Behavioral Observation Through Image Processing DULANJA WIJETHUNGA DINIDU BATHIYA SASITH WERANJA.

Slides:



Advertisements
Similar presentations
Evan Kyzar, Siddharth Gaikwad, Mimi Pham, Jeremy Green, Andrew Roth, Yiqing Liang, Vikrant Kobla, Allan V. Kalueff.
Advertisements

1/6 ELIS – Multimedia Lab Optimization of Automated Video Surveillance Using Multi-modal Video Analysis Viktor Slavkovikj 05/12/2012 Viktor Slavkovikj.
Abandoned Object Detection for Public Surveillance Video Student: Wei-Hao Tung Advisor: Jia-Shung Wang Dept. of Computer Science National Tsing Hua University.
Real-time Human Motion Analysis by Image Skeletonization 指導教授:張元翔 老師 學生: 吳思穎.
Chapter 12: Web Usage Mining - An introduction
Recent Developments in Human Motion Analysis
Object Detection and Tracking Mike Knowles 11 th January 2005
Axis Intelligent Video Intelligence where you need it.
Oral Defense by Sunny Tang 15 Aug 2003
Debbie Schmidt RN, MCSE Conference 2009 Nurse 2.0 Engaging the Healthcare Consumer Mobile Wound Care.
Computer Science AND DOCTORS Jolena Co Truong- 6 th period.
Video Surveillance Capturing, Management and Analysis of Security Videos. -Abhinav Goel -Varun Varshney.
The Nursing Process. Definition of Nursing Process Systematic patient centered method for Structuring the delivery of nursing care.
Ambulation : a tool for monitoring mobility over time using mobile phones Computational Science and Engineering, CSE '09. International Conference.
IBM Rhapsody Simulation of Distributed PACS and DIR systems Krupa Kuriakose, MASc Candidate.
Concussion Detection Research Tool Codi-Lee Hayes Samantha Mearns Rebecca Yaffe Dr. Thirimacho Bourlai Dr. Aaron Monseau.
Question: Is video modeling an effective physical therapy treatment in children with Autism Spectrum Disorder (ASD)? History of Modeling.
GESTURE ANALYSIS SHESHADRI M. (07MCMC02) JAGADEESHWAR CH. (07MCMC07) Under the guidance of Prof. Bapi Raju.
Grant Pannell. Intrusion Detection Systems  Attempt to detect unauthorized activity  CIA – Confidentiality, Integrity, Availability  Commonly network-based.
University of Toronto Aug. 11, 2004 Learning the “Epitome” of a Video Sequence Information Processing Workshop 2004 Vincent Cheung Probabilistic and Statistical.
Thomas J. Waltz Eastern Michigan University.  Training clients in functional analysis of their own behavior-environment relations and the systematic.
Seminar on EyeTap.  Introduction  What is Eye Tap  EyeTap: The eye itself as display and camera  History of EyeTap  Principle & working of the Eyetap.
Copyright © 2012, SAS Institute Inc. All rights reserved. ANALYTICS IN BIG DATA ERA ANALYTICS TECHNOLOGY AND ARCHITECTURE TO MANAGE VELOCITY AND VARIETY,
Second Line Intrusion Detection Using Personalization DISA Sponsored GWU-CS.
KRISTIN LAM REU WEEKS 1 & 2. MATERIAL COVERED MATLAB basics Edge Detection Harris Corner Detector Adaboost Face Detection Optical Flow Lucas-Kanade Method.
Nursing Process- Assessment. Overview of Nursing Process Purpose of Nursing Process: The nursing process guides our care, it helps us to identify the.
Documentation of Ventilatory Support 215a. Educational Objectives List the factors which affect communication Distinguish between subjective and objective.
Social Networks and Surveillance: Evaluating Suspicion by Association Ryan P. Layfield Dr. Bhavani Thuraisingham Dr. Latifur Khan Dr. Murat Kantarcioglu.
Computer Structure & Architecture. Lesson 1 – Introduction to CS & A LI:Describe what a computer is and identify the different types of computer.
TEMPLATE DESIGN © E-Eye : A Multi Media Based Unauthorized Object Identification and Tracking System Tolgahan Cakaloglu.
Project MOTHER Intelligent Surveillance System Determining Classroom Experience Syed Ahmar Abbas Rabiya Owais Arsalan Rauf Abdul Mujeeb Qureshi Supervisor:
 Science is our knowledge of all the living and nonliving things around us.  Technology is the application of scientific knowledge to solve human needs.
PRESENTATION ON SURVELLANCE Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes.
Qualitative Observation User Study - Guerrilla Practical WORKshop by Dominika Potuzakova.
BACKGROUND MODEL CONSTRUCTION AND MAINTENANCE IN A VIDEO SURVEILLANCE SYSTEM Computer Vision Laboratory 指導教授:張元翔 老師 研究生:許木坪.
 As a future health professional, you must record and report all observations while providing care  Must listen to what patient is saying, but observe.
Over-head Person Counter in MATLAB ECE172A Benny Wong.
Bar Graphs Used to compare amounts, or quantities The bars provide a visual display for a quick comparison between different categories.
ACTi IVS Server 2 (Intelligent Video Surveillance) Connecting Vision.
Video Analytics Integration and Analytics. Introduction The functions of video analytics. The architecture of video analytics. The applications of video.
1/7/15 Mr. Faia 6 th Grade Science.  Genetic disorder is an abnormal condition that a person inherits through the genes or chromosomes.
Zhaoxia Fu, Yan Han Measurement Volume 45, Issue 4, May 2012, Pages 650–655 Reporter: Jing-Siang, Chen.
Ehsan Nateghinia Hadi Moradi (University of Tehran, Tehran, Iran) Video-Based Multiple Vehicle Tracking at Intersections.
Nursing Process n116. The Nursing Process  Assessment  Diagnosis  Planning  Implementing  Evaluating.
COTS testing Torbjørn Skramstad.
Core Elements Engineering - Midrange
G. Suarez, J. Soares, S. Lopez, I. Obeid and J. Picone
Using programme M&E data for Surveillance in Nepal: Challenges and Opportunities Name of Author(s): Biwesh Ojha(1)
Scientific Method Section 1.1.
RGBD Camera Integration into CamC Computer Integrated Surgery II Spring, 2015 Han Xiao, under the auspices of Professor Nassir Navab, Bernhard Fuerst and.
CSE 577 Image and Video Analysis
Surveillance. Public Health Approach Surveillance What is the Problem ? Problem Risk Factor Identification : What Is the Cause ? Intervention Evaluation.
COTS testing Tor Stålhane.
COTS testing Tor Stålhane.
Internet of Things (IoT)
A New Approach to Track Multiple Vehicles With the Combination of Robust Detection and Two Classifiers Weidong Min , Mengdan Fan, Xiaoguang Guo, and Qing.
Record and Report Patient Data PP3
Delivering Only What the Patient Values
Record and Report Patient Data
Week 7 Nicholas Baker.
SUSPICIOUS ACTIVITY DETECTION
Week 6 Nicholas Baker.
Chapter 6 Assessment.
Identifying Slow HTTP DoS/DDoS Attacks against Web Servers DEPARTMENT ANDDepartment of Computer Science & Information SPECIALIZATIONTechnology, University.
Multiple Animal Species Detection Using Robust Principal Component Analysis and Large Displacement Optical Flow Professor: Thomas Huang Graduate mentor:
Record and Report Patient Data
Record and Report Patient Data
3.01 Record and Report Patient Data
Record and Report Patient Data
Record and Report Patient Data
Presentation transcript:

Behavioral Observation Through Image Processing DULANJA WIJETHUNGA DINIDU BATHIYA SASITH WERANJA

Introduction Observe this video carefully  Many breathing pattern abnormalities do not happen very frequently.  It requires thorough observation for very long time.

Objectives  Identify those abnormalities and help doctors to do accurate diagnostic.  Predict health issues which can arise in future.  A method to store video records of the patient.  Collect a huge amount of data of breathing patterns to be used for further analyzing and research.

What other people have done  BELLINI and AKULLIAN have done a research on Video Self- Modeling involvements for people with Autism Spectrum Disorders  ARROYO, JAVIER and BERGASA have implemented a real-time surveillance system to detect suspicious behaviors in shopping malls.  DONGMIN GUO, VEN and ZHOU recently used optical flow method to track and measure blood cells motion in a human body.

Methodology and Results  Research and Prototyping  System Implementation

Methodology and Results  Research and Prototyping 1. Data Collecting 2. Motion Analysis 3. Method Comparison 4. Noise Reduction 5. Pattern Identification

Methodology and Results  Research and Prototyping 1. Data Collecting 2. Motion Analysis 3. Method Comparison 4. Noise Reduction 5. Pattern Identification Optical Flow Algorithm Image Subtraction

Methodology and Results  Research and Prototyping 1. Data Collecting 2. Motion Analysis 3. Method Comparison 4. Noise Reduction 5. Pattern Identification Optical Flow Algorithm Black and Anandan dense Lucas-Kanade Image Subtraction Cross Correlation

Methodology and Results  Research and Prototyping 1. Data Collecting 2. Motion Analysis 3. Method Comparison 4. Noise Reduction 5. Pattern Identification

Methodology and Results  Research and Prototyping 1. Data Collecting 2. Motion Analysis 3. Method Comparison 4. Noise Reduction 5. Pattern Identification

Methodology and Results  Research and Prototyping

Methodology and Results  Research and Prototyping

Methodology and Results  System Implementation 1. Client Server Architecture 2. Motion History implementation 3. Optical Flow implementation 4. Machine Learning Analysis

Methodology and Results  System Implementation 1. Client Server Architecture 2. Optical Flow implementation 3. Motion History implementation 4. Machine Learning Analysis Optical Flow Algorithm takes time GPU version is about 30x faster

Methodology and Results  System Implementation 1. Client Server Architecture 2. Optical Flow implementation 3. Motion History implementation 4. Machine Learning Analysis

Methodology and Results  System Implementation 1. Client Server Architecture 2. Optical Flow implementation 3. Motion History implementation 4. Machine Learning Analysis FUTURE WORK

THANK YOU !