TEMPLATE DESIGN © 2008 www.PosterPresentations.com E-Eye : A Multi Media Based Unauthorized Object Identification and Tracking System Tolgahan Cakaloglu.

Slides:



Advertisements
Similar presentations
10 september 2002 A.Broersen Developing a Virtual Piano Playing Environment By combining distributed functionality among independent Agents.
Advertisements

GMD German National Research Center for Information Technology Darmstadt University of Technology Perspectives and Priorities for Digital Libraries Research.
Technical and design issues in implementation Dr. Mohamed Ally Director and Professor Centre for Distance Education Athabasca University Canada New Zealand.
The recent technological advances in mobile communication, computing and geo-positioning technologies have made real-time transit vehicle information systems.
Business Development Suit Presented by Thomas Mathews.
Project Supervisor: Dr. Sanath Jayasena Project Coordinator: Mr. Shantha Fernando Athukorala A.U.B Dissanayake C.P. Kumara M.G.C.P. Priyadarshana G.V.J.
Components of GIS.
DESIGN AND IMPLEMENTATION OF SOFTWARE COMPONENTS FOR A REMOTE LABORATORY J. Fernandez, J. Crespo, R. Barber, J. Carretero University Carlos III of Madrid.
Overview I-LINE2 is a browser based, train weight management software package, designed to provide an information interface for Weighline and Streamline.
Real-Time Authentication Using Digital Signature Schema Marissa Hollingsworth BOISECRYPT ‘09.
Front and Back End: Webpage and Database Management Prepared by Nailya Galimzyanova and Brian J Kapala Supervisor: Prof. Adriano Cavalcanti, PhD College.
Presentation Outline  Project Aims  Introduction of Digital Video Library  Introduction of Our Work  Considerations and Approach  Design and Implementation.
ADVISE: Advanced Digital Video Information Segmentation Engine
© 2009 Research In Motion Limited Methods of application development for mobile devices.
Presentation Outline  Project Aims  Introduction of Digital Video Library  Introduction of Our Work  Considerations and Approach  Design and Implementation.
Research overview: Mobile Phones, RFID and TV. Mobile phones + RFID Mobile phones with embedded RFID + camera – Lead to interesting Pervasive applications.
Conversion of the Computer Aided Instruction Tools to use Database Connectivity International Conference on Computer Science and its Applications 2004.
ICPCA 2008 Research of architecture for digital campus LBS in Pervasive Computing Environment 1.
Remote Surveillance System Presented by: Robarin Holdings Limited Telephone: Facsimile:
Your Interactive Guide to the Digital World Discovering Computers 2012.
ICT Scope and Sequence Sekolah Ciputra 2010.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
WEB DESIGNING Prof. Jesse A. Role Ph. D TM UEAB 2010.
Video Surveillance Capturing, Management and Analysis of Security Videos. -Abhinav Goel -Varun Varshney.
Android and Eclipse Thaddeus Diamond CPSC 112. A Quick Introduction Eclipse is an IDE (Integrated Development Environment Open Source Much more full-featured.
Ambulation : a tool for monitoring mobility over time using mobile phones Computational Science and Engineering, CSE '09. International Conference.
These materials are prepared only for the students enrolled in the course Distributed Software Development (DSD) at the Department of Computer.
Copyright © 2012 Accenture All Rights Reserved.Copyright © 2012 Accenture All Rights Reserved. Accenture, its logo, and High Performance Delivered are.
Systems Analysis – Analyzing Requirements.  Analyzing requirement stage identifies user information needs and new systems requirements  IS dev team.
Introduction To Computer System
Android SMIL Messenger Presented By: Alex Povkov Brad Gardner Jeremy Spitzig Santiago Jamriska.
Cullen College of Engineering RFID-Based Solutions for Piping Technology Piping Tech & UH July, 2007.
Secure Search Engine Ivan Zhou Xinyi Dong. Introduction  The Secure Search Engine project is a search engine that utilizes special modules to test the.
Web Designing By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore.
Presented by Abirami Poonkundran.  Introduction  Current Work  Current Tools  Solution  Tesseract  Tesseract Usage Scenarios  Information Flow.
Practical Project of the 2006 Joint International Master’s Degree.
Pi In The Sky (Web Interface) Gaston Seneza Philander Smith College, Little Rock, AR SIParCS Intern Mentors: Dr. Richard Loft & Dr. Raghu Raj Kumar 1.
SUPERVISOR: MR. J. CONNAN.  The main purpose of system is to track an object across multiple frames using fixed input source.
Data Visualization Project B.Tech Major Project Project Guide Dr. Naresh Nagwani Project Team Members Pawan Singh Sumit Guha.
MACIASZEK, L.A. (2001): Requirements Analysis and System Design. Developing Information Systems with UML, Addison Wesley Chapter 6 - Tutorial Guided Tutorial.
COMPUTER PARTS AND COMPONENTS INPUT DEVICES
Vclass Presentation Component Kanchana Kanchanasut, DEC Director Dr. Akavute Sujare, DEC Consultant Mr. Chaiwarat Chaiyapotpanit, Project Manager Distance.
Slide 1 Standard Grade Computing Multimedia and Presentation.
Web Controlled of Robot Georgi Chakarov Ivelin Stoyanov.
Engineering on Display: Back-End Development for Sensor Instrumentation Systems Student: Brian J Kapala Supervisor: Dr. Cavalcanti.
Database System Introduction to Database Environment October 31, 2009 Software Park, Bangkok Thailand Pree Thiengburanathum College of Arts and Media Chiang.
Ashley Montebello – CprE Katie Githens – SE Wayne Rowcliffe – SE Advisor/Client: Akhilesh Tyagi.
Real-Time Cyber Physical Systems Application on MobilityFirst Winlab Summer Internship 2015 Karthikeyan Ganesan, Wuyang Zhang, Zihong Zheng.
ELEMENTS OF A COMPUTER SYSTEM HARDWARE SOFTWARE PEOPLEWARE DATA.
Theia Technical Design Presentation 3. Theia Overview Theia’s purpose is to create three dimensional, virtual representations of a room. To allow the.
E-Learning Solution (MAXMEDIA) 2005 RealTimeTech, INC.
WS-DREAM: A Distributed Reliability Assessment Mechanism for Web Services Zibin Zheng, Michael R. Lyu Department of Computer Science & Engineering The.
Software Engineering Chapter: Computer Aided Software Engineering 1 Chapter : Computer Aided Software Engineering.
Semantic Extraction and Semantics-Based Annotation and Retrieval for Video Databases Authors: Yan Liu & Fei Li Department of Computer Science Columbia.
Digital Video Library Network Supervisor: Prof. Michael Lyu Student: Ma Chak Kei, Jacky.
Review 1 Chapters Chapter 1 Understanding Computers, 12th Edition 2 Chapter 1 Explain why it is essential to learn about computers today and discuss.
An Intelligent Expert System for Proactive Services Deploying Ubiquitous Computing Technologies IEEE 2005 Proceedings of the 38th Hawaii International.
START Application Spencer Johnson Jonathan Barella Cohner Marker.
Wednesday NI Vision Sessions
Google. Android What is Android ? -Android is Linux Based OS -Designed for use on cell phones, e-readers, tablet PCs. -Android provides easy access to.
By:- Punith Sharma Ashwath D S Adithya S Srimatha B V
Aindra Systems We See Things …
Sponsored by Portakal Technologies
Digital Video Library - Jacky Ma.
Technologies: for Enhancing Broadcast Programmes with Bridgets
Mixed Reality Server under Robot Operating System
Chapter I Introduction
Web Mining Department of Computer Science and Engg.
3rd Studierstube Workshop TU Wien
Knowledge Sharing Mechanism in Social Networking for Learning
Presentation transcript:

TEMPLATE DESIGN © E-Eye : A Multi Media Based Unauthorized Object Identification and Tracking System Tolgahan Cakaloglu and Coskun Bayrak Computer Science Department, University of Arkansas at Little Rock, 2801 S University Avenue Little Rock, AR Introduction  We developed a system called E-Eye: A Multi-Media based Unauthorized Object Identification and Tracking system that is able to identify the activities of objects through the use of readers, tags, multimedia composed of video cameras, global positioning systems, and a central interpreter system.  The goal of this study is to identify the unauthorized or suspicious object when necessary by focusing on it through the use of the camera surveillance and/or RFID technology in terms of tracking and GPS in terms of positional coordinates. Last but not least, all of these processes are managed by a central interpreter system according to the collected information in real- time. Architecture Overview System Guide Data Management  MySQL is the database used for storage purposes.  The database diagram of the system is presented in Figure 3. Screen Shots of the Conclusion  The E-Eye system is composed of five modules. Figure 1 shows the modules of the system. Figure 1 Computer Science Department, University of Arkansas at Little Rock, 2801 S University Avenue Little Rock, AR txcakaloglu |  General interactions of the modules are shown in Figure 2. It aims to identify, follow, match the objects and get its location in real-time. Figure 2  The web page of E-Eye System for officials, batch side and mobile Android application for GPS and RFID integration are coded by using Java technologies. The web page and batch side are deployed to the Apache Tomcat server.  Components of E-Eye as a system E-Eye-batch-interpreter : It is a central interpreting system which runs all basic automated functions in a batch mode. Detecting a motion in a camera view, storing a captured image in detected motion, finding searched objects in all captured images in detected motion, and processing RFID tags are some of functions included in the system. E-Eye-client : It is a graphical user interface tool for the users to observe the streaming of the each camera and provides several functionalities to capture the object for storing and tracking. E-Eye-core : It contains the basic functions, entities, and enums to be used by other components. It is a library. E-Eye-web : It is a web application to displays a page of results for captured images to show found images and its cameras’ information matching with the captured images to the user. E-Eye-webService : It is a web service application. It contains all business functions to prevent same or similar type of duplication and distributions to all business functions of the other components. E-Eye-mobile : It is an Android-based mobile application. It behaves like a GPS module in the object. There are several input controls in a page of mobile application. The most important role of the mobile application is to constantly send GPS locations of the object in a specific timeframe Figure 3  Graphical user interface of the E-Eye-client with changed camera from Camera_Main to Camera_B is shown in Figure 4. Figure 4  Screen of the capture object in Video Stream manually is presented in Figure 5.  Captured object by drawing frame in Live Video frame is shown in Figure 6. Figure 5 Figure 6  “Book object is not found in Matches frame yet” is displayed in Figure 7.  “Book object is found with the same direction as original object in Matches frame” is presented in Figure 8. Figure 7 Figure 8  “Book object is found with the cross direction as original object in Matches frame” is displayed in Figure 9.  “Book object is found with the different direction as original object in Matches frame” is shown in Figure 10. Figure 9 Figure 10 Screen Shots of the  “Save captured image in order to search it last 15 minutes from all cameras connected to the system.” is shown in Figure 11.  Web services of E-Eye-webService is presented in Figure 12. Figure 11 Figure 12  Web methods of GenericWS web service is displayed in Figure 13.  Web application of E-Eye called E-Eye-web in Figure 14. Figure 13 Figure 14  Logo of the E-Eye-mobile application in Android is shown in Figure 15.  Main page of E-Eye-mobile application in android is presented in Figure 16. Figure 15Figure 16  It achieves identifying, focusing, tracking, and positioning the object into hybrid system is to enhance the quality of life within the scope of engineering spectrum, i.e., time, reliability and cost References  T. Yamashita, H. Fujiyoshi, “Robust Object Tracking Using a Context Base On The Relation of Object and Background” in ICASSP, 2013  M. Zewairi, J. Alqatawna and J. Atoum, ‘Risk Adaptive Hybrid RFID Access Control System”, 2014  OpenIMAJ Intelligent Multimedia Analysis in Java,