This document summarizes a student's presentation on identifying women harassment in public CCTV cameras using artificial intelligence techniques. The proposed system uses computer vision algorithms like human detection, gender prediction, and anomalous activity detection on live CCTV feeds to identify potential harassment situations and send alerts to local police. If a woman is detected alone in a public area at night, an alert would be triggered. The system is intended to help improve women's safety without requiring additional hardware beyond existing CCTV infrastructure.
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCEvivatechijri
Criminal Identification System allows the user to identify a certain criminal based on their biometrics. With advancements in security technology, CCTV cameras have been installed in many public and private areas to provide surveillance activities. The CCTV footage becomes crucial for understanding of the criminal activities that take place and to detect suspects. Additionallywhen a criminal is found it is difficult to locate and track him with just his image if he is on the run. Currently this procedure consists of finding such people in CCTV surveillance footage manually which is time consuming. It is also a tedious process as the resolution for such CCTV cameras is quite low. As a solution to these issues, the proposed system is developed to go through real time surveillance footage, detect and recognize the criminals based on reference datasets of criminals. The use of facial recognition for identifying criminals proves to bebeneficial. Once the best match is found the real time cropped image of the recognized criminal is saved which can be accessed by authorized officials for locating and tracking criminals or for further investigative use.
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCEvivatechijri
Criminal Identification System allows the user to identify a certain criminal based on their biometrics. With advancements in security technology, CCTV cameras have been installed in many public and private areas to provide surveillance activities. The CCTV footage becomes crucial for understanding of the criminal activities that take place and to detect suspects. Additionallywhen a criminal is found it is difficult to locate and track him with just his image if he is on the run. Currently this procedure consists of finding such people in CCTV surveillance footage manually which is time consuming. It is also a tedious process as the resolution for such CCTV cameras is quite low. As a solution to these issues, the proposed system is developed to go through real time surveillance footage, detect and recognize the criminals based on reference datasets of criminals. The use of facial recognition for identifying criminals proves to bebeneficial. Once the best match is found the real time cropped image of the recognized criminal is saved which can be accessed by authorized officials for locating and tracking criminals or for further investigative use.
This paper detailed about a smart alarm system for
women’s security. Women all over the world are facing much
unscrupulous physical irritation. This acquires a fast pace
due to lack of a suitable investigation system. The system look
like a group on the wrist merged with pressure switch as an
input which when triggers shows the result loud alarm
imposed for self-defensing purpose and send location and
messages to the emergency contacts. The whole process will
be held in Arduino Microcontroller. The digital switch
incorporates with the controlling unit. Whenever the user
presses the digital switch, the emergency message will be
passed to the server unit via GSM SIM 800A module. By
implementing the proposed system, the physical harassment
on the women will be reduced.
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfMahdi_Fahmideh
Digital Forensics for Artificial
Intelligence (AI ) Systems:
AI systems make decisions impacting our daily life Their actions might cause accidents, harm or, more generally, violate
regulations either intentionally or not and consequently might be considered suspects for various events. In this lecture we explore how digital forensics can be performed for AI based systems.
This paper detailed about a smart alarm system for
women’s security. Women all over the world are facing much
unscrupulous physical irritation. This acquires a fast pace
due to lack of a suitable investigation system. The system look
like a group on the wrist merged with pressure switch as an
input which when triggers shows the result loud alarm
imposed for self-defensing purpose and send location and
messages to the emergency contacts. The whole process will
be held in Arduino Microcontroller. The digital switch
incorporates with the controlling unit. Whenever the user
presses the digital switch, the emergency message will be
passed to the server unit via GSM SIM 800A module. By
implementing the proposed system, the physical harassment
on the women will be reduced.
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfMahdi_Fahmideh
Digital Forensics for Artificial
Intelligence (AI ) Systems:
AI systems make decisions impacting our daily life Their actions might cause accidents, harm or, more generally, violate
regulations either intentionally or not and consequently might be considered suspects for various events. In this lecture we explore how digital forensics can be performed for AI based systems.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
WH PAPER PRESENTATION PPT.pptx
1. Second International Conference on Advances in Engineering and Technology
(ICAET-2022)- (Online)
ICAET-2022
Organised by
RSP Conference Hub, Coimbatore, Tamilnadu, India
Date: 29/09/2022 & 30/09/2022
Paper ID :220946 Category : UG / PG / RS / Faculty
Paper Title : INDENTIFYING WOMEN HARASSMENT IN PUBLIC CCTV CAMERAS
USING ARTIFICIAL INTELLIGENCE TECHNIQUES
Presented by
Mr Ajay Vishal R P,
Student – UG
Bannari Amman Institute of Technology,
Erode, Tamil Nadu
Authors Details
Mr Sakthi Aravind J,
Mr Kuralamudhan J
Ms Harsha M R
Ms Pooja Shree C
Student - UG
Bannari Amman Institute of
Technology,
Erode, Tamil Nadu
Paper Id : 220946
Presenter Category : UG
3. ABSTRACT
3
The general public most likely living in
the most terrible time our cutting edge
society has at any point found concerning
ladies security . Ladies feel hazardous to
travel solo at odd hours. There are numerous
android applications that are created for
ladies' wellbeing. The proposed framework is
an endeavor made to take care of the issues
of ladies wellbeing.
Clearly there will be CCTV cameras in each
open spot. In the event that any uncommon
movement of an individual is perceived by a
camera, the alarm message will be shipped off
the close by police headquarters which makes
them alert. This undertaking is made for the
accommodations, everything being equal.
4. INTRODUCTION
4
• Among the most terrible nations
in
wrongdoing, India has a despicable
history in
all types of sexual double-dealing.
• The proposed framework is a
completely
coordinated progressed AI based
framework
which can obviously recognize
what is going
on of the casualty by utilizing
public CCTV
• Alarm message quickly to the close
by
control room or police headquarters
to
protect the concerned specialists
There are sure prior CCTV cameras that
really do make an impression on the saved
contacts yet not a solitary one of them is
compelling and adequately fast and as
indicated by an overview, the current
innovation doesn't encourage most ladies.
5. PROPOSED WORK
5
• Human Detection
• Gender Prediction
• Anomalous Activity
Detection
Despite the fact that there are a number of
particular applications and numerous IOT
based thoughts for ladies security, this
proposed framework requires no
extraordinary equipment to cycle.The
undertaking is ordered into three modules.
6. WORK FLOW
6
• Step1: Start
• Step 2: Access Live CCTV
camera stream.
• Step 3: Detects the Presence of
humans
• Step 4: If any human activity is
detected it will enter the next
module (i.e.) Gender prediction.
• Step 5: It will identify if any women
are there or not.
• Step 6: Then it will be looking
for anomalous activity.
• Step 7: If any activity is found it will
be sending an alert message to the
nearby police station or control
room
7. HUMAN DETECTION
7
• Surface based techniques
like Histograms of Oriented
Gradient (HOG) utilize high
layered highlights in view of edges
and use Support Vector Machine
(SVM) to identify human districts
• The standardized outcome gives
better execution on variety in light
and force.
• The HOG is contrast-standardized,
this is finished by working out
force over a bigger region a few
cells known as square, then this
worth is utilized to standardize all
cells inside that square.
The human arrangement strategies could be
partitioned into three classes: shape-based,
movement based and surface based.
8. GENDER PREDICTION
8
• Observation camera the alarm
message will be shipped off close
by police headquarters.
• Making age and orientation
assessment from a solitary
face picture a significant
assignment in astute applications,
for example, access
control, human-PC collaboration,
policing, knowledge and visual
reconnaissance, and so on
• Age is one of the vital
facial credits, playing a very
essential job in friendly
connections
Assuming a female is remaining solitary in a
rail line station or in some other public places
particularly at evening time's is identified under
a live observation
9. ANOMALOUS
ACTIVITY
DETECTION
9
• The calculation will be searching for an
uncommon movement, for
example, running and so forth.
Assuming that any such sort of action is
distinguished the message will be
shipped off the close by
police headquarters.
• We propose a MIL positioning
misfortune with meagerly
and perfection imperatives for a
profound learning organization to
advance abnormality scores for
video fragments.
• We treat all irregular recordings
as one class and
typical recordings as another
class.
In the event that expect that, there are numerous
ladies remaining in a typical spot. It will be
considered as an ordinary action and on that
time assuming the message is conveyed to the
close by police headquarters it very well may be
set apart as spam.
10. ACCURACY
10
0
1
2
3
4
5
6
Category 1 Category 2 Category 3 Category 4
Chart Title
Series 1 Series 2 Series 3
The lower the percentile edge,
the higher the quantity of cells we
group as hazardous and the higher
is our model precision, yet is it great.
We need to track down the ideal
harmony between risk grouping and
model precision to get the best end-
client experience. There is definitely
not a solitary issue that can be more
terrible for an
individual's encounter than trust on
an application that is letting them
know that they are venturing into a
protected zone and end up being a
survivor of wrongdoing.
11. CONCLUSION
A ton of NGOs restoration focuses and helpline
numbers have been made functional in the
previous years however they are largely fixes to
the badgering that has proactively occurred
and not the counteraction that we want. There
are sure previous applications that truly do
make an impression on the saved contacts yet
not a solitary one of them is compelling
and adequately speedy and as indicated by a
study the current innovation doesn't encourage
most ladies.