extraction on the face is performed using histogram of oriented gradients which essentially stores the edges of the face as well as the directionality of those edges. Histogram of oriented gradients is an effective form of feature extraction due its high performance in normalizing local contrast. Lastly, training and classification of the facial databases is done where each unique face in the facial database is a class. We attempt to use this facial recognition system on two sets of databases and will analyse the results and then provide the profile of an individual which is written in the Data base created in Firebase. Mr. B. Ravinder Reddy | V. Akhil | G. Sai Preetham | P. Sai Poojitha ""Profile Identification through Face Recognition"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23439.pdf
Paper URL: https://www.ijtsrd.com/computer-science/other/23439/profile-identification-through-face-recognition/mr-b-ravinder-reddy
An Iot Based Smart Manifold Attendance SystemIJERDJOURNAL
ABSTRACT:- Attendance has been an age old procedure employed in different disciplines of educational institutions. While attendance systems have witnessed growth right from manual techniques to biometrics, plight of taking attendance is undeniable. In fingerprint based attendance monitoring, if fingers get roughed / scratched, it leads to misreading. Also for face recognition, students will have to make a queue and each one will have to wait until their face gets recognised. Our proposed system is employing “manifold attendance” that means employing passive attendance, where at a time, the attendance of multiple people can get captured. We have eliminated the need of queue system / paper-pen system of attendance, and just with a single click the attendance is not only captured, but monitored as well, that too without any human intervention. In the proposed system, creation of database and face detection is done by using the concepts of bounding box, whereas for face recognition we employ histogram equalization and matching technique.
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCEvivatechijri
Criminal Identification System allows the user to identify a certain criminal based on their biometrics. With advancements in security technology, CCTV cameras have been installed in many public and private areas to provide surveillance activities. The CCTV footage becomes crucial for understanding of the criminal activities that take place and to detect suspects. Additionallywhen a criminal is found it is difficult to locate and track him with just his image if he is on the run. Currently this procedure consists of finding such people in CCTV surveillance footage manually which is time consuming. It is also a tedious process as the resolution for such CCTV cameras is quite low. As a solution to these issues, the proposed system is developed to go through real time surveillance footage, detect and recognize the criminals based on reference datasets of criminals. The use of facial recognition for identifying criminals proves to bebeneficial. Once the best match is found the real time cropped image of the recognized criminal is saved which can be accessed by authorized officials for locating and tracking criminals or for further investigative use.
Real time voting system using face recognition for different expressions and ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
In this Project, a multi-input DC-DC converter is proposed and studied for hybrid electric vehicles (HEVs). Compared to conventional works, the output gain is enhanced, photovoltaic (PV) panel and energy storage system (ESS) are the input sources for proposed converter. The Super capacitor is considered as the main power supply and roof-top PV is employed to charge the battery, increase the efficiency and reduce fuel economy. The converter has the capability of providing the demanded power by load in absence of one or two resources. Moreover, power management strategy is described and applied in control method. A prototype of the converter is also implemented and tested to verify the analysis.
Agricultural research has strengthened the optimized
economical profit, internationally and is very vast and
important field to gain more benefits.
In future agriculture is the only scope for all the people. But
today number of people having land, but they don’t know how
to yield the crops.
So many of people are doing useless agriculture by
cultivating the crop on improper soil. To implement the
application to identify the types of soil,water source of that
land whether that land is based on rain or bore water. And
suggest what of crop is suitable for that soil. So through this
application provide application for the people to know about
the agriculture. There is no any application to know about the
cultivation. However, it can be enhanced by the use of different
technological resources, tool, and procedures. Predict the type
of crop which one is suitable for that particular soil, weather
condition, temperature and so on. So for, using machine
learning with the set of data set are identified the crop for the
corresponding soil.
In the EXISTING SYSTEM, Ballot
based Voting is present, but still there is no system to
avoid Proxy Casting and Recasting is implemented.
We do not have an option to see our casted Vote also.
There is no security in this current application. In the
PROPOSED SYSTEM, a novel electronic voting
system based on Blockchain that addresses some of
the limitations in existing systems and evaluates some
of the popular blockchain frameworks for the purpose
of constructing a blockchain-based e-voting system.
In the MODIFICATION part of the project, we
integrate Aadhaar card linked mobile number for
OTP generation, only then the voter can cast the vote,
this system prevents casting and re-casting of proxies.
The Android application is widely used in all
sectors. In our application it helps to track the
location of the bus. By waiting near the bus stop
for a long time this application helps to reduce the
waiting time of the students using Google map. The
arrival time of a bus is calculated based upon the
pickup point and the starting time of a bus in the
shuttle routes. Providing the accurate bus timing
will be helpful for all the students, staff to catch the
bus at the right time. In a college bus driver is
assigned with a mobile phone where we can use to
track the current location of the bus. Notification
will be sending to the students and parents once
the bus is nearby pick up point and drop point by
using Geo-fencing. Quick Response code is used to
track the attendance of the student whether they
boarded the bus at the pickup point. Common
alert message will be sent to students, staffs and
faculty about the holidays or any crucial
information.
Geo-fencing, Google map, GPS
(Global Positioning System)
The objective of this paper is to use the
Android mobile application to purchase grocery
items. This would help the consumers to purchase the
grocery items through their mobile application and
get the grocery items delivered to their home, office
or anywhere else directly. The users can also select
the nearby provision store or any other supermarket
which is present in their location and then select their
items. The application is thoroughly built only in the
Android platform and is supported only for Android
mobiles. Thus, the application guarantee about userfriendly
in use, provides help desk, security services
etc. This would save the time of the purchaser instead
of going to the grocery store to snap up the items and
standing on a big queue for debiting the products
andwould also help the shop proprietor to develop
their business which will not depreciate their business
revenue for adapting this system by the consumers. It
also helps retailers to create brand awareness so that
the consumers feel self-assured to themselves about
the products procure through online. This would lead
the consumers to increase their familiarity in
purchasing grocery products through an online
application using the internet. The shopkeepers
should also ensure timely delivery of ordered grocery
products without any imperfection in the products
and also ensuring the damage to the products at the
time of deliverance.
Our future battle field system will have more difficulties to maintain security, because of increasing military competitive. Ability to understand, predict and adopt the vast array of inter-networked things is very difficult. Unwanted fire, unauthorized human intervention and other object movement will play major important role for affecting military environment. This project aims to help our future military environment by introducing new technology LoRaWAN in IoT (Internet of Things). LoRaWAN (Long Range Wide Area Network) is a state -of- art commercial of the self (COTS) technology. This project consist of sensors, embedded microcontrollers equipped with LoRaWAN, embedded processors equipped with LoRaWAN and cloud technology. By introducing this new technology in our future military environment we can easily find out criminal activities and fire hazards.
Wildlife entering in to populated areas has
recently become very Popular. The space for wild
animals is decreasing as humans are encroaching
forests. It creates great loss to property and life
when wild animals enter in to cities. We use latest
advances in technology such as Internet of Things
(IoT) to create an alert system of possible wildlife
leaving the forest and also the message will send to
the users Mobile to alert them. We use low cost
motion detectors and Passive Infrared sensors to
achieve this. We relay information of such motion
to a control centre to take further actions. We also
include making loud noise through speakers in
which the animals cannot enter in to land. The
basic idea of IoT is to connect different sensors
and establish communication and also provide
services. In this article, we make use of several IoT
devices at the periphery of natural reserve to
create an alert system. This system can also be
used to find out smugglers and other people
illegally entering in to the forest.
—In a laboratory experiment was conducted on
the utilization of Ethanol-Diesel emulsion in a single
cylinder direct injection diesel engine, a single cylinder,
water cooled, four stroke diesel engine was used. The
principal goals of the present work are to obtain emission
data and combustion characteristics for this type of Diesel
Engine, and to identify the ratio of Emulsion which is
effective in reducing emissions. Experiments were
conducted with emulsions viz (90%diesel + 10%ethanol),
(80% diesel + 20% ethanol), (70% diesel + 30%ethanol) as
fuel. While AVL smoke meter was employed to measure
the smoke density in HSU, the exhaust gas analyzer was
used to measure the NOx emission. High volume sampler
was employed to measure the particulate matter emitted at
the exhaust. The combustion characteristics were studied
using AVL combustion analyser. From the experimental
investigation it was found that the smoke, particulate
matter and Oxides of Nitrogen emissions were reduced
marginally. From the pressure curve and cumulative heat
release curve, it was observed that the combustion started
earlier and the rate of pressure rise increased marginally.
The present research work demonstrates the
preparation of Copper Oxide Nanoparticles (CuO NPs) and
investigates the thermo mechanical properties of the CuO NPs
embedded in the polymer composites experimentally. In this study,
CuO NPs were produced by aqueous precipitation method and
morphology of the NPs was studied using Field Emission
Transmission Electron Microscope (FESEM). Epoxy resin and glass microsphere were considered the base material for the preparation of
the Nano based polymer composites. In order to fabricate the Nano
based polymer composites, CuO NPs with 1.0wtpercentage were
embedded in the base material by means of compression moulding
press. Nano composites proved higher thermal conductivity
enhancement rather than the base material. While comparing to the
base material, the maximum four-point bending strength of 415 MPa
was obtained from the Nano based polymer composites. The test
results obtained from the TG study revealed that an addition of CuO
NPs had acted as the thermal retardant and CuO NPs had delayed
thermal degradation of the Nano based polymer composites. Based
on the test results, it can be suggested that the newly fabricated
nanocomposites have achieved the improved thermal and mechanical
properties.
The Surface roughness prediction method using
artificial neural network (ANN) and Adaptive Neuro Fuzzy
Inference System (ANFIS) are developed to investigate the
effects of cutting conditions during turning of EN8 material.
The ANN model of surface roughness parameters (Ra) is
developed with the cutting conditions such as cutting speed,
feed rate and depth of cut as the affecting process
parameters.
The experiments are planned and totally 27 settings
with three levels defined for each of the factors in order to
develop the knowledge based system. The ANN training
method is used for back-propagation training algorithm
(BPTA) and also for training the Adaptive neuro fuzzy
inference system (ANFIS). We have compared the
Artificial Neural Network and Adaptive neuro fuzzy
inference systems.
The main objective of this paper is to
determine casting defects generally happening in an
aluminium die casting process and efforts have been
taken to identify the tools which eliminate the casting
defects. In global prospective this study briefs the
application of the various tools that are used in the
industries for improvement of quality in foundry
industry. In our national prospective these tools are not
so popular, hence this study will help us to utilise the
available technology through which the productivity is
enhanced with safe and economical means. The QC
tools were used to analyse the casting condition of the
given pattern with three dimensional simulations for the
result preparation. This work has been carried out to
improve the quality of the pattern which is made with
gravity die casting process and this was achieved
through continuous quality control operation with QC
tools, then it was taken to test in some simulation
software. The latest trend available in casting and
foundry shops are the scientific approach in
optimization of all kind of fields including optimization
of defects in castings. These trends are incorporated in
the analysis of aluminium die casting.
Friction Stir Welding, a type of welding which was
discovered in the year of 1991 with a few countable methods
and processes. But today it is one of the necessary and
important type of welding techniques. To develop it, several
researchers showed their interests in this technique. Today,
it acts as the heart of welding of automobiles. Thousands of
inventions has been made in field of Friction Stir Welding
and also successfully being implemented. If a researcher
tries to make some research in this field, he has to go
through thousands of journals where hours of time is being
consumed. To solve that problem several Re-view journals
are being published and also successfully solved this issue
of time consumption. In this paper, similarly a re-view of
several important and different types of papers are discussed
with their results, outcomes, the parameters being performed
for analysis.
This paper also discusses about various methods and various
metals as tools and job materials. It will be much easier and
lenient to understand from this paper to research. The
authors of the papers also clearly explained about the usages
and applications of their methods and provided several
statistical data for clear observation of their methods
Pure and Al substituted Langanite
(La3Ga5.5Nb0.5O14) ceramics have been synthesized
by solid state sintering method and studied their
structural, dielectric and electrical properties. The
crystalline nature was confirmed by powder XRD
studies. The ac conductivity and dielectric
properties of La3Ga5.5-xAlxNb0.5O14 samples were
examined by using complex impedance technique.
Surface morphology and elemental composition
were studied by energy-dispersive x-ray
spectroscopy and scanning electron microscopy.
The frequency dependence of dielectric constant,
dielectric loss and AC conductivity were studied in
the frequency range of 100 KHz to 3 MHz at
different temperatures. The activation energy was
calculated using Arrhenius plot. The lattice
parameter, grain size, dielectric constant and AC
conductivity of pure LGN ceramics were deeply
affected by Al substitution in pure LGN.
In this paper, the non-invasive
methodology for removing Fetal Electrocardiogram
(FECG) is gained by subtracting the balanced
variation of maternal electrocardiogram (MECG)
movement from the abdominal electrocardiogram
(AECG) banner. The banner assessed from the
mother's guts (AECG) is regularly overpowered by
maternal heartbeat. The maternal portion of the
AECG is the nonlinearly changed variation of
MECG. This paper uses an Adaptive Neuro-Fuzzy
Interference System (ANFIS) structure. It is used
for finding the non-direct change and the ensuing
banner are set up with people based request
figurings. This strategy involves some specific
issues which are a direct result of the low force of
the fetal ECG which is sullied by various
wellsprings of checks. It joins maternal ECG,
electromyogram (EMG) signals, power line
impedances and sporadic electronic upheavals.
Along these lines, we are proposing an improved
multimode PSO estimation for overcoming this
issue. In addition, methods like wavelet change,
flexible filtering, thresholding are moreover used.
We have furthermore empowered the thoracic and
stomach signals using MATLAB programming. It
uses only two signs recorded at the thoracic and
stomach regions of mother's skin. Similarly, our
test shows that the proposed count can expel FECG
banner immediately in pregnancy period and that is
one of the basic focal points of figuring.
Almost since the first days of flight, man has been
concerned with the safe escape from an aircraft, which
was no longer flyable. Early escape equipment
consisted of a recovery parachute only. As aircraft
performance rapidly increased during World War II, it
became necessary to assist the crew members in
gaining clear safe separation from the aircraft. This
was accomplished with an ejector seat, which was
powered by a propellant driven catapult - the first use
of a propulsive element in aircrew escape Since then,
this collection of componentry has evolved through
several generations into today's relatively complex
systems, which are highly dependent upon propulsive
elements. Ejection seats are one of the most complex
pieces of equipment on any aircraft, and some consist
of thousands of parts. The purpose of the ejection seat
is simple: To lift the pilot straight out of the aircraft to
a safe distance, then deploy a parachute to allow the
pilot to land safely on the ground
The current paper is mainly about maintaining a secure
environment and also free from thefts that are happening
in our home. The present paper discusses about the
detection of intruders with the help of the various
devices and software.. OpenCV(open source computer
vision) is the major software that is being used in our
present work. For detecting faces we are using various
algorithms like Haar cascade, linear SVM, deep neural
network etc. The main method that we have proposed in
our work is, if any person comes in front of the pi
camera, first it will look for potential matches that we
have already stored in our system If the module finds a
match then it continues to record until any intruder
comes. If the face is not recognized then the unknown
person’s face will be captured and a snap shot will be
sent to the user’s email. The device is developed using
Raspberry Pi b+ with 1.4 GHz quad core processor,
raspberry pi camera module and a Wireless dongle to
communicate with user’s email.
OpenCV, Rassberry pi, python
The aim of this article is to explain the readers the technique of sending data from the sensor
through the Raspberry pi and communicating it to the Thingspeak cloud which is an IOT
platform. To explain the procedure a simple ultrasonic sensor HC-SR-04 which senses objects
up to a distance of 13 ft connected with a raspberry Pi board is used.
This tutorial describe about Raspberry Pi board, Ultrasonic sensor, circuit design for sensing of
data, Python programming script with step by step interpretation. Finally procedure for creating a
channel in ThinSpeak for uploading our data and to read the uploaded data from a remote
desktop/mobile is also included in this tutorial.
Ferrites are the unique magnetic materials which that exhibit electrical as well as magnetic properties and
hence are commercially and scientifically important magnetic material . A brief introduction to various
types of ferrites materials is explained herein. The chemical composition of ferrites including spinel type,
garnet type and hexagaonal type is given in this review. The most interesting applications in electronic
devices High frequency devices and in biotechnology are discussed. Since its discovery in 1950,
hexaferrite has an increasing degree of interest and is still growing exponentially. Hexaferrites are the
extremely important material both commercially and technologically and it accounts for the bulk of the
total magnetic materials manufactured globally. Hence the classification of Hexaferrite is discussed in
detail in this review.
–This paper concentrates on aiding anesthetist for administering anesthesia to the patient in a permissible rate.
Administering anesthesia at a slight excess range may cause fatal effect to patient, so it is with the anesthetist to keep it in
safe limit. In past few years the death toll due to improper anesthesia administration has increased, so it is high time to
provide support to medical field in this aspect.
Nanocomposites are the emerging material in the field of nanotechnology disciplines such as electrical engineering,
mechanical engineering, physics, chemistry, biology and material science. Nanocomposite is a multiphase solid
material, in which atleast one of the phases shows dimensions in the nanometer range (1 nm=10-9 m).
Nanocomposites are multifunctional materials due to their high transparency, electrical conductivity, increased
environmental stability, diffusion constants, mechanical strength, optical quality, heat resistance and recyclability. In
this review Various methods of preparation of Nanocomposirtes will be discusse
More from IJTRET-International Journal of Trendy Research in Engineering and Technology (20)
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Planning Of Procurement o different goods and services
THE LORE OF SPECULATION AND ANALYSIS USING MACHINE LEARNING AND IMAGE MATCHING
1. International Journal of Trendy Research in Engineering andTechnology
Volume 4 Issue 4 August 2020
ISSN NO 2582-0958
www.trendytechjournals.com
8
THE LORE OF SPECULATION AND ANALYSIS USING
MACHINE LEARNING AND IMAGE MATCHING
K. Bharath1
, Paithankar Sumit1
, S. Amudha2
1,
UG Students, 2
Assistant professor, Department of Computer Science and Engineering,
Sriram Engineering College, Chennai-600044, INDIA.
kilaribharath007@gmail.com, sumitpaithankar2@gmail.com,amudhasaravanan@gmail.com
ABSTRACT
Now days the cases of missing kids are increasing. Many of them are left unfound. In this paper we propose an
Android application for finding missing kids.This android application will be used by General public for the
purpose of finding missing kids. This application contains functionality to add FIR complaint as well as photos of
the missing kid. Any anonymous kids photo can be uploaded to the application. By using IMT and neural
networks the photo will be traversed with the database. On finding the perfect match with higher precision
further actions will be processed.The face recognition model in our system will try to find a match in the database
with the help of face encodings. It is performed by comparing the face encodings of the uploaded image to the
face encodings of the images in the database. The face recognition model that we have used maintains an
accuracy of 99.38% on the Labelled Faces in the Wild Benchmark which comprises of 13,000 images.
Keyword: - Android, Face recognition, Image Labelling, Machine Learning, ML Kit.
I. INTRODUCTION
A missing person can be characterized as the one
who can be a child or an adult -- who is lost,
voluntarily or involuntarily. There are various
categories of missing cases of which only 43% of
missing cases’ reasons are known, 99% are juvenile
runways, 2500 cases are due to family problems and
around 500 cases are kidnapped by strangers (which
include both teens and adults). Women add about
52% of missing cases and males48%.
“In India, there are no budgets allocated to finding
missing people”, claimed by an officialsource.
A missing person faces many obstacles, few are
subjected to death (murder), rape or abuse. People
concerned with the missing person such as parents,
friends, relatives and guardians are exposed to stress
and worries from not knowing whether the missing
person is alive or dead.
In our system, the image of the person given by the
guardian at the time of missing is stored in the
database. The public is given authority to upload
photographs of any person in uncertain situations.
Automatic detection of match for this picture among
the already existing images in the database will be
done through our application. This helps the police
department to spot the missing person in any place in
India.
When a suspicious person is found, the picture at
that instance of time is compared with the images
uploaded by the guardian/police department at the
time of missing through the face recognition model.
If a match is found, it will be notified to the police
and the guardian in the form of an alert message
along with the location of where the person is
found.
If not found, a new record will be created in the
database with the uploaded picture. By this way, it
decreases the time taken to search for a person’s
detail after he is found.
0 20000 40000 60000
JAN
FEB
MAR
APRIL
Child
2. International Journal of Trendy Research in Engineering andTechnology
Volume 4 Issue 4 August 2020
ISSN NO 2582-0958
www.trendytechjournals.com
9
Fig1. Survey of Kid found in Delhi using Face
Recognition
Sometimes, the person has been missing for a long
period of time. The age gap is reflected in the
image as ageing affects the structure of the face,
including shape, texture, etc. The appearance of the
person can vary due to ageing, filters, pose,
lightings etc. All these factors were considered
before choosing the face recognitionalgorithm.
II. MACHINE LEARNING
Machine learning (ML) is the scientific
study of algorithms and statistical
models that computer systems use to perform a
specific task without using explicit instructions,
relying on patterns and inference instead. It is seen
as a subset of artificial intelligence. Machine
learning algorithms build a mathematical
model based on sample data, known as "training
data", in order to make predictions or decisions
without being explicitly programmed to perform
the task Machine learning algorithms are used in a
wide variety of applications, such as email
filtering and computer vision, where it is difficult
or infeasible to develop a conventional algorithm
for effectively performing the task.
Machine learning is closely related
to computational statistics, which focuses on
making predictions using computers. The study
of mathematical optimization delivers methods,
theory and application domains to the field of
machine learning. Data mining is a field of study
within machine learning, and focuses
on exploratory data analysis through unsupervised
learning. In its application across business
problems, machine learning is also referred to
as predictive analytics.
III. IMAGE MATCHING ALGORITHMS
1. SIFT (Scale-invariant Feature Transform)
It uses interesting key points of image using
difference in Gaussian method.The Scale
invariance is achieved via scanning key points
at different scaleRotation invariance is
achieved by obtaining the Orientation Assignment
of the key points using image gradient magnitude.
Fig2: Scale invariant transform feature working.
Fig 3: Scale invariant feature transform results.
2. SURF (Speeded Up Robust Features)
SIFT is quite effective but computationally
expensive, so the SURF was developed to improve
the speed of the scale invariant feature detector. It
uses Hessian Matrix approximation to detect
Not Found Kids Found
3. International Journal of Trendy Research in Engineering andTechnology
Volume 4 Issue 4 August 2020
ISSN NO 2582-0958
www.trendytechjournals.com
10
interesting points and use the sum of Haar wavelet
responses for orientation assignment.
3. BRIEF (Binary Robust Independent
Elementary Features)
Computes descriptor quickly (instead of using SIFT
and SURF). Faster as compared to SIFT and SURF
but fails in Orientation invariance.
4. ORB (Oriented Fast and BRIEF)
Developed out of OpenCV labs (not patent so free
to use). Provide faster orientation invariance with
BRIEF
IV. METHODOLOGY
The proposed system makes use of Face
Recognition for missing peoples’ identification. The
architecture of our framework is presented in figure
4.
Fig 4: The Architecture of the proposed People Identification
System
Here the public or police who finds a suspicious
person (child, mentally challenged person, etc.) on
the road uploads a picture of that person into the
portal. Our algorithm extracts the face encodings of
the image as shown inFigure 5 and compare with
that of the face encodings of the previously existing
images in the database. If a match is found, an alert
message will be sent to both the concerned police
officer and the parent/guardian of that person in the
image. If a match is not found, then the person will
be provided with the option of registering that face
asa new entry to our database with the location they
found and remarks.
Fig 5: Face Encodings generated from an input image
Whenever public or police upload an image, the
face encodings of the image are extracted and then
compared to the face encodings of the images
stored in the database. If the distance between the
encoding of the uploaded image and the encoding
of the image in the database is less than or equal to
the threshold, then the face in both the images is of
the same person as shown in Figure 3 and Figure 4.
If that is the case, the user is notified that a match is
found along with the picture from the database that
matched with the uploaded picture. If the distance
between the encodings is more than the threshold, it
means that the faces in the images are not of the
same person’s. By this way, our proposed system
will help in identifying the missingpeople.
Fig 6: Comparing Face encodings of two images
The model we have used involves three main
steps to perform face recognition.
STEP 1: Face detection – Firstly, face patterns are
generated using Histogram of Oriented Gradients
(HOG) algorithm. The images are made black and
white. Here, the part of the images that looks more
like the original HOG face pattern is found. Finally,
the detected face is bounded by a bounding box.
STEP 2: Sixty-eight specific points (landmarks)
that are existing on every face are figured out by
using the face landmark estimation algorithm.
From the landmarks found, image transformations
like scaling, shearing and rotation are used by the
OpenCV’s affine transformation to make the lips
4. International Journal of Trendy Research in Engineering andTechnology
Volume 4 Issue 4 August 2020
ISSN NO 2582-0958
www.trendytechjournals.com
11
and eyes appear in the same location on every
image.
STEP 3: The face images are then passed through
deep convolutional neural network. By doing this,
we obtain 128 measurements which are 128-
dimension hyper sphere. And no one knows which
parts of the face the 128 measurements representing.
All we know is that the network outputs the same
128 numbers for two different images of the same
person.
STEP 4: Finally, a linear SVM classifier is used to
recognize the face. The classifier has been trained in
such a way that it can take the measurements from a
test image and gives the closest match as output.
Fig 7: Interface for the system built using the Flask
framework
A Flask API interface accompanies our model to
give the user a better user experience as shown in
Figure 7. When the user opens our application they
will be asked to upload an image of the missing
person. If a match is found, they will have provided
with the image and details about the match. If match
is not found, they will be asked if they want to
register that image as a new entry into our database.
If they wish to register, they will be asked to enter
the details about the image as shown in figure8.
Fig 8: Face Registration form
V. RESULTS
The Face Recognition model we used has an
accuracy of 99.38% on the Labelled Faces in the
Wild Benchmark which comprises of 13,000
images The testing conducted by us yielded an
accuracy of 97.5% where the dataset included 82
images – 41 pairs which included images of kids,
teens, adults (male and female) with age gap,
different hairstyles, filters etc. The dataset we used
is taken from ML kit.
VI. CONCLUSION AND FUTURE SCOPE
By this way, the process of identifying the missing
people is fastened. Our system replaces the manual
method of scanning through the databases for each
picture to check the match, by an efficient face
recognition method which finishes the work in
notime.
Though our system has a small limitation i.e. when
the age of the person is between the age 0 and 10
the accuracy drops. This is due to the incomplete
growth of facial features at that age. We look
forward to overcome this limitation in the future.
VII. REFERENCES
1.Android Based Application on “Missing Person
Finder” Rahul Mote, PoojaRakate, DipaliThavare,
RahulPatil, Mrs. Sonali Pakhmode Department of
Information Technology Mumbai University,
Padmabhushan Vasantdada Patil Pratishthan’s
5. International Journal of Trendy Research in Engineering andTechnology
Volume 4 Issue 4 August 2020
ISSN NO 2582-0958
www.trendytechjournals.com
12
College of Engineering Sion, Chunabhatti,
Mumbai– 400022
2.An Image Matching Method Based On the
Analysis of Grey Correlation Degree and Feature
Points, Zishuo Ding, Shuo Qian, Yulin Li, Zhaohui
Li School of Software Engineering Beijing
University of Posts and Telecommunications
Beijing, China
3.Review of existing algorithms for face detection
and recognition. NURULHUDA ISMAIL, MAS
IDAYU MD. SABRI Department of System and
Computer Technology (Multimedia), Faculty of
Computer Science and Information Technology,
University of Malaya, 50603 LembahPantai, Kuala
Lumpur, MALAYSIA
4.Image Matching Using SIFT, SURF, BRIEF and
ORB: Performance Comparison for Distorted
Images. Ebrahim Karami, Siva Prasad, and
Mohamed Shehata Faculty of Engineering and
Applied Sciences, Memorial University, Canada.
5.Khoya –Paya Application and website.
http://khoyapaya.gov.in/mpp/home