194,820 research outputs found

    An Interactive Robust Artificial Intelligence-based Defense Electro Robot (RAIDER) using a Pan-Tilt-Zoom Camera

    Get PDF
    The Vision Lab’s Robust Artificial Intelligence-based Defense Electro Robot (RAIDER) is an integrated electro-mechanical system equipped with an onboard processor and numerous imaging sensors. The RAIDER is built upon the Clearpath Husky A200 mobile base. In a multidisciplinary effort, the newly constructed robotic body houses the onboard laptop, GPU processor, LAN, IP cameras, and Kinect sensors. In our previous experiments and efforts, we shown the capability of computing a 3D model of the surrounding scene from motion imagery. We have tested autonomous navigation algorithms in which the RAIDER was to follow a particular person in a crowded environment. Algorithmic enhancements have integrated the 3D depth information into the person-tracking technique to allow for following a person around sharp corners. These navigation and controls algorithms call for an accurate face detection and recognition system as well as a human body detection and recognition system. Additionally, we have integrated a Play Station 2 wireless controller to remotely maneuver the RAIDER and activate various autonomy modes. In this poster, we present our latest effort in integrating face detection with the Pan-Tilt-Zoom (PTZ) base of an Axis camera. Positioned on top of the RAIDER, the PTZ-base will allow for the RAIDER to mimic a human’s ability to “look around” or “follow a person with only the eyes,” specifically without physically turning the robotic body. The face detection algorithm provides the location of a face within the images, the PTZ is constantly tracking the face and adjusting to keep it in the center of the image. Additional RAIDER projects work on integrating a speaker system that would vocalizes pre-defined phrases triggered by the recognition of specific persons. This would allow the RAIDER to vocalize “Hello” to people trained into its recognition system. These new artificial-intelligence RAIDER innovations create a more interactive human-like robotic system.https://ecommons.udayton.edu/stander_posters/1390/thumbnail.jp

    The Office Room Security System Using Face Recognition Based on Viola-Jones Algorithm and RBFN

    Get PDF
    The university as an educational institution can apply technology in the campus environment. Currently, the security system for office space that is integrated with digital data has been somewhat limited. The main problem is that office space security items are not guaranteed as there might be outsiders who can enter the office. Therefore, this study aims to develop a system using biometric (face) recognition based on Viola-Jones and Radial Basis Function Network (RBFN) algorithm to ensure office room security. Based on the results, the system developed shows that object detection can work well with an object detection rate of 80%. This system has a pretty good accuracy because the object matching success is 73% of the object detected. The final result obtained from this study is a prototype development for office security using face recognition features that are useful to improve safety and comfort for occupants of office space (due to the availability of access rights) so that not everyone can enter the office.The university as an educational institution can apply technology in the campus environment. Currently, the security system for office space that is integrated with digital data has been somewhat limited. The main problem is that office space security items are not guaranteed as there might be outsiders who can enter the office. Therefore, this study aims to develop a system using biometric (face) recognition based on Viola-Jones and Radial Basis Function Network (RBFN) algorithm to ensure office room security. Based on the results, the system developed shows that object detection can work well with an object detection rate of 80%. This system has a pretty good accuracy because the object matching success is 73% of the object detected. The final result obtained from this study is a prototype development for office security using face recognition features that are useful to improve safety and comfort for occupants of office space (due to the availability of access rights) so that not everyone can enter the office

    Motion Detection and Face Recognition for CCTV Surveillance System

    Get PDF
    Closed Circuit Television (CCTV) is currently used in daily life for a variety purpose. Development of the use of CCTV has transformed from a simple passive surveillance into an integrated intelligent control system. In this research, motion detection and facial recognation in CCTV video is done to be a base for decision making to produce automated, effective and efficient integrated system. This CCTV video processing provides three outputs, a motion detection information, a face detection information and a face identification information. Accumulative Differences Images (ADI) used  for motion detection, and Haar Classifiers Cascade used  for facial segmentation. Feature extraction is done with Speeded-Up Robust Features (SURF) and Principal Component Analysis (PCA). The features was trained by Counter-Propagation Network (CPN). Offline tests performed on 45 CCTV video. The test results obtained a motion detection success rate of 92,655%, a face detection success rate of 76%, and a face detection success rate of 60%. The results concluded that the process of faces identification through CCTV video with natural background have not been able to obtain optimal results. The motion detection process is ideal to be applied to real-time conditions. But in combination with face recognition process, there is a significant delay time

    Toward an Integrated System for Surveillance and Behaviour Analysis of Groups and People

    Get PDF
    Security and INTelligence SYStem is an Italian research project which aims to create an integrated system for the analysis of multi-modal data sources (text, images, video, audio), to assist operators in homeland security applications. Within this project the Scientific Research Unit of the University of Palermo is responsible of the image and video analysis activity. The SRU of Palermo developed a web service based architecture that provides image and video analysis capabilities to the integrated analysis system. The developed architecture uses both state of the art techniques, adapted to cope with the particular problem at hand, and new algorithms to provide the following services: image cropping, image forgery detection, face and people detection, weapon detection and classification, and terrorist logo recognition. In the last phase of the project we plan to include in our system new services, mainly oriented to the video analysis, to study and understand the behaviour of individuals, either alone or in a group

    Real time face matching with multiple cameras using principal component analysis

    Get PDF
    Face recognition is a rapidly advancing research topic due to the large number of applications that can benefit from it. Face recognition consists of determining whether a known face is present in an image and is typically composed of four distinct steps. These steps are face detection, face alignment, feature extraction, and face classification [1]. The leading application for face recognition is video surveillance. The majority of current research in face recognition has focused on determining if a face is present in an image, and if so, which subject in a known database is the closest match. This Thesis deals with face matching, which is a subset of face recognition, focusing on face identification, yet it is an area where little research has been done. The objective of face matching is to determine, in real-time, the degree of confidence to which a live subject matches a facial image. Applications for face matching include video surveillance, determination of identification credentials, computer-human interfaces, and communications security. The method proposed here employs principal component analysis [16] to create a method of face matching which is both computationally efficient and accurate. This method is integrated into a real time system that is based upon a two camera setup. It is able to scan the room, detect faces, and zoom in for a high quality capture of the facial features. The image capture is used in a face matching process to determine if the person found is the desired target. The performance of the system is analyzed based upon the matching accuracy for 10 unique subjects

    IoT-Based Access Management Supported by AI and Blockchains

    Full text link
    Internet-of-Things (IoT), Artificial Intelligence (AI), and Blockchains (BCs) are essential techniques that are heavily researched and investigated today. This work here specifies, implements, and evaluates an IoT architecture with integrated BC and AI functionality to manage access control based on facial detection and recognition by incorporating the most recent state-of-the-art techniques. The system developed uses IoT devices for video surveillance, AI for face recognition, and BCs for immutable permanent storage to provide excellent properties in terms of image quality, end-to-end delay, and energy efficiency

    Penerapan Face Recognition Pada Sistem Presensi

    Get PDF
    The development of digital image technology is increasing nowadays. However, the use of image technology on surveillance cameras has not been optimally utilized. On the other hand, the various presence data monitoring systems that currently exist have their respective advantages and disadvantages, and need to be continuously developed so as to facilitate the data processing. The student attendance system at STT Bandung is basically good but it is still not optimal. The process of collecting student attendance data is still quite time-consuming and still allows human errors to occur in the data input process. Therefore, the author intends to help overcome this by utilizing face recognition technology in an integrated presence process. LBPH (Local Binary Pattern Histogram) is currently the best method in face recognition technology because the detection and recognition process is relatively fast and has the highest level of accuracy when compared to other methods. After testing the resilience of the system from the results of the prototyping that was built, the results obtained with a success rate of 86.85%

    A real-time facial expression recognition system for online games

    Get PDF
    Multiplayer online games (MOGs) have become increasingly popular because of the opportunity they provide for collaboration, communication, and interaction. However, compared with ordinary human communication, MOG still has several limitations, especially in communication using facial expressions. Although detailed facial animation has already been achieved in a number of MOGs, players have to use text commands to control the expressions of avatars. In this paper, we propose an automatic expression recognition system that can be integrated into an MOG to control the facial expressions of avatars. To meet the specific requirements of such a system, a number of algorithms are studied, improved, and extended. In particular, Viola and Jones face-detection method is extended to detect small-scale key facial components; and fixed facial landmarks are used to reduce the computational load with little performance degradation in the recognition accuracy

    A Real-Time Facial Expression Recognition System for Online Games

    Get PDF
    Multiplayer online games (MOGs) have become increasingly popular because of the opportunity they provide for collaboration, communication, and interaction. However, compared with ordinary human communication, MOG still has several limitations, especially in communication using facial expressions. Although detailed facial animation has already been achieved in a number of MOGs, players have to use text commands to control the expressions of avatars. In this paper, we propose an automatic expression recognition system that can be integrated into an MOG to control the facial expressions of avatars. To meet the specific requirements of such a system, a number of algorithms are studied, improved, and extended. In particular, Viola and Jones face-detection method is extended to detect small-scale key facial components; and fixed facial landmarks are used to reduce the computational load with little performance degradation in the recognition accuracy
    • …
    corecore