Академический Документы
Профессиональный Документы
Культура Документы
Advantages
Filtering the noise is efficient
Disadvantages
Not Feasible
Adaptive image restoration based on local
robust blur estimation
Method used
Spatial correlation
Advantages
Data Estimation is valid
Disadvantages
Not efficiency
Close the loop: Joint blind image restoration
and recognition with sparse representation
Method used
Restoration model
Advantages
Blur images will be Positively reduced
Disadvantages
Complexity
Removing Camera Shake from a Single
Photograph
Method used
Two phase Algorithm is used
Advantages
The method is easy and simple to verify.
Disadvantages
Only precede accurate result for the Single
photograph.
Non-uniform motion deblurring for
bilayer scenes
Method used
Kernel segmentation
Advantages
The segmentation is used to maintain the user
complexity less
Disadvantages
Time consuming
BLOCK DIAGRAM
Image acquisition
Resizing
Future Extraction
Preprocessing Segmentation
RGB to Gray
conversion Classification
Webcam
Person Detection
PC
USB
Serial
BLOCK DIAGRAM
DESCRIPTION
Face detection is localization of the face in an image.
Track the face in between multiple frames, to reduce computational time
and preserve the identity of a face (person) between frames.
Face preprocessing step is to normalize the coarse face detection, so that a
robust feature extraction can be achieved.
feature extraction is to extract a compact set of interpersonal discriminating
geometrical or/and photometrical features of the face.
Feature matching is the actual recognition process. The feature vector
obtained from the feature extraction is matched to classes (persons) of
facial images already enrolled in a database.
A webcam is a video camera that feeds or streams an image or video in real
time to or through a computer to a computer network, such as the Internet.
A USB adapter is a type of protocol converter which is used for
converting USB data signals to and from other communications standards.
Commonly, USB adapters are used to convert USB data to standard serial
port data and vice versa.
ALGORITHM
LBPH Algorithm
Human beings perform face recognition automatically
every day and practically with no effort.
Although it sounds like a very simple task for us, it
has proven to be a complex task for a computer, as it
has many variables that can impair the accuracy of the
methods, for example: illumination variation, low
resolution, occlusion, amongst other.
Local Binary Pattern (LBP) is a simple yet very
efficient texture operator which labels the pixels of an
image by thresholding the neighborhood of each pixel
and considers the result as a binary number.
SCREEN SHOTS
CONCLUSION
LNO provides a convenient abstraction of
real objects supporting easy discovery,
programming and management procedures
for real or virtual Internet of Things devices.
The proposed naming schema allows the
diffusion of names by means of the NLSR
routing protocol.
A Proof of Concept has been implemented
using commercial IoT products and showing
objects augmentation and function chaining.
REFERENCES
[1] A. Zanella, N. Bui, A. Castellani, L.Vangelista, and M. Zorzi,
“Internet of things for smart cities,” IEEE Internet of Things journal,
vol. 1, no. 1, pp. 22–32, 2014.
[2] A. Botta, W. De Donato,V. Persico, and A. Pescap ´e, “Integration
of cloud computing and internet of things: a survey,” Future
Generation Computer Systems, vol. 56, pp. 684–700, 2016.
[3] I. Ishaq, D. Carels, G. K. Teklemariam, J. Hoebeke, F.V. d. Abeele, E.
D. Poorter, I. Moerman, and P. Demeester, “Ietf standardization in
the field of the internet of things (iot): a survey,” Journal of Sensor
and Actuator Networks, vol. 2, no. 2, pp. 235–287, 2013.
[4] W. Shang,Y.Yu, R. Droms, and L. Zhang, “Challenges in iot
networking via tcp/ip architecture,” Tech. Report NDN-0038. NDN
Project, 2016.
[5] Y.Yu, A. Afanasyev, D. Clark,V. Jacobson, L. Zhang et al.,
“Schematizing trust in named data networking,” in Proceedings of
the 2nd International Conference on Information-Centric
Networking. ACM, 2015, pp. 177–186.