Student: Dane Brown 2713985 Supervisor : James Connan and Mehrdad Ghaziasgar.

Slides:



Advertisements
Similar presentations
Not so Smart park Have you ever drove into large parking lot not knowing that it is completely full?
Advertisements

ETISEO Project Corpus data - Video sequences contents - Silogic provider.
INTRODUCTION. FEATURES PORTABLE AND ROBUST SELF CONTAINED MOTION DETECTION TO 15 METERS DAY/NIGHT CCTV CAMERAS 3G/4G/WIFI CONECTIVITY AUDIO CHALLENGE.
NATHAN DE LA CRUZ SUPERVISOR: MEHRDAD GHAZIASGAR MENTORS: DANE BROWN AND DIEGO MUSHFIELDT Lie Detection System Using Facial Expressions.
BREAK AWAY SESSION – CAMPROSA CONFERENCE ON BOARD M.S.C. SINFONIA 8-11 NOVEMBER 2011 FORENSIC EVALUATION OF CCTV FOOTAGE Camprosa conference 8-11 november.
LING 111 Teaching Demo By Tenghui Zhu Introduction to Edge Detection Image Segmentation.
Student: Ibraheem Frieslaar Supervisor: Mehrdad Ghaziasgar.
Multiple People Detection and Tracking with Occlusion Presenter: Feifei Huo Supervisor: Dr. Emile A. Hendriks Dr. A. H. J. Stijn Oomes Information and.
Student: Jihaad Pienaar Supervisor: Mr Mehrdad Ghaziasgar Co-Supervisor: Mr James Connan Mentors: Mr Roland Foster & Mr Kenzo Abrahams Anaglyph Videos.
“Green Light Wave” Traffic Control System Liron Netzer - CITI Yossi Gabay - Marvell Shay Avivi - Motorola Solutions.
Automated Parking Lot Attendant SDP ’07 Team Frasier Tom Cleary Matt Regan Bill Ryan Adam Bailin.
Face Detection: a Survey Speaker: Mine-Quan Jing National Chiao Tung University.
CS 376b Introduction to Computer Vision 04 / 01 / 2008 Instructor: Michael Eckmann.
CSE 291 Final Project: Adaptive Multi-Spectral Differencing Andrew Cosand UCSD CVRR.
Chapter 2, Part 1 September 2, You and your dog go for a walk to the park. On the way, your dog takes many side trips to chase squirrels or examine.
- TECHLEAD SOFTWARE ENGINEERING PVT. LTD. Video Analytics.
ICBV Course Final Project Arik Krol Aviad Pinkovezky.
By: Hossein and Hadi Shayesteh Supervisor: Mr. James Connan.
Kalman Tracking for Image Processing Applications Student : Julius Oyeleke Supervisor : Dr Martin Glavin Co-Supervisor : Dr Fearghal Morgan.
SG-VoIP Page 1 / 14 PLANET Pan / Tilt Internet Camera Internet Surveillance Solution.
Augmented Reality and 3D modelling Done by Stafford Joemat Supervised by Mr James Connan and Mr Mehrdad Ghaziasgar.
ELECTRONIC CONDUCTING SYSTEM Kenzo Abrahams Supervisor: Mehrdad Ghaziasgar Co-supervisor: James Connan Assisted by: Diego Mushfieldt.
By Roland Foster Supervisors: Mr. Mehrdad Ghaziasgar Mr. James Connan Mentor: Mr. Warren Nel.
Anaglyph Videos Student:Jihaad Pienaar Supervisor: Mehrdad Ghaziasgar & James Connan Mentors: Roland Foster & Kenzo Abrahams.
By: Hadley Scholtz Supervisor: Mehrdad Ghaziasgar Co – supervisor: James Connan Assisted by: Ibraheem Frieslaar.
Implementing Codesign in Xilinx Virtex II Pro Betim Çiço, Hergys Rexha Department of Informatics Engineering Faculty of Information Technologies Polytechnic.
By Roland Foster Supervisors: Mr. Mehrdad Ghaziasgar Mr. James Connan Mentor: Mr. Warren Nel.
By: Hadley Scholtz Supervisor: Mehrdad Ghaziasgar Co - supervisor: James Connan Mentor: Ibraheem Frieslaar.
By: Hadley Scholtz Supervisor: Mehrdad Ghaziasgar Co - supervisor: James Connan Mentor: Ibraheem Frieslaar.
By: Kenzo Abrahams Supervisor: Mehrdad Ghaziasgar Co-supervisor: James Connan Mentored by: Diego Mushfieldt.
A study on face system Speaker: Mine-Quan Jing National Chiao Tung University.
Crowd Analysis at Mass Transit Sites Prahlad Kilambi, Osama Masound, and Nikolaos Papanikolopoulos University of Minnesota Proceedings of IEEE ITSC 2006.
Anaglyph Videos Student:Jihaad Pienaar Supervisor: Mr Mehrdad Ghaziasgar Co-Supervisor:Mr James Connan Mentors: Mr Roland Foster & Mr Kenzo Abrahams.
Kearan Mc Pherson Mr. J. Connan. Overview Introduction Design Decisions Implementation Project Plan Demo.
` Tracking the Eyes using a Webcam Presented by: Kwesi Ackon Kwesi Ackon Supervisor: Mr. J. Connan.
Jack Pinches INFO410 & INFO350 S INFORMATION SCIENCE Computer Vision I.
Student Name: Honghao Chen Supervisor: Dr Jimmy Li Co-Supervisor: Dr Sherry Randhawa.
CAPTURING, ENCODING AND RENDERING GESTURES USING THE KINECT by Adan Patience Supervisor: Mr Mehrdad Ghazi-Asgar.
Student: Ibraheem Frieslaar Supervisor: Mehrdad Ghaziasgar.
Virtual Desktop Peephole By Kyle Patience Supervisor: Reginald Dodds Co Supervisor: Mehrdad Ghaziasgar.
Virtual Desktop Peephole By Kyle Patience Supervisor: Reginald Dodds Co Supervisor: Mehrdad Ghaziasgar.
Fish Identification Systems Thabang Kgwefane Supervised by Mehrdad Gazi-Asgar & James Connan.
By Roland Foster Supervisors: Mr. Mehrdad Ghaziasgar Mr. James Connan Mentor: Mr. Warren Nel.
Student: Ibraheem Frieslaar Supervisor: Mehrdad Ghaziasgar.
Augmented Reality and 3D modelling Done by Stafford Joemat Supervised by Mr James Connan.
Willowild & Hurlingham 5 RA SECURITY Meeting 27 June 2015 Introduction: BACKGROUND – history, achievements, crime rates Concerns: BOOMS – guards, effectiveness.
Type of Vehicle Recognition Using Template Matching Method Electrical Engineering Department Petra Christian University Surabaya - Indonesia Thiang, Andre.
By: Hossein and Hadi Shayesteh Supervisor: Mr. James Connan.
Student: Thabang Kgwefane Supervisor: James Connan.
Anaglyph Videos Student:Jihaad Pienaar Supervisor: Mr Mehrdad Ghaziasgar Co-Supervisor:Mr James Connan Mentors: Mr Roland Foster & Mr Kenzo Abrahams.
Augmented Reality and 3D modelling Done by Stafford Joemat Supervised by Mr James Connan and Mehrdad Ghaziasgar.
Detection, Tracking and Recognition in Video Sequences Supervised By: Dr. Ofer Hadar Mr. Uri Perets Project By: Sonia KanOra Gendler Ben-Gurion University.
Student: Dane Brown Supervisor : James Connan Co-Supervisor : Mehrdad Ghaziasgar.
SEMINAR ON TRAFFIC MANAGEMENT USING IMAGE PROCESSING by Smruti Ranjan Mishra (1AY07IS072) Under the guidance of Prof Mahesh G. Acharya Institute Of Technology.
SmartCatch Systems Putting Intelligence into Surveillance
Day 3: computer vision.
Tracking the eyes using a webcam
Face Detection for Access Control
CS201 Lecture 02 Computer Vision: Image Formation and Basic Techniques
By SAIKUMAR KEESARI VAMSI KRISHNA EDARA
FISH IDENTIFICATION SYSTEM
Detecting Room Occupancy with Pi Camera
SUSPICIOUS ACTIVITY DETECTION
AHED Automatic Human Emotion Detection
AHED Automatic Human Emotion Detection
Tracking the Eyes using a Webcam
FISH IDENTIFICATION SYSTEM
FISH IDENTIFICATION SYSTEM
Surveillance Group Weekly Report
AUTOMATED VALET PARKING
Presentation transcript:

Student: Dane Brown Supervisor : James Connan and Mehrdad Ghaziasgar

OVERVIEW  INTRODUCTION  DESIGN DECISIONS  IMPLEMENTATION  PROJECT PLAN  DEMO

INTRODUCTION  Extremely high crime rate in South Africa Car break-in rate was in times the rate of USA Carjacking is the most common crime in South Africa Costing tax payers billions of rands!

INTRODUCTION cont.

 CCTV cameras Human monitored Current solution ineffective Continued high break-in rate

INTRODUCTION cont.

DESIGN DECISIONS

IMPLEMENTATION  Original frame in RGB colour

IMPLEMENTATION cont.  Gray Scale and Frame differencing

IMPLEMENTATION cont.  Motion History Image (MHI)

IMPLEMENTATION cont.  Blob and movement detection (using MHI)

IMPLEMENTATION cont.  Blob and movement detection

IMPLEMENTATION cont.  Blob and movement detection

IMPLEMENTATION cont.  System determines normal activity Park car

IMPLEMENTATION cont.  System determines normal activity Park car

IMPLEMENTATION cont.  System determines normal activity Get out

IMPLEMENTATION cont.  System determines normal activity Walk away

IMPLEMENTATION cont.  System determines normal activity Walk away

IMPLEMENTATION cont.  System determines normal activity Get back in

IMPLEMENTATION cont.  System determines normal activity Drive away

IMPLEMENTATION cont.  System determines normal activity Drive away

IMPLEMENTATION cont.  System determines suspicious activity Loitering next to a vehicle is suspicious

IMPLEMENTATION cont.  System determines suspicious activity Loitering next to a vehicle is suspicious

IMPLEMENTATION cont.  System determines suspicious activity Loitering next to a vehicle is suspicious

IMPLEMENTATION cont.  System determines suspicious activity Loitering next to a vehicle is suspicious

IMPLEMENTATION cont.  System determines suspicious activity Loitering next to a vehicle is suspicious

IMPLEMENTATION cont.  System determines suspicious activity Loitering next to a vehicle is suspicious

IMPLEMENTATION cont.

 Suspicious activity detected!

 1. Normal activity - typical drive away  2. Suspicious - two men loitering  3. Suspicious - Stationary  4. Suspicious - Acceleration DEMO

REFERENCES  Davis, J. W. (2005). Motion History Image. Retrieved 2010, from The Ohia State University.  Green, B. (2002). Histogram, Thresholding and Image Centroid Tutorial. Retrieved 2010, from Drexel University site.  Trip Atlas. (2010). Retrieved from Carjacking:  Hijacking. (2010). Retrieved from Arrive Alive: