• Title/Summary/Keyword: People Detection

Search Result 671, Processing Time 0.027 seconds

Face Detection Using Edge Orientation Map and Local Color Information (에지 방향 지도와 영역 컬러 정보를 이용한 얼굴 추출 기법)

  • Kim, Jae-Hyup;Moon, Young-Shik
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.987-990
    • /
    • 2005
  • An important issue in the field of face recognitions and man-machine interfaces is an automatic detection of faces in visual scenes. it should be computationally fast enough to allow an online detection. In this paper we describe our ongoing work on face detection that models the face appearance by edge orientation and color distribution. We show that edge orientation is a powerful feature to describe objects like faces. We present a method for face region detection using edge orientation and a method for face feature detection using local color information. We demonstrate the capability of our detection method on an image database of 1877 images taken from more than 700 people. The variations in head size, lighting and background are considerable, and all images are taken using low-end cameras. Experimental results show that the proposed scheme achieves 94% detection rate with a resonable amount of computation time.

  • PDF

ENHANCEMENT OF FACE DETECTION USING SPATIAL CONTEXT INFORMATION

  • Min, Hyun-Seok;Lee, Young-Bok;Lee, Si-Hyoung;Ro, Yong-Man
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.108-113
    • /
    • 2009
  • Significant attention has recently been drawn to digital home photo albums that use face detection technology. The tendency can be found in home photo albums that people prefer to allocate concerned objects in the center of the image rather than the boundary when they take a picture. To improve detection performance and speed that are important factors of face detection task, this paper proposes a face detection method that takes spatial context information into consideration. Experiments were performed to verify the usefulness of the proposed method and results indicate that the proposed face detection method can efficiently reduce the false positive rate as well as the runtime of face detection.

  • PDF

Deep Learning Based Drone Detection and Classification (딥러닝 기반 드론 검출 및 분류)

  • Yi, Keon Young;Kyeong, Deokhwan;Seo, Kisung
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.68 no.2
    • /
    • pp.359-363
    • /
    • 2019
  • As commercial drones have been widely used, concerns for collision accidents with people and invading secured properties are emerging. The detection of drone is a challenging problem. The deep learning based object detection techniques for detecting drones have been applied, but limited to the specific cases such as detection of drones from bird and/or background. We have tried not only detection of drones, but classification of different drones with an end-to-end model. YOLOv2 is used as an object detection model. In order to supplement insufficient data by shooting drones, data augmentation from collected images is executed. Also transfer learning from ImageNet for YOLOv2 darknet framework is performed. The experimental results for drone detection with average IoU and recall are compared and analysed.

Phishing Attack Detection Using Deep Learning

  • Alzahrani, Sabah M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.213-218
    • /
    • 2021
  • This paper proposes a technique for detecting a significant threat that attempts to get sensitive and confidential information such as usernames, passwords, credit card information, and more to target an individual or organization. By definition, a phishing attack happens when malicious people pose as trusted entities to fraudulently obtain user data. Phishing is classified as a type of social engineering attack. For a phishing attack to happen, a victim must be convinced to open an email or a direct message [1]. The email or direct message will contain a link that the victim will be required to click on. The aim of the attack is usually to install malicious software or to freeze a system. In other instances, the attackers will threaten to reveal sensitive information obtained from the victim. Phishing attacks can have devastating effects on the victim. Sensitive and confidential information can find its way into the hands of malicious people. Another devastating effect of phishing attacks is identity theft [1]. Attackers may impersonate the victim to make unauthorized purchases. Victims also complain of loss of funds when attackers access their credit card information. The proposed method has two major subsystems: (1) Data collection: different websites have been collected as a big data corresponding to normal and phishing dataset, and (2) distributed detection system: different artificial algorithms are used: a neural network algorithm and machine learning. The Amazon cloud was used for running the cluster with different cores of machines. The experiment results of the proposed system achieved very good accuracy and detection rate as well.

An Abnormal Worker Movement Detection System Based on Data Stream Processing and Hierarchical Clustering

  • Duong, Dat Van Anh;Lan, Doi Thi;Yoon, Seokhoon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.88-95
    • /
    • 2022
  • Detecting anomalies in human movement is an important task in industrial applications, such as monitoring industrial disasters or accidents and recognizing unauthorized factory intruders. In this paper, we propose an abnormal worker movement detection system based on data stream processing and hierarchical clustering. In the proposed system, Apache Spark is used for streaming the location data of people. A hierarchical clustering-based anomalous trajectory detection algorithm is designed for detecting anomalies in human movement. The algorithm is integrated into Apache Spark for detecting anomalies from location data. Specifically, the location information is streamed to Apache Spark using the message queuing telemetry transport protocol. Then, Apache Spark processes and stores location data in a data frame. When there is a request from a client, the processed data in the data frame is taken and put into the proposed algorithm for detecting anomalies. A real mobility trace of people is used to evaluate the proposed system. The obtained results show that the system has high performance and can be used for a wide range of industrial applications.

Esophageal/Gastric Cancer Screening in High-risk Populations in Henan Province, China

  • Lu, Yu-Fei;Liu, Zhi-Cai;Li, Zhong-Hong;Ma, Wen-Hao;Wang, Fu-Rang;Zhang, Ya-Bing;Lu, Jian-Bang
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.3
    • /
    • pp.1419-1422
    • /
    • 2014
  • Objective: To summarize the endoscopic screening findings in high-risk population of esophageal and gastric carcinoma and analyze influential factors related to screening. Methods: In seven selected cities and counties with high incidences of esophageal carcinoma, people at age of 40-69 were set as the target population. Those with gastroscopy contradictions were excluded, and all who were voluntary and willing to comply with the medical requirements were subjected to endoscopic screening and histological examination for esophageal, gastric cardia and gastric carcinoma in accordance with national technical manual for early detection and treatment of cancer. Results: In three years, 36,154 people were screened, and 16,847 (46.60%) cases were found to have precancerous lesions. A total of 875 cases were found to have cancers (2.42%), and among them 739 cases had early stage with an early diagnosis rate is 84.5%. Some 715 patients underwent prompt treatment and the success rate was 81.8%. Conclusions: In a high-risk population of esophageal and gastric carcinoma, it is feasible to implement early detection and treatment by endoscopic screening. Screening can identify potential invasive carcinoma, early stage carcinoma and precancerous lesions, improving efficacy through early detection and treatment. The exploratory analysis of related influential factors will help broad implementation of early detection and treatment for esophageal and gastric carcinoma.

Diabetes Detection and Forecasting using Machine Learning Approaches: Current State-of-the-art

  • Alwalid Alhashem;Aiman Abdulbaset ;Faisal Almudarra ;Hazzaa Alshareef ;Mshari Alqasoumi ;Atta-ur Rahman ;Maqsood Mahmud
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.199-208
    • /
    • 2023
  • The emergence of COVID-19 virus has shaken almost every aspect of human life including but not limited to social, financial, and economic changes. One of the most significant impacts was obviously healthcare. Now though the pandemic has been over, its aftereffects are still there. Among them, a prominent one is people lifestyle. Work from home, enhanced screen time, limited mobility and walking habits, junk food, lack of sleep etc. are several factors that have still been affecting human health. Consequently, diseases like diabetes, high blood pressure, anxiety etc. have been emerging at a speed never witnessed before and it mainly includes the people at young age. The situation demands an early prediction, detection, and warning system to alert the people at risk. AI and Machine learning has been investigated tremendously for solving the problems in almost every aspect of human life, especially healthcare and results are promising. This study focuses on reviewing the machine learning based approaches conducted in detection and prediction of diabetes especially during and post pandemic era. That will help find a research gap and significance of the study especially for the researchers and scholars in the same field.

A Study on the Elevator System Using Real-time Object Detection Technology YOLOv5 (실시간 객체 검출 기술 YOLOv5를 이용한 스마트 엘리베이터 시스템에 관한 연구)

  • Sun-Been Park;Yu-Jeong Jeong;Da-Eun Lee;Tae-Kook Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.103-108
    • /
    • 2024
  • In this paper, a smart elevator system was studied using real-time object detection technology based on YOLO(You only look once)v5. When an external elevator button is pressed, the YOLOv5 model analyzes the camera video to determine whether there are people waiting, and if it determines that there are no people waiting, the button is automatically canceled. The study introduces an effective method of implementing object detection and communication technology through YOLOv5 and MQTT (Message Queuing Telemetry Transport) used in the Internet of Things. And using this, we implemented a smart elevator system that determines in real time whether there are people waiting. The proposed system can play the role of CCTV (closed-circuit television) while reducing unnecessary power consumption. Therefore, the proposed smart elevator system is expected to contribute to safety and security issues.

Procedures for Detecting Multiple Outliers in Linear Regression Using R

  • Kwon, Soon-Sun;Lee, Gwi-Hyun;Park, Sung-Hyun
    • Proceedings of the Korean Statistical Society Conference
    • /
    • 2005.11a
    • /
    • pp.13-17
    • /
    • 2005
  • In recent years, many people use R as a statistics system. R is frequently updated by many R project teams. We are interested in the method of multiple outlier detection and know that R is not supplied the method of multiple outlier detection. In this talk, we review these procedures for detecting multiple outliers and provide more efficient procedures combined with direct methods and indirect methods using R.

  • PDF