We are :- Soma Datta, Pramit Ghosh and Debotosh Bhattacherjee

Slides:



Advertisements
Similar presentations
MIT Lincoln Laboratory A Service-Oriented Approach to Application Development Robert Darneille & Gary Schorer WPI MQP Presentations ICS Group 10 October.
Advertisements

Multi-user and internet mapping. Multi-user environments Simple file server solution, LAN (Novel, Windows network) View from everywhere, edit from one.
A mobile single sign-on system Master thesis 2006 Mats Byfuglien.
The Mobile Code Paradigm and Its Security Issues Anthony Chan and Michael Lyu September 27, 1999.
July 27, 2002 Image Processing for K.R. Precision1 Image Processing Training Lecture 1 by Suthep Madarasmi, Ph.D. Assistant Professor Department of Computer.
Multiple Processor Systems
Conductor A Framework for Distributed, Type-checked Computing Matthew Kehrt.
Software Frameworks for Acquisition and Control European PhD – 2009 Horácio Fernandes.
Automatic Camera Calibration for Image Sequences of a Football Match Flávio Szenberg (PUC-Rio) Paulo Cezar P. Carvalho (IMPA) Marcelo Gattass (PUC-Rio)
Abstract Overall Algorithm Target Matching Error Checking: By comparing what we transform from Kinect Camera coordinate to robot coordinate with what we.
1 Web Content Delivery Reading: Section and COS 461: Computer Networks Spring 2007 (MW 1:30-2:50 in Friend 004) Ioannis Avramopoulos Instructor:
Subgoal: conduct an in-depth study of critical representation, operator and other choices used for evolutionary program repair at the source code level.
1 Activity and Motion Detection in Videos Longin Jan Latecki and Roland Miezianko, Temple University Dragoljub Pokrajac, Delaware State University Dover,
11 Games and Content Session 4.1. Session Overview  Show how games are made up of program code and content  Find out about the content management system.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Screen Snapshot Service Kurt Biery SiTracker Monitoring Meeting, 23-Jan-2007.
Introduction to MCMC and BUGS. Computational problems More parameters -> even more parameter combinations Exact computation and grid approximation become.
UNIT - 1Topic - 2 C OMPUTING E NVIRONMENTS. What is Computing Environment? Computing Environment explains how a collection of computers will process and.
Face Detection And Recognition For Distributed Systems Meng Lin and Ermin Hodžić 1.
Python File Handling. In all the programs you have made so far when program is closed all the data is lost, but what if you want to keep the data to use.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
ACCESS GRID Group to Group Collaboration Gurhan Gunduz Computational Science and Information Technology. Florida State University.
By Brian Gadsden Michael Harper David Hutson.  It is a java desktop application that provides the capability of manually or automatically creating a.
Computerised Business Systems, Inc. Charlie G. Hinders President Softwar e Solutions FOR THE TELECOMMUNICATIONS INDUSTRY.
Tool Integration with Data and Computation Grid GWE - “Grid Wizard Enterprise”
Safe Downloading & Malware Prevention. Adobe Flash Update One program that will ask you to update often is Adobe Flash. While updating Flash is important,
Integrated Systems Division Service-Oriented Programming Guy Bieber, Lead Architect Motorola ISD C4I 2000 OOPSLA Jini Pattern Language Workshop Guy Bieber,
Digital Photography with Flash and No-Flash Image Pairs Gabriela Martínez Processamento de Imagem IMPA.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
Type your question here. Type Answer Type your question here. Type Answer.
 Retinal images were acquired on normal and pathological subjects, affected by hypertensive retinopathy of various levels.  The tool has been tested.
Gesture Recognition in a Class Room Environment Michael Wallick CS766.
END-TO-END ARGUMENTS IN SYSTEM DESIGN J.H. Salter, D.P. Reed and D.D. Clark Presented by Sui-Yu Wang.
Fast and Robust Algorithm of Tracking Multiple Moving Objects for Intelligent Video Surveillance Systems Jong Sun Kim, Dong Hae Yeom, and Young Hoon Joo,2011.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
The Octoplier: A New Software Device Affecting Hardware Group 4 Austin Beam Brittany Dearien Brittany Dearien Warren Irwin Amanda Medlin Amanda Medlin.
CUDA Basics. Overview What is CUDA? Data Parallelism Host-Device model Thread execution Matrix-multiplication.
Multiplication Facts X 3 = 2. 8 x 4 = 3. 7 x 2 =
Automating Scoliosis Analysis By Amar Sahai Thomas Jefferson High School for Science and Technology
Cyberinfrastructure Overview Russ Hobby, Internet2 ECSU CI Days 4 January 2008.
Tool Integration with Data and Computation Grid “Grid Wizard 2”
Cloud Computing project NSYSU Sec. 1 Demo. NSYSU EE IT_LAB2 Outline  Our system’s architecture  Flow chart of the hadoop’s job(web crawler) working.
Next Generation of Apache Hadoop MapReduce Owen
Team LYF: Applying Python to Waveform Matching Detection Xin Liu (USC), Dongdong Yao(GT), Lili Feng(CU-Boulder)
BSA 310 Week 2 DQ 2 An organization’s technology usage opens up the issue of securing its information. In analyzing your workplace or that of an organization.
Net-Centric Computing Overview
Gesture Input and Gesture Recognition Algorithms
Big Data is a Big Deal!.
Computer Science 210 Computer Organization
IM.Grid: A Grid Computing Solution for image processing
System Programming and administration
A451 Theory – 7 Programming 7A, B - Algorithms.
Report by: Katiuscia Zedda
Optimizing Foam, A Monte Carlo Event Generator
Fix BT Mail Error Code Call Toll-free
Computer Science 210 Computer Organization
Outline Overview Development Tools
Group 1: Gary Chern Paul Gurney Jared Starman
A mobile single sign-on system
Assignment 4 For this assignment refer to the notes on MATLAB from an MIT course that you can find here (or at the original website, lectures 14, 15, 16).
= ? A quicker way of writing this is 4 x -3, 4 lots of -3. So 4 x -3 = -12.
SUSPICIOUS ACTIVITY DETECTION
Open on the student drive
ACCESS GRID Group to Group Collaboration
Resource Allocation in a Middleware for Streaming Data
How Yahoo! use to serve millions of videos from its video library.
COMPUTATIONAL THINKING COMPUTATIONAL THINKING IN PROGRAMMING
Key Manager Domains February, 2019.
MPC Scenario 1. “Privacy-protected contingency tables”
 Is a machine that is able to take information (input), do some work on (process), and to make new information (output) COMPUTER.
Presentation transcript:

We are :- Soma Datta, Pramit Ghosh and Debotosh Bhattacherjee

Unclaimed bag Security threats?

Answer:- ?

 There are lots of security cameras inside the campus. So it is very difficult to checks all the images manually.  Solution :- it will be helpful if the searching process is automatic.

 using NTSC format  where luminance(Y), hue(I), and saturation(Q) 

 The RGB image and corresponding Gray image

 Laplacian Filter

 correlation takes huge time………..  So selected correlation method is used here….

Unnecessary points

 For a 600×800 image the total correlation time is second, where dimension of the mask is 39×49 and For the same input image and mask, second is required to detect the same object using proposed algorithm.  24 times faster !

 In a campus there may be 100 or more security cameras so the number of images to be processed may exceed  Single pc will take very long time to compute all the images……..  So…………….

 But this type of processing is required very rarely.  So it is not a good practice to deploy large number of computers for this.  Better to ask 3 rd party (grid) to do the processing…..

 The system can be thought as a single instruction multiple data set model where data sets are independent to each other.

 How grid split and distribute user’s program among the nodes?  Is there any standard protocol or guideline for writing c or java code that will run on grid?