Group 8 Facerecognition

download Group 8 Facerecognition

of 14

Transcript of Group 8 Facerecognition

  • 7/23/2019 Group 8 Facerecognition

    1/14

    CE6011

    Maurya Banda (CE11B009)

    Amruta Sai Kiran (CE11B012)D.Tarun Satya Sai (CE11B013)

    K. Prasanth (CE11B027)

    N.B.Ravi Teja (CE11B079)

    Face Recognition System Door Automation

  • 7/23/2019 Group 8 Facerecognition

    2/14

    Table of Contents

    1 AIM ....................................................................................................................................................................................... 3

    2 INTRODUCTION ................................................................................................................................................................... 3

    2.1 What is Face recognition system? .......................................................................................................................... 3

    2.2 What is its significance? .................................................................................................................................. 3

    2.3 What are the different applications with regard to security? .3

    2.4 What are the disadvantages? 4

    2.5 How does the FR Software work? 5

    2.6 What happens inside the FRM? 7

    3 WORKING MECHANISM ...................................................................................................................................................... 8

    3.1 Door opening and closing ....................................................................................................................................... 8

    3.2Lighting System ........................................................................................................................................................ 9

    3.3 BACNET Network....9

    4 COMPONENTS REQUIRED ...10

    5 SPECIFICATIONS OF AVAILABLE COMPONENTS 10

    5.1FRM Specifications.....10

    5.2 Occupancy Sensor ...10

    5.3Electric Bell 11

    5.4 Electromagnetic Lock ...11

    5.5 TCP/IP ..11

    6 ALGORITHMS FOR VARIOUS CONNECTIONS ..11

    6.1 Occupancy Sensor for lighting system ..11

    6.2FRM to EM lock: ( Communication : Analog)

    6.3 FRM to Electric Bell 12

    6.4 PC to HUB .12

    6.5 FRM to PC ....12

    6.6 Occupancy sensor to FRM ..12

    6.7Exit Button to FRM(Communication: Binary).12

    6.8Automated Attendance System .12

    7 COST ANALYSIS OF COMPONENTS USED...12

    7.1 Cost Estimation .... 12

    7.2 Links for Costs ..12

    8REFERENCES...............14

  • 7/23/2019 Group 8 Facerecognition

    3/14

    Automated Door Operation System Using Face Recognition

    1.Aim

    To prepare a well explained conceptualization of an automated door operation system by incorporating

    certain extended systems like Lighting Control, Security System and Automated Attendance for specific

    occupancy purposes.

    2. Introduction

    2.1. What is Face recognition system?

    Afacial recognition system

    is a computer application automaticallyidentifying orverifying aperson from

    adigital image or avideo frame from avideo source. One of the ways to do this is by comparing selectedfacial

    features from the image and a facialdatabase.It is typically used insecurity systems and can be compared to

    otherbiometrics such asfingerprint or eyeiris recognition systems.

    2.2. What is its significance?

    Among the different biometric techniques, facial recognition may not be the most reliable and

    efficient. However, one key advantage is that it does not require the cooperation of the test subject to work.

    Properly designed systems installed in airports, multiplexes, and other public places can identify individuals

    among the crowd, without passers-by even being aware of the system. Other biometrics like fingerprints, iris

    scans, and speech recognition cannot perform this kind of mass identification.

    Facial recognition systems based on faceprints can quickly and accurately identify target individuals

    when the conditions are favorable. However, if the subjects face is partially obscured or in profile rather thanfacing forward, or if the light is insufficient, the software is less reliable. Nevertheless, the technology is evolving

    quickly and there are several emerging approaches, such as 3D modeling, that may overcome current problems

    with the systems. According to the National Institute of Standards and Technology (NIST), the incidence of false

    positives in facial recognition systems has been halved every two years since 1993 and, as of the end of 2011,

    was just 0.003%

    Law enforcement agencies are using facial recognition software as a crime-fighting tool. Facial

    recognition software also enhances marketingpersonalization.Now businesses are looking to use the

    technology to reach customers. For example, billboards have been developed with integrated software that

    identifies the gender, ethnicity and approximate age of passersby to deliver targeted advertising.

    2.3.

    What are the different applications with regard to security?

    The security currently become a very important issue in public or private institutions in which various

    security systems have been proposed and developed for some crucial processes such as person identifications,

    verification or recognition especially for building access control, suspect identifications by the police, driver

    licenses and many others. Face recognition technology has seen many uses in governments, military forces,

    http://en.wikipedia.org/wiki/Identification_of_human_individualshttp://en.wikipedia.org/wiki/Authenticationhttp://en.wikipedia.org/wiki/Personhttp://en.wikipedia.org/wiki/Digital_imagehttp://en.wikipedia.org/wiki/Film_framehttp://en.wikipedia.org/wiki/Videohttp://en.wikipedia.org/wiki/Facehttp://en.wikipedia.org/wiki/Facehttp://en.wikipedia.org/wiki/Database_management_systemhttp://en.wikipedia.org/wiki/Burglar_alarmhttp://en.wikipedia.org/wiki/Biometricshttp://en.wikipedia.org/wiki/Fingerprinthttp://en.wikipedia.org/wiki/Iris_recognitionhttp://searchsoftwarequality.techtarget.com/definition/NISThttp://searchcrm.techtarget.com/definition/personalizationhttp://searchcrm.techtarget.com/definition/personalizationhttp://searchsoftwarequality.techtarget.com/definition/NISThttp://en.wikipedia.org/wiki/Iris_recognitionhttp://en.wikipedia.org/wiki/Fingerprinthttp://en.wikipedia.org/wiki/Biometricshttp://en.wikipedia.org/wiki/Burglar_alarmhttp://en.wikipedia.org/wiki/Database_management_systemhttp://en.wikipedia.org/wiki/Facehttp://en.wikipedia.org/wiki/Facehttp://en.wikipedia.org/wiki/Videohttp://en.wikipedia.org/wiki/Film_framehttp://en.wikipedia.org/wiki/Digital_imagehttp://en.wikipedia.org/wiki/Personhttp://en.wikipedia.org/wiki/Authenticationhttp://en.wikipedia.org/wiki/Identification_of_human_individuals
  • 7/23/2019 Group 8 Facerecognition

    4/14

    banks, social welfare and security, electronic commerce and security and defence fields. Various uses of face

    recognition system in doors is discussed here.

    Domestic Use

    Face recognition system can be used as a security system for houses and residential buildings.

    Specifically when a person tries to access the door it either allows the person through the door if the person is

    an authorized user or it specifies the owner of the house regarding the use of the door by any anonymous

    person. In some cases when the user tries to access the door by forcible means it activates an alarm so that the

    neighbours or the security of house can respond.

    Offices

    Face recognition system has many uses in offices.

    It can be used for saving important files and documents which can be used only by a specified personal.

    It can be used for allowing only the staff and other people who were pre-specified in the database of the

    face recognition system.

    It can act as an automated security system during free hours of the office usually when the office is

    vacant.

    Banks

    The main use of face recognition system in banks is to have protected lockers for saving money and

    important documents of properties.

    Military

    Military of many nations use face recognition system as an additional security system for the access of

    highly valuable, precarious, dangerous and sophisticated weapons and armaments. These systems not onlyimprove the security of individual buildings but also increases the security of the state and country as a whole.

    2.4.

    What are the disadvantages?

    Many citizens express concern that theirprivacy is being compromised by the use of surveillance

    technologies by corporations and the state. Some fear that it could lead to a totalsurveillance society, with

    the government and other authorities having the ability to know the whereabouts and activities of all citizens

    around the clock. This knowledge has been, is being, and could continue to be deployed to prevent the lawful

    exercise of rights of citizens to criticize those in office, specific government policies or corporate practices.Many centralized power structures with such surveillance capabilities have abused their privileged access to

    maintain control of the political and economic apparatus, and to curtail populist reforms.

    Facial recognition can be used not just to identify an individual, but also to unearth other personal data

    associated with an individual such as other photos featuring the individual, blog posts, social networking

    profiles, Internet behavior, travel patterns, etc. all through facial features alone. Moreover, individuals have

    limited ability to avoid or thwart facial recognition tracking unless they hide their faces. This fundamentally

    changes the dynamic of day-to-day privacy by enabling any marketer, government agency, or random stranger

    http://en.wikipedia.org/wiki/Privacyhttp://en.wikipedia.org/wiki/Surveillance_societyhttp://en.wikipedia.org/wiki/Surveillance_societyhttp://en.wikipedia.org/wiki/Privacy
  • 7/23/2019 Group 8 Facerecognition

    5/14

    to secretly collect the identities and associated personal information of any individual captured by the facial

    recognition system.

    Whatever might the propensity of disadvantages be in other fields, the face recognition system in the

    security applications has been found very instrumental in automating the security operations in various walks of

    industrial and domestic fields.

    2.5. How does the FR Software work?

    Object detection and tracking are important in many computer vision applications including activity

    recognition, automotive safety, and surveillance. In this example, you will develop a simple face tracking system

    by dividing the tracking problem into three separate problems:

    1. Detect a face to track

    2. Identify facial features to track

    3. Track the face

    Step 1: Detect a Face To Track

    Before you begin tracking a face, you need to first detect it. Use the vision.CascadeObjectDetector to

    detect the location of a face in a video frame. The cascade object detector uses the Viola-Jones detection

    algorithm and a trained classification model for detection. By default, the detector is configured to detect faces,

    but it can be configured for other object types.

    % Cr eat e a cascade det ect or obj ect . f aceDet ect or = vi si on. CascadeObj ect Det ect or ( ) ;

    % Read a vi deo f r ame and r un t he det ect or . vi deoFi l eReader = vi si on. Vi deoFi l eReader ( ' vi s i onf ace. avi ' ) ;vi deoFr ame = st ep( vi deoFi l eReader) ;bbox = st ep( f aceDetector , vi deoFrame) ;

    % Dr aw t he r et urned boundi ng box ar ound t he det ect ed f ace. vi deoOut = i nser t Obj ect Annotat i on( vi deoFr ame, ' r ectangl e' , bbox, ' Face' ) ;f i gur e, i mshow( vi deoOut ) , t i t l e( ' Det ect ed f ace' ) ;

    You can use the cascade object detector to track a face across successive video frames. However, when

    the face tilts or the person turns their head, you may lose tracking. This limitation is due to the type of trainedclassification model used for detection. To avoid this issue, and because performing face detection for every

    video frame is computationally intensive, this example uses a simple facial feature for tracking.

    Step 2: Identify Facial Features To Track

    Once the face is located in the video, the next step is to identify a feature that will help you track the face. For

    example, you can use the shape, texture, or color. Choose a feature that is unique to the object and remains

    invariant even when the object moves.

  • 7/23/2019 Group 8 Facerecognition

    6/14

    In this example, you use skin tone as the feature to track. The skin tone provides a good deal of contrast

    between the face and the background and does not change as the face rotates or moves.

    % Get t he ski n tone i nf or mat i on by ext r act i ng the Hue f r om t he vi deo f r ame% conver t ed t o the HSV col or space.

    [ hueChannel , ~, ~] = r gb2hsv( vi deoFr ame) ;

    % Di spl ay t he Hue Channel dat a and dr aw t he boundi ng box around t he f ace. f i gur e, i mshow( hueChannel ) , t i t l e( ' Hue channel data' ) ;r ect angl e( ' Pos i t i on' , bbox( 1, : ) , ' Li neWi dt h' , 2, ' EdgeCol or ' , [ 1 1 0] )

    Step 3: Track the Face

    With the skin tone selected as the feature to track, you can now use the vision.HistogramBasedTracker

    for tracking. The histogram based tracker uses the CAMShift algorithm, which provides the capability to track an

    object using a histogram of pixel values. In this example, the Hue channel pixels are extracted from the nose

    region of the detected face. These pixels are used to initialize the histogram for the tracker. The example tracks

    the object over successive video frames using this histogram.

    % Det ect t he nose wi t hi n the f ace r egi on. The nose pr ovi des a mor e accur at e% measure of t he ski n t one because i t does not cont ai n any backgr ound% pi xel s . noseDetect or = vi si on. CascadeObj ect Det ect or( ' Nose' ) ;f aceI mage = i mcr op( vi deoFr ame, bbox( 1, : ) ) ;noseBBox = st ep( noseDetect or , f aceI mage) ;

    % The nose boundi ng box i s def i ned rel at i ve t o t he cropped f ace i mage. % Adj ust t he nose boundi ng box so t hat i t i s r el at i ve t o t he or i gi nal vi deo% f r ame. noseBBox( 1, 1: 2) = noseBBox( 1, 1: 2) + bbox( 1, 1: 2) ;

    % Cr eat e a t r acker obj ect . t r acker = vi si on. Hi st ogr amBasedTracker ;

    % I ni t i al i ze t he t r acker hi st ogr am usi ng t he Hue channel pi xel s f r om t he% nose. i ni t i al i zeObj ect ( t r acker , hueChannel , noseBBox( 1, : ) ) ;

    % Cr eat e a vi deo pl ayer obj ect f or di spl ayi ng vi deo f r ames. vi deoI nf o = i nf o( vi deoFi l eReader ) ;

    vi deoPl ayer = vi si on. Vi deoPl ayer ( ' Pos i t i on' , [ 300 300 vi deoI nf o. Vi deoSi ze+30] ) ;

    % Tr ack t he f ace over successi ve vi deo f r ames unt i l t he vi deo i s f i ni shed. whi l e ~i sDone( vi deoFi l eReader)

    % Ext r act t he next vi deo f r amevi deoFrame = st ep( vi deoFi l eReader ) ;

    % RGB - > HSV[ hueChannel , ~, ~] = r gb2hsv( vi deoFrame) ;

  • 7/23/2019 Group 8 Facerecognition

    7/14

    % Track usi ng the Hue channel databbox = st ep( t r acker , hueChannel ) ;

    % I nser t a boundi ng box around t he obj ect bei ng t r ackedvi deoOut = i nser t Obj ect Annot at i on( vi deoFr ame, ' r ectangl e' , bbox, ' Face' ) ;

    % Di spl ay t he annotat ed vi deo f r ame usi ng t he vi deo pl ayer obj ect st ep( vi deoPl ayer , vi deoOut ) ;

    end

    % Rel ease r esour cesr el ease( vi deoFi l eReader ) ;r el ease( vi deoPl ayer ) ;

    2.6.

    What happens inside the FRM?

    The FRM used in the present installation works on Viola Jones Face Detection Algorithm for which the

    steps are discussed at length along with the code in the previous section. The hardware part of the FRM works

    in the following mechanism. The functions of all the components that constitute the FRM are clearly mentioned

    in the flowchart. Many commercially available machines follow a similar process. One such machine we

    referenced for learning the mechanism is HF-FR701 which is a product by Chongquing Huifan Technology Co.,

    Ltd.

  • 7/23/2019 Group 8 Facerecognition

    8/14

    3.Working Mechanism

    Negative ID

    Lock

    TCP/IP

    3.1.

    Door opening and closing

    1.

    The occupancy sensor which is door mounted, detects the person and sends a binary signal to the

    FRM

    2. The FRM activates the High Resolution Infrared Camera and the digital output of the face ID is

    generated.

    3.

    The FRM uses TCP/IP protocol for communication and uses the RS 232 cable for data transfer.

    4.

    There is an intermediate RS232/485 converter placed to convert the RS232 signals to RS485

    5. Later this information is sent to the PC(Router) via RS 485 cables.

    6.

    Every Router has an unique IP address and is connected to the HUB via CAT5 cables

    7.

    The digital output generated is matched with the authorized users face IDs which is hosted by the

    HUB

    Lighting System

    Face Recognition

    System

    Bell USB

    Ke

    Exit

    RS 230/485

    PC

    HUB

    Attendance

    DOOR

    Sensor

  • 7/23/2019 Group 8 Facerecognition

    9/14

    8. If the persons face ID matches with the authorized, the FRM sends a binary signal to the

    Electromagnetic lock and it opens.

    9.

    If the persons face ID does not match with the authorized, the FRM sends a binary signal to the

    security alarm and the security personnel of the building is cautioned.

    10.

    After a person has moved in, the occupancy sensor sends a binary signal to the FRM and the

    Electromagnetic Lock is actuated and the door is locked.

    11.

    If the person wants to exit from the room, he presses the EXIT button which is wall mounted.

    12.

    When the EXIT button is pressed a binary voltage signal is sent to the FRM, the ElectromagneticLock is actuated and the door opens.

    13.After the person has moved out, the occupancy sensor again sends a binary signal to the FRM, and

    the Electromagnetic Lock is actuated and the door is locked.

    3.2.

    Lighting System

    The Face Recognition mechanism can be used for controlling the lighting inside the room and hence

    it can help in energy saving.

    1.

    When an authorized face ID is recognized, the occupancy of the room is increased by one.

    2.

    Similarly when a person presses the EXIT button, the occupancy of the room is deducted by one

    3. So whenever the occupancy of the room is zero, the FRM sends a binary signal to the lighting

    system and the lights are turned off.

    3.3.

    BACNET Network

    In a commercial building there can be multiple installations of the face recognition system.

    The BACNET network is used for connecting all the routers, controllers , sensors and actuators to

    a common HUB.

    Each PC (Router)has a unique IP address

    The FRMs(Controllers) have a unique Net ID

    The sensors have a unique Instance ID

    Router

    Router

    FRMFRM

    Occupancysensor

    EM Lock Door Bell

    FRMFRM

    Occupancysensor

    EM Lock Door Bell

    HUB

  • 7/23/2019 Group 8 Facerecognition

    10/14

    4.Components required:

    FRM- Face Recognition Machine

    Occupancy Sensor

    Electric Bell

    Electromagnetic Lock

    RS232/485 communication cables

    RS 232-RS 485 convertor CAT 5 LAN Cables

    5.Specifications of available components

    5.1.

    FRM specifications

    Memory 256M Flash, 64M SDRAM

    Hardware Platform: ZEM600

    Camera High Resolution Infrared Camera

    Display 3 Inch Touch Screen

    Face Capacity 400

    Logs Capacity 100,000

    Backup Battery 2000mAh

    Communication TCP/IP, RS232/485

    Access Control Interfaces 3rd party electric lock, door sensor, alarm, wired bell and exit button

    Power Supply 12V/3A

    Verification Speed 2 Seconds

    Operating temperature 0C-45C

    Operating Humidity 20%-80%

    5.2.

    Occupancy Sensor

    Detection Range 6m

    Detection Angle 360

    Time Setting 5 sec-102min

    Power Source 110V-130V/AC, 220-240V/AC

    Power Frequency 50/60HZ

    Rated Load 800W(110-130V/AC), 1200W(220-240V/AC)

    Working Humidity

  • 7/23/2019 Group 8 Facerecognition

    11/14

    5.3. Electric Bell

    Receiver:3V DC;

    150M range &315MHz

    32 pcs music

    Chime Sound: 80~90DB

    5.4.

    Electromagnetic Lock

    Material: Al alloy and steel.

    Magnetic body material: silicon steel plate.

    Holding force: 600lbs (280KGS).

    Lock body dimension: 25250.529mm.

    Working voltage: 12V(24v can order).

    Working current: 320mA.

    Electricity status: continuously supply current

    Operating temperature -10 to 55C (14 to 131F)

    Installation type: Hanging mounted/surface mounted

    Humidity: 0 to 95% non-condensingLocks surface temperature: Current temperature 20% (when power is on)

    Used for single door

    Can connect with different kinds of access system.

    5.5.

    TCP/IP

    TCP/IP communication mode is used between the hub and the computer that checks the ID

    created by the FR 701 and sees if it matches with the pre-existing database of IDs. TCP/IP provides end-to-end

    connectivity specifying how data should be formatted, addressed, transmitted,routed and received at thedestination. This utilizes Cat5 cables.

    6.Algorithms for various connections

    6.1.

    Occupancy Sensor to Lighting System : ( Communication : Binary Output )

    1. Initialize occupancy =0

    2. If Sensor = 1 => occupancy=occupancy+1

    3.

    If Exit= 1 =>occupancy= occupancy -1 (When the exit switch is pressed from inside the room)

    4. If (occupancy >1 ) Turn on the lights else Turn off the lights

    6.2.

    FRM to EM lock : ( Communication : Analog)

    1. The FRM recognizes the face and generates a face id

    2. Matches the face id with the database

    3. If the face id matches with the authorized then the lock opens

    4. If the face id does not match with the authorized , lock does not open and the information is

    sent to the security system

    http://en.wikipedia.org/wiki/Routinghttp://en.wikipedia.org/wiki/Routing
  • 7/23/2019 Group 8 Facerecognition

    12/14

    6.3. FRM to Electronic Bell : (Communication : Analog)

    1. If the face id does not match with the database a binary signal is sent to the electronic bell

    2.

    The electronic bell is turned on.

    6.4. PC to HUB

    1. The PC is connected to the HUB using CAT 5 cables.

    2. The PC uses TCP/IP protocol to communicate with the hub

    3. The hub hosts the information of all the valid ids

    4.

    This connection is used to check the validity of an incoming id

    6.5. FRM to PC

    1. The Controller generates a digital output of the face id

    2. These signals are transmitted via RS 232 cables

    3. As the PC uses RS 485 input, a RS232/485 converter is used to convert the RS232 signals to RS

    485

    (A PC can use both RS 232 and RS 485 communication but RS 485 communication is preferred

    as many controllers can be connected to the PC)

    6.6. Occupancy Sensor to FRM

    1.

    The occupancy sensor generates a binary output (0- no occupancy & 1- occupancy)2. If occupancy=1 then the FRM actuates the IP camera

    3. The IP camera starts reading the face of the person

    6.7.

    Exit Button to FRM(Communication: Binary)

    1. When a person presses the exit button from inside, a binary signal is generated and it is sent to

    FRM (Exit=1)2.

    The FRM recognizes the signal and actuates the Electromagnetic Lock3.

    And also the occupancy measure of the room is reduced by 1 (Occupancy=Occupancy-1)6.8.

    Automated Attendance System

    This system can be used for a board room or a meeting room to maintain a directory for theattendance

    1. The FRM recognizes the face and generates the face id.

    7.Cost Analysis of the components used in face recognition

    7.1.

    Cost Estimation

    COMPONENT ESTIMATED COST

    USB to RS485 convertor Rs 280/-

    Electromagnetic Lock Rs 1950/-

    HF-FR701 Rs 18600/-

  • 7/23/2019 Group 8 Facerecognition

    13/14

    UA-RT PCB board Rs 3000/-

    USB 2.0 to RS232 Serial DB9 Pin Male

    Adapter SKU#622

    Rs 200/-

    RS232 to RS485 Adapter Converter Card

    access control Systems

    Rs 250/-

    CAT 5 NETWORKING LAN PATCH CORD

    CABLE 1.5 METERs

    Rs 60/-

    200ft feet RS485 Signal Transmission Cable

    for Control CCTV PTZ Security camera

    Rs 1500/-

    Electric Bell Rs 250/-

    Total Rs 26080/-

    Allowance (appx) Rs 1000/-

    Total estimated cost Rs 27080/-

    7.2.

    Links for costs

    USB to RS485 convertor

    http://www.ebay.com/bhp/usb-to-rs485-adapter

    Electromagnetic Lock

    http://www.ebay.com/sch/i.html?_trksid=p2053587.m570.l1313.TR0.TRC0.H0.XElectromagnetic+Lock+&_nkw=

    Electromagnetic+Lock+&_sacat=0&_from=R40

    HF-FR701 or any other similar model

    http://www.alibaba.com/trade/search?fsb=y&IndexArea=product_en&CatId=&SearchText=hf-fr701

    UA-RT PCB board

    http://sigma-shop.com/product/129/uart-8-channel-relay-controller-with-clips-for-din-mount-rail-12vdc.html

    USB 2.0 to RS232 Serial DB9 Pin Male Adapter SKU 622

    http://www.ebay.com/sch/i.html?_odkw=USB+2.0+to+RS232+Serial+DB9+Pin+Male+Adapter+SKU%23622&_os

    acat=0&_from=R40&_trksid=p2045573.m570.l1313.TR0.TRC0.H0.XUSB+2.0+to+RS232+Serial+DB9+Pin+Adapte

    r+SKU%23622&_nkw=USB+2.0+to+RS232+Serial+DB9+Pin+Adapter+SKU%23622&_sacat=0

    RS232 to RS485 Adapter Converter Card access control Systems

    http://www.ebay.com/bhp/usb-to-rs485-adapterhttp://www.ebay.com/bhp/usb-to-rs485-adapterhttp://www.ebay.com/sch/i.html?_trksid=p2053587.m570.l1313.TR0.TRC0.H0.XElectromagnetic+Lock+&_nkw=Electromagnetic+Lock+&_sacat=0&_from=R40http://www.ebay.com/sch/i.html?_trksid=p2053587.m570.l1313.TR0.TRC0.H0.XElectromagnetic+Lock+&_nkw=Electromagnetic+Lock+&_sacat=0&_from=R40http://www.ebay.com/sch/i.html?_trksid=p2053587.m570.l1313.TR0.TRC0.H0.XElectromagnetic+Lock+&_nkw=Electromagnetic+Lock+&_sacat=0&_from=R40http://www.alibaba.com/trade/search?fsb=y&IndexArea=product_en&CatId=&SearchText=hf-fr701http://sigma-shop.com/product/129/uart-8-channel-relay-controller-with-clips-for-din-mount-rail-12vdc.htmlhttp://sigma-shop.com/product/129/uart-8-channel-relay-controller-with-clips-for-din-mount-rail-12vdc.htmlhttp://www.ebay.com/sch/i.html?_odkw=USB+2.0+to+RS232+Serial+DB9+Pin+Male+Adapter+SKU%23622&_osacat=0&_from=R40&_trksid=p2045573.m570.l1313.TR0.TRC0.H0.XUSB+2.0+to+RS232+Serial+DB9+Pin+Adapter+SKU%23622&_nkw=USB+2.0+to+RS232+Serial+DB9+Pin+Adapter+SKU%23622&_sacat=0http://www.ebay.com/sch/i.html?_odkw=USB+2.0+to+RS232+Serial+DB9+Pin+Male+Adapter+SKU%23622&_osacat=0&_from=R40&_trksid=p2045573.m570.l1313.TR0.TRC0.H0.XUSB+2.0+to+RS232+Serial+DB9+Pin+Adapter+SKU%23622&_nkw=USB+2.0+to+RS232+Serial+DB9+Pin+Adapter+SKU%23622&_sacat=0http://www.ebay.com/sch/i.html?_odkw=USB+2.0+to+RS232+Serial+DB9+Pin+Male+Adapter+SKU%23622&_osacat=0&_from=R40&_trksid=p2045573.m570.l1313.TR0.TRC0.H0.XUSB+2.0+to+RS232+Serial+DB9+Pin+Adapter+SKU%23622&_nkw=USB+2.0+to+RS232+Serial+DB9+Pin+Adapter+SKU%23622&_sacat=0http://www.ebay.com/sch/i.html?_odkw=USB+2.0+to+RS232+Serial+DB9+Pin+Male+Adapter+SKU%23622&_osacat=0&_from=R40&_trksid=p2045573.m570.l1313.TR0.TRC0.H0.XUSB+2.0+to+RS232+Serial+DB9+Pin+Adapter+SKU%23622&_nkw=USB+2.0+to+RS232+Serial+DB9+Pin+Adapter+SKU%23622&_sacat=0http://www.ebay.com/sch/i.html?_odkw=USB+2.0+to+RS232+Serial+DB9+Pin+Male+Adapter+SKU%23622&_osacat=0&_from=R40&_trksid=p2045573.m570.l1313.TR0.TRC0.H0.XUSB+2.0+to+RS232+Serial+DB9+Pin+Adapter+SKU%23622&_nkw=USB+2.0+to+RS232+Serial+DB9+Pin+Adapter+SKU%23622&_sacat=0http://www.ebay.com/sch/i.html?_odkw=USB+2.0+to+RS232+Serial+DB9+Pin+Male+Adapter+SKU%23622&_osacat=0&_from=R40&_trksid=p2045573.m570.l1313.TR0.TRC0.H0.XUSB+2.0+to+RS232+Serial+DB9+Pin+Adapter+SKU%23622&_nkw=USB+2.0+to+RS232+Serial+DB9+Pin+Adapter+SKU%23622&_sacat=0http://www.ebay.com/sch/i.html?_odkw=USB+2.0+to+RS232+Serial+DB9+Pin+Male+Adapter+SKU%23622&_osacat=0&_from=R40&_trksid=p2045573.m570.l1313.TR0.TRC0.H0.XUSB+2.0+to+RS232+Serial+DB9+Pin+Adapter+SKU%23622&_nkw=USB+2.0+to+RS232+Serial+DB9+Pin+Adapter+SKU%23622&_sacat=0http://sigma-shop.com/product/129/uart-8-channel-relay-controller-with-clips-for-din-mount-rail-12vdc.htmlhttp://www.alibaba.com/trade/search?fsb=y&IndexArea=product_en&CatId=&SearchText=hf-fr701http://www.ebay.com/sch/i.html?_trksid=p2053587.m570.l1313.TR0.TRC0.H0.XElectromagnetic+Lock+&_nkw=Electromagnetic+Lock+&_sacat=0&_from=R40http://www.ebay.com/sch/i.html?_trksid=p2053587.m570.l1313.TR0.TRC0.H0.XElectromagnetic+Lock+&_nkw=Electromagnetic+Lock+&_sacat=0&_from=R40http://www.ebay.com/bhp/usb-to-rs485-adapter
  • 7/23/2019 Group 8 Facerecognition

    14/14

    http://www.ebay.com/sch/i.html?_odkw=USB+2.0+to+RS232+Serial+DB9+Pin+Adapter+SKU%23622&_osacat=

    0&_from=R40&_trksid=p2045573.m570.l1313.TR0.TRC0.H0.XRS232+to+RS485+Adapter+Converter+Card+acce

    ss+control+Systems+&_nkw=RS232+to+RS485+Adapter+Converter+Card+access+control+Systems+&_sacat=0

    CAT 5 NETWORKING LAN PATCH CORD CABLE 1.5 METERs

    Gurunath departmental store

    200ft feet RS485 Signal Transmission Cable for Control CCTV PTZ Security camera

    http://www.ebay.com/sch/i.html?_odkw=CAT+5+NETWORKING+LAN+PATCH+CORD+CABLE+1.5+METERs&_osa

    cat=0&_from=R40&_trksid=p2045573.m570.l1313.TR0.TRC0.H0.X200ft+feet+RS485+Signal+Transmission+Cabl

    e+for+Control+CCTV+PTZ+Security+camera&_nkw=200ft+feet+RS485+Signal+Transmission+Cable+for+Control

    +CCTV+PTZ+Security+camera&_sacat=0

    Electric bell

    http://www.ebay.in/itm/electric-bell-kit-do-yourself-diy-science-activity-model-hobby-toy-gift-

    /111303990398?pt=in_toys_games_school_stuff

    8.References

    www.wikipedia.org

    http://www.alibaba.com/trade/search?fsb=y&IndexArea=product_en&CatId=&SearchText=hf-fr701

    http://stackoverflow.com

    http://www.mathworks.in

    Research paper on Viola Jones Face detection algorithm

    http://www.ebay.com/sch/i.html?_odkw=USB+2.0+to+RS232+Serial+DB9+Pin+Adapter+SKU%23622&_osacat=0&_from=R40&_trksid=p2045573.m570.l1313.TR0.TRC0.H0.XRS232+to+RS485+Adapter+Converter+Card+access+control+Systems+&_nkw=RS232+to+RS485+Adapter+Converter+Card+access+control+Systems+&_sacat=0http://www.ebay.com/sch/i.html?_odkw=USB+2.0+to+RS232+Serial+DB9+Pin+Adapter+SKU%23622&_osacat=0&_from=R40&_trksid=p2045573.m570.l1313.TR0.TRC0.H0.XRS232+to+RS485+Adapter+Converter+Card+access+control+Systems+&_nkw=RS232+to+RS485+Adapter+Converter+Card+access+control+Systems+&_sacat=0http://www.ebay.com/sch/i.html?_odkw=USB+2.0+to+RS232+Serial+DB9+Pin+Adapter+SKU%23622&_osacat=0&_from=R40&_trksid=p2045573.m570.l1313.TR0.TRC0.H0.XRS232+to+RS485+Adapter+Converter+Card+access+control+Systems+&_nkw=RS232+to+RS485+Adapter+Converter+Card+access+control+Systems+&_sacat=0http://www.ebay.com/sch/i.html?_odkw=USB+2.0+to+RS232+Serial+DB9+Pin+Adapter+SKU%23622&_osacat=0&_from=R40&_trksid=p2045573.m570.l1313.TR0.TRC0.H0.XRS232+to+RS485+Adapter+Converter+Card+access+control+Systems+&_nkw=RS232+to+RS485+Adapter+Converter+Card+access+control+Systems+&_sacat=0http://www.ebay.com/sch/i.html?_odkw=CAT+5+NETWORKING+LAN+PATCH+CORD+CABLE+1.5+METERs&_osacat=0&_from=R40&_trksid=p2045573.m570.l1313.TR0.TRC0.H0.X200ft+feet+RS485+Signal+Transmission+Cable+for+Control+CCTV+PTZ+Security+camera&_nkw=200ft+feet+RS485+Signal+Transmission+Cable+for+Control+CCTV+PTZ+Security+camera&_sacat=0http://www.ebay.com/sch/i.html?_odkw=CAT+5+NETWORKING+LAN+PATCH+CORD+CABLE+1.5+METERs&_osacat=0&_from=R40&_trksid=p2045573.m570.l1313.TR0.TRC0.H0.X200ft+feet+RS485+Signal+Transmission+Cable+for+Control+CCTV+PTZ+Security+camera&_nkw=200ft+feet+RS485+Signal+Transmission+Cable+for+Control+CCTV+PTZ+Security+camera&_sacat=0http://www.ebay.com/sch/i.html?_odkw=CAT+5+NETWORKING+LAN+PATCH+CORD+CABLE+1.5+METERs&_osacat=0&_from=R40&_trksid=p2045573.m570.l1313.TR0.TRC0.H0.X200ft+feet+RS485+Signal+Transmission+Cable+for+Control+CCTV+PTZ+Security+camera&_nkw=200ft+feet+RS485+Signal+Transmission+Cable+for+Control+CCTV+PTZ+Security+camera&_sacat=0http://www.ebay.com/sch/i.html?_odkw=CAT+5+NETWORKING+LAN+PATCH+CORD+CABLE+1.5+METERs&_osacat=0&_from=R40&_trksid=p2045573.m570.l1313.TR0.TRC0.H0.X200ft+feet+RS485+Signal+Transmission+Cable+for+Control+CCTV+PTZ+Security+camera&_nkw=200ft+feet+RS485+Signal+Transmission+Cable+for+Control+CCTV+PTZ+Security+camera&_sacat=0http://www.ebay.com/sch/i.html?_odkw=CAT+5+NETWORKING+LAN+PATCH+CORD+CABLE+1.5+METERs&_osacat=0&_from=R40&_trksid=p2045573.m570.l1313.TR0.TRC0.H0.X200ft+feet+RS485+Signal+Transmission+Cable+for+Control+CCTV+PTZ+Security+camera&_nkw=200ft+feet+RS485+Signal+Transmission+Cable+for+Control+CCTV+PTZ+Security+camera&_sacat=0http://www.ebay.in/itm/electric-bell-kit-do-yourself-diy-science-activity-model-hobby-toy-gift-/111303990398?pt=in_toys_games_school_stuffhttp://www.ebay.in/itm/electric-bell-kit-do-yourself-diy-science-activity-model-hobby-toy-gift-/111303990398?pt=in_toys_games_school_stuffhttp://www.ebay.in/itm/electric-bell-kit-do-yourself-diy-science-activity-model-hobby-toy-gift-/111303990398?pt=in_toys_games_school_stuffhttp://www.alibaba.com/trade/search?fsb=y&IndexArea=product_en&CatId=&SearchText=hf-fr701http://www.alibaba.com/trade/search?fsb=y&IndexArea=product_en&CatId=&SearchText=hf-fr701http://www.ebay.in/itm/electric-bell-kit-do-yourself-diy-science-activity-model-hobby-toy-gift-/111303990398?pt=in_toys_games_school_stuffhttp://www.ebay.in/itm/electric-bell-kit-do-yourself-diy-science-activity-model-hobby-toy-gift-/111303990398?pt=in_toys_games_school_stuffhttp://www.ebay.com/sch/i.html?_odkw=CAT+5+NETWORKING+LAN+PATCH+CORD+CABLE+1.5+METERs&_osacat=0&_from=R40&_trksid=p2045573.m570.l1313.TR0.TRC0.H0.X200ft+feet+RS485+Signal+Transmission+Cable+for+Control+CCTV+PTZ+Security+camera&_nkw=200ft+feet+RS485+Signal+Transmission+Cable+for+Control+CCTV+PTZ+Security+camera&_sacat=0http://www.ebay.com/sch/i.html?_odkw=CAT+5+NETWORKING+LAN+PATCH+CORD+CABLE+1.5+METERs&_osacat=0&_from=R40&_trksid=p2045573.m570.l1313.TR0.TRC0.H0.X200ft+feet+RS485+Signal+Transmission+Cable+for+Control+CCTV+PTZ+Security+camera&_nkw=200ft+feet+RS485+Signal+Transmission+Cable+for+Control+CCTV+PTZ+Security+camera&_sacat=0http://www.ebay.com/sch/i.html?_odkw=CAT+5+NETWORKING+LAN+PATCH+CORD+CABLE+1.5+METERs&_osacat=0&_from=R40&_trksid=p2045573.m570.l1313.TR0.TRC0.H0.X200ft+feet+RS485+Signal+Transmission+Cable+for+Control+CCTV+PTZ+Security+camera&_nkw=200ft+feet+RS485+Signal+Transmission+Cable+for+Control+CCTV+PTZ+Security+camera&_sacat=0http://www.ebay.com/sch/i.html?_odkw=CAT+5+NETWORKING+LAN+PATCH+CORD+CABLE+1.5+METERs&_osacat=0&_from=R40&_trksid=p2045573.m570.l1313.TR0.TRC0.H0.X200ft+feet+RS485+Signal+Transmission+Cable+for+Control+CCTV+PTZ+Security+camera&_nkw=200ft+feet+RS485+Signal+Transmission+Cable+for+Control+CCTV+PTZ+Security+camera&_sacat=0http://www.ebay.com/sch/i.html?_odkw=USB+2.0+to+RS232+Serial+DB9+Pin+Adapter+SKU%23622&_osacat=0&_from=R40&_trksid=p2045573.m570.l1313.TR0.TRC0.H0.XRS232+to+RS485+Adapter+Converter+Card+access+control+Systems+&_nkw=RS232+to+RS485+Adapter+Converter+Card+access+control+Systems+&_sacat=0http://www.ebay.com/sch/i.html?_odkw=USB+2.0+to+RS232+Serial+DB9+Pin+Adapter+SKU%23622&_osacat=0&_from=R40&_trksid=p2045573.m570.l1313.TR0.TRC0.H0.XRS232+to+RS485+Adapter+Converter+Card+access+control+Systems+&_nkw=RS232+to+RS485+Adapter+Converter+Card+access+control+Systems+&_sacat=0http://www.ebay.com/sch/i.html?_odkw=USB+2.0+to+RS232+Serial+DB9+Pin+Adapter+SKU%23622&_osacat=0&_from=R40&_trksid=p2045573.m570.l1313.TR0.TRC0.H0.XRS232+to+RS485+Adapter+Converter+Card+access+control+Systems+&_nkw=RS232+to+RS485+Adapter+Converter+Card+access+control+Systems+&_sacat=0